Provably-secure public auditing with deduplication

Dongmin Kim, ik rae Jeong

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu’s scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Original languageEnglish
Pages (from-to)2219-2236
Number of pages18
JournalKSII Transactions on Internet and Information Systems
Volume11
Issue number4
DOIs
Publication statusPublished - 2017

Fingerprint

Servers

Keywords

  • Data integrity
  • Deduplication
  • Proof-unforgebility
  • Public auditing
  • Tag-unforgeability

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Cite this

Provably-secure public auditing with deduplication. / Kim, Dongmin; Jeong, ik rae.

In: KSII Transactions on Internet and Information Systems, Vol. 11, No. 4, 2017, p. 2219-2236.

Research output: Contribution to journalArticle

@article{80fe8497dcdf4b87b85bcd8cecf477cd,
title = "Provably-secure public auditing with deduplication",
abstract = "With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu’s scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.",
keywords = "Data integrity, Deduplication, Proof-unforgebility, Public auditing, Tag-unforgeability",
author = "Dongmin Kim and Jeong, {ik rae}",
year = "2017",
doi = "10.3837/tiis.2017.04.021",
language = "English",
volume = "11",
pages = "2219--2236",
journal = "KSII Transactions on Internet and Information Systems",
issn = "1976-7277",
publisher = "Korea Society of Internet Information",
number = "4",

}

TY - JOUR

T1 - Provably-secure public auditing with deduplication

AU - Kim, Dongmin

AU - Jeong, ik rae

PY - 2017

Y1 - 2017

N2 - With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu’s scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

AB - With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu’s scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

KW - Data integrity

KW - Deduplication

KW - Proof-unforgebility

KW - Public auditing

KW - Tag-unforgeability

UR - http://www.scopus.com/inward/record.url?scp=85018985630&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85018985630&partnerID=8YFLogxK

U2 - 10.3837/tiis.2017.04.021

DO - 10.3837/tiis.2017.04.021

M3 - Article

AN - SCOPUS:85018985630

VL - 11

SP - 2219

EP - 2236

JO - KSII Transactions on Internet and Information Systems

JF - KSII Transactions on Internet and Information Systems

SN - 1976-7277

IS - 4

ER -