Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2017, Vol. 57 Issue (11) : 1145-1149,1158     DOI: 10.16511/j.cnki.qhdxxb.2017.26.058
COMPUTER SCIENCE AND TECHNOLOGY |
Security analysis of dynamic provable data possession based on Hash aggregation
ZOU Jing1, LI Bin2, ZHANG Li2, LUO Yang2, SUN Yunchuan2, LI Shixian2
1. State Power Economic Research Institute, Beijing 102209, China;
2. China Information Technology Security Evaluation Center, Beijing 100085, China
Download: PDF(1139 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Dynamic provable data possession (DPDP) schemes are important in cloud data security to prevent the data from being lost, modified or corrupted. This paper presents security analyse of some existing schemes based on Hash aggregation and points out some security problems in the known methods and their fundamental reasons. The analyse show that Hash aggregation can effectively reduce storage, computation and transmission costs of verification due for data dynamic operations. One scheme had security vulnerabilities when verifying the relation between the position and the value of a data block that can allow a substitution attack.
Keywords dynamic provable possession      Merkle tree      Hash aggregation      skip list     
ZTFLH:  TP309.2  
Issue Date: 15 November 2017
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
ZOU Jing
LI Bin
ZHANG Li
LUO Yang
SUN Yunchuan
LI Shixian
Cite this article:   
ZOU Jing,LI Bin,ZHANG Li, et al. Security analysis of dynamic provable data possession based on Hash aggregation[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1145-1149,1158.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2017.26.058     OR     http://jst.tsinghuajournals.com/EN/Y2017/V57/I11/1145
  
  
  
  
[1] 谭霜, 贾焰, 韩伟红, 等. 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2014, 37(32):1-15. TANG Shuang, JIA Yan, HAN Weihong, et al. Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2014, 37(32):1-15.(in Chinese)
[2] Deswarte Y, Quisquater J, Sadane A. Remote integrity checking[C]//Proc 6th Working Conference on Integrity and Internal Control in Information Systems. Lausanne, Switzerland:Springer, 2004:1-11.
[3] Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores[C]//Proc 14th ACM Conference on Computer and Communications Security. Alexandria, VA, USA:ACM, 2007:598-609.
[4] Ateniese G, Burns R, Curtmola R, et al. Remote data checking using provable data possession[J]. ACM Transactions on Information and System Security (TISSEC), 2011, 14(1):1-34.
[5] Ateniese G, Di Pietro R, Mancini L V, et al. Scalable and efficient provable data possession[C]//Proc 4th International Conference on Security and Privacy in Communication Networks. Istanbul, Turkey:ACM, 2008:1-10.
[6] Sebé F, Domingo F J, Martine B A, et al. Efficient remote data possession checking in critical information infrastructure[J]. IEEE Transactions on Knowledge and Data Engineering. 2008, 20(8):1034-1038.
[7] Erway C, Küpü A, Papamanthou C, et al. Dynamic provable data possession[C]//Proc 16th ACM Conference on Computer and Communications Security. Chicago, IL, USA:ACM, 2009:213-222.
[8] Wang Q, Wang C, Li J, et al. Enabling public verifiability and data dynamics for storage security in cloud[C]//Proc 14th European Symposium on Research in Computer Security. Saint-Malo, France:Springer-Verlag Berlin, 2009:355-370.
[9] Barsoum A F, Hasan M A. Provable multicopy dynamic data possession in cloud computing systems[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(3):485-497.
[10] Liu F F, Gu D W, Lu H N. An improved dynamic provable data possession model[C]//Proc 2011 IEEE International Conference on Cloud Computing and Intelligence Systems. Beijing, China:IEEE, 2011:290-295.
[11] Wang H Q. Identity-based distributed provable data possession in multi-cloud storage[J]. IEEE Transactions on Services Computing, 2015, 8(2):328-340.
[12] Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing[C]//Proc 7th International Conference on the Theory and Application of Cryptology and Information Security. London, UK:Springer-Verlag, 2001:514-532.
[1] WANG Lina, ZHOU Weikang, LIU Weijie, YU Rongwei. Hardware-assisted ROP attack detection on cloud platforms[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(3): 237-242.
[2] ZHAO Gang, YU Yue, HUANG Minhuan, WANG Yuying, WANG Jiajie, SUN Xiaoxia. Test method for the font parser in PDF viewers[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(3): 266-271.
[3] CAO Laicheng, LIU Yufei, DONG Xiaoye, GUO Xian. User privacy-preserving cloud storage scheme on CP-ABE[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 150-156.
[4] WANG Yuding, YANG Jiahai. Data access control model based on data's role and attributes for cloud computing[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1150-1158.
[5] SHEN Ke, YE Xiaojun, LIU Xiaonan, LI Bin. Android App behavior-intent inference based on API usage analysis[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1139-1144.
[6] LIANG Bin, GONG Weigang, YOU Wei, LI Zan, SHI Wenchang. DTA technique for JavaScript optimizing compilation mode[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 932-938.
[7] PEI Jisheng, YE Xiaojun. Provenance dependency path pattern mining algorithm based on grammar induction[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 561-568.
[8] FANG Yong, LIU Daosheng, HUANG Cheng. Detecting of fake accounts with hierarchical clustering[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 620-624.
[9] ZHOU Caiqiu, YANG Yuwang, WANG Yongjian. Behavior measurement scheme for the wireless sensor network nodes[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 39-43.
[10] NING Bo, PEI Xiaoxia, LI Yuju, PEI Xinyu. Query authentications based on a fixed grid partitioning quad-tree index in LBS big data[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(7): 785-792.
[11] LI Zhoujun, WU Chunming, WANG Xiao. Assessment of Android application's risk behavior based on a sandbox system[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(5): 453-460.
[12] SHI Hongsong, GAO Jinping, JIA Wei, LIU Hui. Analyse of the security architecture and policy model in the Common Criteria[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(5): 493-498.
[13] MA Gang, DU Yuge, YANG Xi, ZHANG Bo, SHI Zhongzhi. Risk assessment expert system for the complex system[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 66-76,82.
[14] XU Qiang, LIANG Bin, YOU Wei, SHI Wenchang. Detecting Android malware phishing login interface based on SURF algorithm[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 77-82.
[15] TU Shanshan, TAO Huaizhou, HUANG Yongfeng. Detection of instant voice communication steganography using semi-supervised learning[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(11): 1246-1252.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd