Insecurity of a Public Proof of Cloud Storage from Lattice Assumption

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:tangroo
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Cloud storage auditing is considered as a significant service to verify the integrity of the data stored in cloud. Liu et al. have proposed a proof of storage protocol with public auditing form lattice assumption, which can resist quantum computer attacks. They claim that the protocol enjoys desirable security properties, such as unforgeability and privacy preserving. We demonstrate that any malicious cloud service provider can cheat the third party auditor and the users, through generating the valid response proof which can pass the verification even if some other data blocks are lost by accident. And the primitive data blocks maybe recovered by any curious third party auditor through solving some linearly equations. Our work can help cryptographers and engineers design and implement more secure and efficient lattice-based public auditing scheme for the cloud storage data. Liu et al. Have proposed a proof of storage protocol with public auditing form lattice assumption, which can resist quantum computer attacks. They claim that the protocol liked desirable security properties, such as unforgeability and privacy preserving. We demonstrate that any malicious cloud service provider can cheat the third party auditor and the users, through generating the valid response proof which can pass the verification even if some other data blocks are lost by And the primitive data blocks maybe recovered by any curious third party auditor through solving some linearly equations. Our work can help cryptographers and engineers design and implement more secure and efficient lattice-based public auditing schemes for the cloud storage data.
其他文献
少女们最怕的事情应该就是年纪渐长,把自己熬成了黄脸婆.如果一个人的脸色不好,即使是少女的年龄,也会让你看起来像个黄脸婆.rn脸色蜡黄怎么回事rn1、贫血rn大多数女性都会有
期刊
Translation model containing translation rules with probabilities plays a crucial role in statistical machine translation. Conventional method estimates transla
期刊
Inspired by the behavior of cockroaches in nature, this paper presents a new optimization algorithm called Cockroach colony optimization(CCO). In the CCO algori
【摘 要】物资计划管理是企业物资活动的基础,是企业资源有效配置的重要前提。本文论述了建立协同运作、全面覆盖、全过程和全员管理的物资计划管理体系的含义、创新做法及管理实效,希望对企业实行全面物资计划管理、提高企业集约化管理水平有参考和借鉴意义。  【关键词】物资计划 协同运作 “三全”管理体系  一、概述  随着物资集约化进程的不断推进,物资管理已从过去的边缘地位被推到了核心位置,而物资需求计划管理
云存储系统在得到广泛应用的同时,也存在数据泄露等安全隐患,数据存储安全问题备受关注。设计并实现云存储安全增强系统,可以有效防止数据在传输存储过程中泄露,增强存储的安全性,是当今计算机技术发展中的重要问题。
Business process that facilitates the organization cooperation and resource sharing plays an important role in Community cloud(Comc). The nature of applications
超声TOFD(衍射时差)法是焊缝超声检测和缺陷定量很有发展前景的一种新技术。它有别于按脉冲回波幅度进行定量的常规技术,是靠入射纵波在缺陷端部产生的衍射波传播时差进行测
The threshold implementation method of Substitution box(S-box) has been proposed by Nikova et al. for resisting first-order Differential power attacks with glit