Remote data possession checking for cloud storage is very important, since data owners can check the integrity of outsourced data without downloading a copy to their local computers. In a previous work, Chen proposed a remote data possession checking protocol using algebraic signature and showed that it can resist against various known attacks. In this paper, we find serious security flaws in Chen's protocol, and shows that it is vulnerable to replay attack by a malicious cloud server. Finally, we propose an improved version of the protocol to guarantee secure data storage for data owners.
Shaojing FU
National University of Defense Technology
Dongsheng WANG
National University of Defense Technology
Ming XU
National University of Defense Technology
Jiangchun REN
National University of Defense Technology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Shaojing FU, Dongsheng WANG, Ming XU, Jiangchun REN, "Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage" in IEICE TRANSACTIONS on Fundamentals,
vol. E97-A, no. 1, pp. 418-420, January 2014, doi: 10.1587/transfun.E97.A.418.
Abstract: Remote data possession checking for cloud storage is very important, since data owners can check the integrity of outsourced data without downloading a copy to their local computers. In a previous work, Chen proposed a remote data possession checking protocol using algebraic signature and showed that it can resist against various known attacks. In this paper, we find serious security flaws in Chen's protocol, and shows that it is vulnerable to replay attack by a malicious cloud server. Finally, we propose an improved version of the protocol to guarantee secure data storage for data owners.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1587/transfun.E97.A.418/_p
Copy
@ARTICLE{e97-a_1_418,
author={Shaojing FU, Dongsheng WANG, Ming XU, Jiangchun REN, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage},
year={2014},
volume={E97-A},
number={1},
pages={418-420},
abstract={Remote data possession checking for cloud storage is very important, since data owners can check the integrity of outsourced data without downloading a copy to their local computers. In a previous work, Chen proposed a remote data possession checking protocol using algebraic signature and showed that it can resist against various known attacks. In this paper, we find serious security flaws in Chen's protocol, and shows that it is vulnerable to replay attack by a malicious cloud server. Finally, we propose an improved version of the protocol to guarantee secure data storage for data owners.},
keywords={},
doi={10.1587/transfun.E97.A.418},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 418
EP - 420
AU - Shaojing FU
AU - Dongsheng WANG
AU - Ming XU
AU - Jiangchun REN
PY - 2014
DO - 10.1587/transfun.E97.A.418
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E97-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2014
AB - Remote data possession checking for cloud storage is very important, since data owners can check the integrity of outsourced data without downloading a copy to their local computers. In a previous work, Chen proposed a remote data possession checking protocol using algebraic signature and showed that it can resist against various known attacks. In this paper, we find serious security flaws in Chen's protocol, and shows that it is vulnerable to replay attack by a malicious cloud server. Finally, we propose an improved version of the protocol to guarantee secure data storage for data owners.
ER -