On the security of auditing mechanisms for secure cloud storage
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7348 https://ink.library.smu.edu.sg/context/sis_research/article/8351/viewcontent/1_s2.0_S0167739X13001040_main.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8351 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83512022-10-06T02:33:08Z On the security of auditing mechanisms for secure cloud storage YU, Yong NIU, Lei YANG, Guomin MU, Yi SUSILO, Willy Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism.We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms. 2014-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7348 info:doi/10.1016/j.future.2013.05.005 https://ink.library.smu.edu.sg/context/sis_research/article/8351/viewcontent/1_s2.0_S0167739X13001040_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Auditing Cloud storage Cryptanalysis Privacy-preserving Data Storage Systems Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Auditing Cloud storage Cryptanalysis Privacy-preserving Data Storage Systems Information Security |
spellingShingle |
Auditing Cloud storage Cryptanalysis Privacy-preserving Data Storage Systems Information Security YU, Yong NIU, Lei YANG, Guomin MU, Yi SUSILO, Willy On the security of auditing mechanisms for secure cloud storage |
description |
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism.We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms. |
format |
text |
author |
YU, Yong NIU, Lei YANG, Guomin MU, Yi SUSILO, Willy |
author_facet |
YU, Yong NIU, Lei YANG, Guomin MU, Yi SUSILO, Willy |
author_sort |
YU, Yong |
title |
On the security of auditing mechanisms for secure cloud storage |
title_short |
On the security of auditing mechanisms for secure cloud storage |
title_full |
On the security of auditing mechanisms for secure cloud storage |
title_fullStr |
On the security of auditing mechanisms for secure cloud storage |
title_full_unstemmed |
On the security of auditing mechanisms for secure cloud storage |
title_sort |
on the security of auditing mechanisms for secure cloud storage |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2014 |
url |
https://ink.library.smu.edu.sg/sis_research/7348 https://ink.library.smu.edu.sg/context/sis_research/article/8351/viewcontent/1_s2.0_S0167739X13001040_main.pdf |
_version_ |
1770576316834250752 |