Skip to main content
placeholder image

Comments on "public integrity auditing for dynamic data sharing with multiuser modification"

Journal Article


Download full-text (Open Access)

Abstract


  • Recently, a practical public integrity auditing scheme supporting multiuser data modification (IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, DOI 10.1109/TIFS.2015.2423264) was proposed. Although the protocol was claimed secure, in this paper, we show that the proposal fails to achieve soundness, the most essential property that an auditing scheme should provide. Specifically, we show that a cloud server can collude with a revoked user to deceive a third-party auditor (TPA) that a stored file keeps virgin even when the entire file has been deleted.

Authors


  •   Yu, Yong (external author)
  •   Li, Yannan (external author)
  •   Ni, Jianbing (external author)
  •   Yang, Guomin
  •   Mu, Yi (external author)
  •   Susilo, Willy

Publication Date


  • 2016

Citation


  • Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y. & Susilo, W. (2016). Comments on "public integrity auditing for dynamic data sharing with multiuser modification". IEEE Transactions on Information Forensics and Security, 11 (3), 658-659.

Scopus Eid


  • 2-s2.0-84962316515

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=6089&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/5062

Has Global Citation Frequency


Number Of Pages


  • 1

Start Page


  • 658

End Page


  • 659

Volume


  • 11

Issue


  • 3

Place Of Publication


  • United States

Abstract


  • Recently, a practical public integrity auditing scheme supporting multiuser data modification (IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, DOI 10.1109/TIFS.2015.2423264) was proposed. Although the protocol was claimed secure, in this paper, we show that the proposal fails to achieve soundness, the most essential property that an auditing scheme should provide. Specifically, we show that a cloud server can collude with a revoked user to deceive a third-party auditor (TPA) that a stored file keeps virgin even when the entire file has been deleted.

Authors


  •   Yu, Yong (external author)
  •   Li, Yannan (external author)
  •   Ni, Jianbing (external author)
  •   Yang, Guomin
  •   Mu, Yi (external author)
  •   Susilo, Willy

Publication Date


  • 2016

Citation


  • Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y. & Susilo, W. (2016). Comments on "public integrity auditing for dynamic data sharing with multiuser modification". IEEE Transactions on Information Forensics and Security, 11 (3), 658-659.

Scopus Eid


  • 2-s2.0-84962316515

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=6089&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/5062

Has Global Citation Frequency


Number Of Pages


  • 1

Start Page


  • 658

End Page


  • 659

Volume


  • 11

Issue


  • 3

Place Of Publication


  • United States