Paper 2012/554

Security weakness in the Proof of Storage with Deduplication

Youngjoo Shin, Junbeom Hur, and Kwangjo Kim

Abstract

Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing. Proof of Storage with Deduplication (POSD) is the first solution that addresses the issue for the cloud storage. However, the validity of the POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of the scheme under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improvement of the POSD scheme to mitigate our attack.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
Cloud storagedata securityproof of data possessionproof of retrievabilityproof of ownershipdata deduplication
Contact author(s)
s youngjoo @ kaist ac kr
History
2012-09-27: received
Short URL
https://ia.cr/2012/554
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/554,
      author = {Youngjoo Shin and Junbeom Hur and Kwangjo Kim},
      title = {Security weakness in the Proof of Storage with Deduplication},
      howpublished = {Cryptology ePrint Archive, Paper 2012/554},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/554}},
      url = {https://eprint.iacr.org/2012/554}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.