Cryptology ePrint Archive: Report 2012/554
Security weakness in the Proof of Storage with Deduplication
Youngjoo Shin, Junbeom Hur, Kwangjo Kim
Abstract: Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing.
Proof of Storage with Deduplication (POSD) is the first solution that addresses the issue for the cloud storage. However, the validity of the POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of the scheme
under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improvement of the POSD scheme to mitigate our attack.
Category / Keywords: cryptographic protocols / Cloud storage, data security, proof of data possession, proof of retrievability, proof of ownership, data deduplication
Date: received 25 Sep 2012, last revised 25 Sep 2012
Contact author: s youngjoo at kaist ac kr
Available format(s): PDF | BibTeX Citation
Version: 20120927:133909 (All versions of this report)
Short URL: ia.cr/2012/554
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]