Paper 2012/554
Security weakness in the Proof of Storage with Deduplication
Youngjoo Shin, Junbeom Hur, and Kwangjo Kim
Abstract
Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing. Proof of Storage with Deduplication (POSD) is the first solution that addresses the issue for the cloud storage. However, the validity of the POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of the scheme under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improvement of the POSD scheme to mitigate our attack.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Cloud storagedata securityproof of data possessionproof of retrievabilityproof of ownershipdata deduplication
- Contact author(s)
- s youngjoo @ kaist ac kr
- History
- 2012-09-27: received
- Short URL
- https://ia.cr/2012/554
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/554, author = {Youngjoo Shin and Junbeom Hur and Kwangjo Kim}, title = {Security weakness in the Proof of Storage with Deduplication}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/554}, year = {2012}, url = {https://eprint.iacr.org/2012/554} }