Provably-secure public auditing with deduplication

Dongmin Kim, ik rae Jeong

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)

    Abstract

    With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu’s scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

    Original languageEnglish
    Pages (from-to)2219-2236
    Number of pages18
    JournalKSII Transactions on Internet and Information Systems
    Volume11
    Issue number4
    DOIs
    Publication statusPublished - 2017

    Keywords

    • Data integrity
    • Deduplication
    • Proof-unforgebility
    • Public auditing
    • Tag-unforgeability

    ASJC Scopus subject areas

    • Information Systems
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Provably-secure public auditing with deduplication'. Together they form a unique fingerprint.

    Cite this