Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.
Bibliographical noteFunding Information:
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2013R1A2A2A01005559, No.2015R1C1A1A02036511)
© 2015, Springer Science+Business Media New York.
- Cloud computing
- Cloud storage
- Data deduplication
- Multimedia content security
- Proof of data possession
- Proof of ownership
- Proof of retrievability
ASJC Scopus subject areas
- Media Technology
- Hardware and Architecture
- Computer Networks and Communications