Analysis of the Comments on “Identity-Based Distributed Provable Data Possession in Multicloud Storage”
IEEE Transactions on Services Computing(2021)
摘要
In 2016, Peng et al. pointed out in the literature (IEEE Transactions on Services Computing, Vol. 9, No. 6, pp. 996-998, Nov./Dec. 2016) that Wang's identity-based provable data possessing scheme ID-DPDP(IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328-340, Mar./Apr. 2015) has security vulnerability, and Peng et al. offered the remedy solutions. Unfortunately, we demonstrate that Peng et al.'s method also has a security loophole that malicious cloud servers can produce valid proof information without original data. Accordingly, we provide a revised solution to the problem while preserving the security features of the ID-DPDP.
更多查看译文
关键词
Data integrity checking,cloud computing,public auditing,bilinear pairing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要