University of Wollongong
Browse

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Download (1.58 MB)
journal contribution
posted on 2024-11-15, 09:54 authored by Yong Yu, Yannan LiYannan Li, Jianbing Ni, Guomin Yang, Yi Mu, Willy SusiloWilly Susilo
Recently, a practical public integrity auditing scheme supporting multiuser data modification (IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, DOI 10.1109/TIFS.2015.2423264) was proposed. Although the protocol was claimed secure, in this paper, we show that the proposal fails to achieve soundness, the most essential property that an auditing scheme should provide. Specifically, we show that a cloud server can collude with a revoked user to deceive a third-party auditor (TPA) that a stored file keeps virgin even when the entire file has been deleted.

History

Citation

Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y. & Susilo, W. (2016). Comments on "public integrity auditing for dynamic data sharing with multiuser modification". IEEE Transactions on Information Forensics and Security, 11 (3), 658-659.

Journal title

IEEE Transactions on Information Forensics and Security

Volume

11

Issue

3

Pagination

658-659

Language

English

RIS ID

102226

Usage metrics

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC