University of Wollongong
Browse

On the security of auditing mechanisms for secure cloud storage

Download (354.45 kB)
journal contribution
posted on 2024-11-16, 08:29 authored by Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy SusiloWilly Susilo
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms.

Funding

Secure and Efficient Fair Exchange Protocols

Australian Research Council

Find out more...

History

Citation

Yu, Y., Niu, L., Yang, G., Mu, Y. & Susilo, W. (2014). On the security of auditing mechanisms for secure cloud storage. Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications, 30 (1), 127-132.

Journal title

Future Generation Computer Systems

Volume

30

Issue

1

Pagination

127-132

Language

English

RIS ID

78489

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC