JOURNAL ARTICLE

Improved Secure Provable Data Possession Scheme for Cloud Storage

Xu An WangRuifeng Li

Year: 2022 Journal:   2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) Pages: 456-460

Abstract

With the rapid development of cloud storage technology, effectively verifying the cloud data's integrity becomes a major issue in cloud storage. Recently, Nayak and Tripathy proposed their cloud auditing protocol. Although the protocol is efficient, the protocol is not secure as Yu et al's attack shows. Even if the server does not store the users' data, it is possible to forge the provable data possession proof and pass the integrity audit. We point out the issue in their article and describe in detail the process by which the cloud server forging the proof. We finally give an improved and more secure scheme and analysis its security also.

Keywords:
Cloud storage Computer science Cloud computing Computer network Scheme (mathematics) Possession (linguistics) Computer security Provable security Encryption Operating system Mathematics

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
9
Refs
0.23
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.