Skip to main navigation Skip to search Skip to main content

Comments on Yu et al’s Shared Data Integrity Verification Protocol

  • Tsu Yang Wu*
  • , Yueshan Lin
  • , King Hang Wang
  • , Chien Ming Chen
  • , Jeng Shyang Pan
  • *Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

2 Citations (Scopus)

Abstract

Recently, Yu et al. proposed a secure shared data integrity verification protocol called SDVIP 2 to ensure the integrity of outsourced file in the cloud. Unfortunately, we exploit the vulnerability of their protocol in this paper. We demonstrate an active adversary can modify the outsourced file such that the auditor is unable to detect in the auditing process. At the end of this paper, we also provide two suggestions to fix the proposed attack.

Original languageEnglish
Title of host publicationProceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications
EditorsPavel Kromer, Vaclav Snasel, Jeng-Shyang Pan, Enrique Alba
PublisherSpringer Cham
Pages73-78
Number of pages6
ISBN (Electronic)9783319685274
ISBN (Print)9783319685267
DOIs
Publication statusPublished - 23 Sept 2017
Event4th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2017 - Malaga, Spain
Duration: 9 Oct 201711 Oct 2017
https://link.springer.com/conference/ecc

Publication series

NameAdvances in Intelligent Systems and Computing
Volume682
ISSN (Print)2194-5357

Conference

Conference4th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2017
Abbreviated titleECC 2017
Country/TerritorySpain
CityMalaga
Period9/10/1711/10/17
OtherConference Proceedings
Internet address

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 16 - Peace, Justice and Strong Institutions
    SDG 16 Peace, Justice and Strong Institutions

User-Defined Keywords

  • Bilinear pairings
  • Cloud storage security
  • Cryptanalysis
  • Data integrity verification

Fingerprint

Dive into the research topics of 'Comments on Yu et al’s Shared Data Integrity Verification Protocol'. Together they form a unique fingerprint.

Cite this