Abstract
Recently, Yu et al. proposed a secure shared data integrity verification protocol called SDVIP 2 to ensure the integrity of outsourced file in the cloud. Unfortunately, we exploit the vulnerability of their protocol in this paper. We demonstrate an active adversary can modify the outsourced file such that the auditor is unable to detect in the auditing process. At the end of this paper, we also provide two suggestions to fix the proposed attack.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications |
| Editors | Pavel Kromer, Vaclav Snasel, Jeng-Shyang Pan, Enrique Alba |
| Publisher | Springer Cham |
| Pages | 73-78 |
| Number of pages | 6 |
| ISBN (Electronic) | 9783319685274 |
| ISBN (Print) | 9783319685267 |
| DOIs | |
| Publication status | Published - 23 Sept 2017 |
| Event | 4th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2017 - Malaga, Spain Duration: 9 Oct 2017 → 11 Oct 2017 https://link.springer.com/conference/ecc |
Publication series
| Name | Advances in Intelligent Systems and Computing |
|---|---|
| Volume | 682 |
| ISSN (Print) | 2194-5357 |
Conference
| Conference | 4th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2017 |
|---|---|
| Abbreviated title | ECC 2017 |
| Country/Territory | Spain |
| City | Malaga |
| Period | 9/10/17 → 11/10/17 |
| Other | Conference Proceedings |
| Internet address |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
User-Defined Keywords
- Bilinear pairings
- Cloud storage security
- Cryptanalysis
- Data integrity verification
Fingerprint
Dive into the research topics of 'Comments on Yu et al’s Shared Data Integrity Verification Protocol'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver