Comments on “Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification”
- 18 November 2015
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 11 (3), 658-659
- https://doi.org/10.1109/tifs.2015.2501728
Abstract
Recently, a practical public integrity auditing scheme supporting multiuser data modification (IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, DOI 10.1109/TIFS.2015.2423264) was proposed. Although the protocol was claimed secure, in this paper, we show that the proposal fails to achieve soundness , the most essential property that an auditing scheme should provide. Specifically, we show that a cloud server can collude with a revoked user to deceive a third-party auditor (TPA) that a stored file keeps virgin even when the entire file has been deleted.Funding Information
- National Natural Science Foundation of China (61300213, 61272436)
This publication has 1 reference indexed in Scilit:
- Public Integrity Auditing for Dynamic Data Sharing With Multiuser ModificationIEEE Transactions on Information Forensics and Security, 2015