Security Weakness in the Proof of Storage with Deduplication

Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing. Proof Of Storage with Deduplication (POSD) is the first solution that addresses the issue for the cloud storage. However, the validity of the POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. The authors present insecurity of the scheme under new attack model that malicious clients exploit dishonestly manipulated keys. They also propose an improvement of the POSD scheme to mitigate their attack.

Provided by: Korea Advanced Institute of Science and Technology Topic: Cloud Date Added: Sep 2012 Format: PDF

Find By Topic