• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Provably-Secure Public Auditing with Deduplication

Vol. 11, No.4, April 30, 2017
10.3837/tiis.2017.04.021, Download Paper (Free):

Abstract

With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu’s scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Dongmin Kim and Ik Rae Jeong, "Provably-Secure Public Auditing with Deduplication," KSII Transactions on Internet and Information Systems, vol. 11, no. 4, pp. 2219-2236, 2017. DOI: 10.3837/tiis.2017.04.021

[ACM Style]
Kim, D. and Jeong, I. R. 2017. Provably-Secure Public Auditing with Deduplication. KSII Transactions on Internet and Information Systems, 11, 4, (2017), 2219-2236. DOI: 10.3837/tiis.2017.04.021