
Insecurity of a Public Proof of Cloud Storage from Lattice Assumption
Author(s) -
Zhang Xiaojun,
Xu Chunxiang,
Zhang Yuan,
Zhang Xiujie,
Wen Junwei
Publication year - 2017
Publication title -
chinese journal of electronics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.267
H-Index - 25
eISSN - 2075-5597
pISSN - 1022-4653
DOI - 10.1049/cje.2016.11.008
Subject(s) - cloud computing , lattice (music) , cloud storage , computer science , proof of concept , computer security , physics , operating system , acoustics
Cloud storage auditing is considered as a significant service to verify the integrity of the data stored in cloud. Liu et al . have proposed a proof of storage pro‐ tocol with public auditing form lattice assumption, which can resist quantum computer attacks. They claim that the protocol enjoys desirable security properties, such as un‐ forgeability and privacy preserving. We demonstrate that any malicious cloud service provider can cheat the third party auditor and the users, through generating the valid response proof which can pass the verification even if some other data blocks are lost by accident. And the primitive data blocks maybe recovered by any curious third party auditor through solving some linearly equations. Our work can help cryptographers and engineers design and imple‐ ment more secure and efficient lattice‐based public audit‐ing scheme for the cloud storage data.