z-logo
open-access-imgOpen Access
A Solution to Defend Cloud Auditing Protocols from A Potential Attack
Author(s) -
Jiaxian Lv,
Yi Wang,
Jinze Liu
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1437/1/012112
Subject(s) - subversion , computer security , cloud computing , computer science , audit , cryptography , cryptographic protocol , protocol (science) , theme (computing) , government (linguistics) , plan (archaeology) , world wide web , business , political science , law , operating system , history , politics , medicine , linguistics , philosophy , alternative medicine , accounting , archaeology , pathology
PRISM, a monitoring plan carried out by American government and revealed to the public in 2013, brought subversion attack back to the centre of cryptography research. In this work, we propose a kind of subversion attack on the cloud auditing protocols, where the cloud server plays the role of subversion attacker, manages to recover the secret message stored by the users of the auditing protocol. Then we propose a general frame of defence solutions with experiments to evaluate the practicability of our theme.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here