Possession of Provable Multi-Copy Dynamic Data in Cloud Computing Systems

Authors

  • Y. Sunil  Assistant. Professor, Mother Theresa Institute of Computer Applications, Palamaner, S. V. University, Andhra Pradesh, India
  • C. Hasya  Mother Theresa Institute of Computer Applications, Palamaner, S. V. University, Andhra Pradesh, India

Keywords:

MR-PDP, DES, AES

Abstract

A key strategy for the cloud service provider to ensure data availability is replication. Numerous multi-copy integrity auditing systems were introduced to give consumers persuasive proof that the copies they need are all kept appropriately. However, with this scheme, we demonstrate that the scheme is easily vulnerable to copy-summation attacks and single-copy attacks, wherein a dishonest CSP just has to invest a single copy's worth of storage costs in order to always pass the verifier's challenge. As a result, in this instance, the scheme is no longer secure.

References

  1. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiplereplica provable data possession,” in Proc. 28th Int. Conf. Distrib. Comput. Syst., Jun. 2008, pp. 411–420.
  2. F. Armknecht, L. Barman, J. M. Bohli, and G. O. Karame, “Mirror: Enabling proofs of data replication and retrievability in the cloud,” in Proc. 25th USENIX Secur. Symp., 2016, pp. 1051–1068.
  3. M. Etemad and A. Küpçü, “Transparent, distributed, and replicated dynamic provable data possession,” in Proc. 11st Int. Conf. Appl. Cryptogr.Netw.Secur. (ACNS), 2013, pp. 1–18.
  4. C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang, and J. Chen, “MuR-DPA: Top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2609–2622, Sep. 2015.A. F. Barsoum and M. A. Hasan, “Provable multicopy dynamic data possession in cloud computing systems,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 485–497, Mar. 2015.
  5. G. Ateniese et al., “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Comput. Commun. Secur. (CCS), New York, NY, USA, 2007, pp. 598–609.
  6. K. Zeng, “Publicly verifiable remote data integrity,” in Proc. 10th Int. Conf. Inf. Commun. Secur. (ICICS), 2008, pp. 419–434.
  7. Y. Deswarte, J.-J. Quisquater, and A. Saïdane, “Remote integrity checking,” in Proc. 6th Working Conf. Integr. Internal Control Inf. Syst. (IICIS), 2003, pp. 1–11.

Downloads

Published

2022-12-30

Issue

Section

Research Articles

How to Cite

[1]
Y. Sunil, C. Hasya, " Possession of Provable Multi-Copy Dynamic Data in Cloud Computing Systems" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 6, pp.90-94, November-December-2022.