[Resource Topic] 2012/554: Security weakness in the Proof of Storage with Deduplication

Welcome to the resource topic for 2012/554

Title:
Security weakness in the Proof of Storage with Deduplication

Authors: Youngjoo Shin, Junbeom Hur, Kwangjo Kim

Abstract:

Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing. Proof of Storage with Deduplication (POSD) is the first solution that addresses the issue for the cloud storage. However, the validity of the POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of the scheme under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improvement of the POSD scheme to mitigate our attack.

ePrint: https://eprint.iacr.org/2012/554

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .