2022
DOI: 10.1155/2022/1557233
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Secure Public Cloud Auditing Scheme in Edge Computing

Abstract: Cloud storage plays an important role in the data processing of edge computing. It is very necessary to protect the integrity of these data and the privacy of users. Recently, a cloud auditing scheme which can be used to smart cities has been proposed, which is lightweight and privacy-preserving. Although this scheme has very good performance and is a very valuable work, we find that there is insecurity in it. By giving two kinds of attacks, we prove that a malicious cloud server provider (CSP) can forge audit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…The other developed model was efficient for novel auditing methods, in providing security to data in the cloud storage based on convergence and to perform symmetric encryption. However, the model issued data that was lost with the cloud where the data loss process occurred in the infrastructure irrespective of the measures provided by the cloud service providers (CSPs) [13]. Shabbir et al [14] utilized data integrity verification based on the short signature algorithm that provided privacy protection.…”
Section: Introductionmentioning
confidence: 99%
“…The other developed model was efficient for novel auditing methods, in providing security to data in the cloud storage based on convergence and to perform symmetric encryption. However, the model issued data that was lost with the cloud where the data loss process occurred in the infrastructure irrespective of the measures provided by the cloud service providers (CSPs) [13]. Shabbir et al [14] utilized data integrity verification based on the short signature algorithm that provided privacy protection.…”
Section: Introductionmentioning
confidence: 99%