2013
DOI: 10.1093/comjnl/bxt137
|View full text |Cite
|
Sign up to set email alerts
|

On Indistinguishability in Remote Data Integrity Checking

Abstract: With a rapid growth of data storage in the cloud, data integrity checking in a remote data storage system has become an important issue. A number of protocols, which allow remote integrity checking by a third party, have been proposed. Although those protocols are provably secure, the data privacy issues in those protocols have not been considered. We believe that these issues are equally important since the communication flows of integrity proofs from the cloud server should not reveal any useful information … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…It also supports secure user revocation. Against the auditor in auditing integrity Yu et al [28], Yu et al [27] and Fan et al [15] considered in distinguishability/ privacy on outsourced data. Zhang and Dong's publicly verifiable data outsourcing scheme [29] is proved with tight security reduction in IDbased setting.…”
Section: A Related Workmentioning
confidence: 99%
“…It also supports secure user revocation. Against the auditor in auditing integrity Yu et al [28], Yu et al [27] and Fan et al [15] considered in distinguishability/ privacy on outsourced data. Zhang and Dong's publicly verifiable data outsourcing scheme [29] is proved with tight security reduction in IDbased setting.…”
Section: A Related Workmentioning
confidence: 99%
“…Second Data Privacy Model. This model is given in [12], and follows the one proposed in [11,30]. Observe that such model is based on indistinguishability.…”
Section: Definition Of Dpdp Scheme With Pv and Dpmentioning
confidence: 99%
“…The scheme proposed by Shacham et al [5] cannot protect data privacy either. Although many other public auditing solutions have been proposed [6][7][8][9][10][11][12] that preserves privacy during the integrity audition, some schemes [6,8,9] only prevent the data leakage, rather than provide rigorous privacy guarantee. The solutions proposed by Wang et al and Worku et al [6,9] fail to achieve reliable data protection under their security models.…”
Section: Introductionmentioning
confidence: 99%