Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage

Shaojing FU  Dongsheng WANG  Ming XU  Jiangchun REN  

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E97-A   No.1   pp.418-420
Publication Date: 2014/01/01
Online ISSN: 1745-1337
DOI: 10.1587/transfun.E97.A.418
Print ISSN: 0916-8508
Type of Manuscript: LETTER
Category: Cryptography and Information Security
cloud computing,  cloud storage,  data integrity,  replay attack,  

Full Text: PDF(72.9KB)>>
Buy this Article

Remote data possession checking for cloud storage is very important, since data owners can check the integrity of outsourced data without downloading a copy to their local computers. In a previous work, Chen proposed a remote data possession checking protocol using algebraic signature and showed that it can resist against various known attacks. In this paper, we find serious security flaws in Chen's protocol, and shows that it is vulnerable to replay attack by a malicious cloud server. Finally, we propose an improved version of the protocol to guarantee secure data storage for data owners.