Improved Data Integrity Auditing Scheme of IoT System on Cloud Storage

Authors

  • Hao Yan, Yanan Liu, Yuan Cheng, Zheng Zhang

Abstract

With Internet of Things (IoT), various kinds of smart devices like mobile phone, computer and intelligent tools can connect, communicate and share information with each other. However, smart devices usually have limited capacity, it is difficult to extend the application scale of IoT system when huge data is generated. Therefore, more and more IoT systems depend on cloud storage to expand storage capacity and computing resources. To audit the integrity of data generated by IoT sensors in cloud, Zhu et al. utilized a short signature algorithm to propose a data integrity audition protocol for cloud-based IoT system. Although the proposed scheme is claimed secure, unfortunately, we find it still has security flaws in the sense that untrusted cloud service provider can cheat the auditor by generating correct proof without possessing the original data. In this paper, we give comprehensive security analysis to Zhu’s scheme and present the detailed procedure of breaking Zhu’s scheme with our attack. Moreover, we supply with our solution to address the problem in Zhu’s scheme, which has almost the same efficiency as Zhu’s scheme.

Published

2020-02-29

Issue

Section

Articles