Advances, Systems and Applications
Types of Security Issues | Symptoms | Affects | Solution with references |
---|---|---|---|
Risk to integrity of data | Unauthorized access, segregation problem of data, lack of maintenance of database | hamperness of cloud storage service, lack of data integrity | Data encryption method, Public data auditing technique [83, 88,89,90] |
Dishonest TPA | tempering of original file, by the generation of wrong audit message, spoiling of CSP’s intention | Lack of data confidentiality, lack of data integrity | hash function with collision resistant property [87], Secure Hash Algorithm (SHA-2) [87], RSA algorithm [91], Threat Model [83], panda public auditing(PPA) [130] |
Dishonest CSP | Data leakage, data modification, loss of data | loss of reputation of CSP, data unavailability, lack of data integrity | Zero knowledge proof [117], data possession verification scheme [97], string authentication technique [53], firewall policies [54] |
Forgery Attack | Forge audit message, forge proof message | Violate data integrity policy, lack of reputation of CSP | soundness criteria [88], one way hash function [83], metadata of storage block order [89], hardness of diffie-Hellman computation in bilinear group [117], pass the challenge proof with non negligible probability [90] |
Malicious Insider Attack | Data leakage, data modification, data loss | Violate data integrity policy | string authentication technique [14], digital signature [88, 97, 124, 125] |