{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T01:43:11Z","timestamp":1648604591522},"reference-count":27,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61702541","61872087"],"award-info":[{"award-number":["61702541","61872087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2017QNRC001"],"award-info":[{"award-number":["2017QNRC001"]}]},{"name":"the Science Research Plan Program by NUDT","award":["ZK17-03-46"],"award-info":[{"award-number":["ZK17-03-46"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2020,2]]},"abstract":"<jats:p> In 2013, the revelation of Edward Snowden rekindled cryptographic researchers\u2019 interest in subversion attacks. Since then, many works have been carried out to explore the power of subversion attacks and feasible effective countermeasures as well. In this work, we investigate the study of subversion attacks against cloud auditing protocol, which has been well-known as useful primitive for secure cloud storage. We demonstrate that subverted auditing protocol enables the cloud server to recover secret information stored on the data owner side. Particularly, we first define an asymmetric subversion attack model for auditing protocol. This model serves as the principle for analyzing the undetectability and key recovery of subversion attacks against auditing protocols. We then show a general framework of asymmetric subversion attacks against auditing protocols with index-coefficient challenge. To illustrate the feasibility of our paradigm, several concrete auditing protocols are provided. As a feasible countermeasure, we propose a subversion-resilient auditing protocol with index-coefficient challenge. <\/jats:p>","DOI":"10.1142\/s0129054120500033","type":"journal-article","created":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T09:17:18Z","timestamp":1583745438000},"page":"193-206","source":"Crossref","is-referenced-by-count":1,"title":["Security of Auditing Protocols Against Subversion Attacks"],"prefix":"10.1142","volume":"31","author":[{"given":"Jiaxian","family":"Lv","sequence":"first","affiliation":[{"name":"National University of Defense Technology, No. 109, Deya Road, Kaifu District, Changsha, Hunan, China"}]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, No. 109, Deya Road, Kaifu District, Changsha, Hunan, China"}]},{"given":"Jinshu","family":"Su","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, No. 109, Deya Road, Kaifu District, Changsha, Hunan, China"}]},{"given":"Rongmao","family":"Chen","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, No. 109, Deya Road, Kaifu District, Changsha, Hunan, China"}]},{"given":"Wenjun","family":"Wu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, No. 109, Deya Road, Kaifu District, Changsha, Hunan, China"}]}],"member":"219","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"S0129054120500033BIB001","volume":"6","author":"Ball J.","year":"2013","journal-title":"The Guardian"},{"key":"S0129054120500033BIB002","volume":"5","author":"Perlroth N.","year":"2013","journal-title":"The New York Times"},{"key":"S0129054120500033BIB004","first-page":"105","volume-title":"AAAS Selected Symposia Series","volume":"69","author":"Simmons G. J.","year":"1982"},{"key":"S0129054120500033BIB005","first-page":"61","volume-title":"Security and Privacy","author":"Simmons G. J.","year":"1983"},{"key":"S0129054120500033BIB006","first-page":"364","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques","author":"Simmons G. J.","year":"1984"},{"key":"S0129054120500033BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_6"},{"key":"S0129054120500033BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_8"},{"key":"S0129054120500033BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052241"},{"key":"S0129054120500033BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_1"},{"key":"S0129054120500033BIB011","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813681"},{"key":"S0129054120500033BIB012","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813635"},{"key":"S0129054120500033BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_22"},{"key":"S0129054120500033BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93638-3_22"},{"key":"S0129054120500033BIB015","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"S0129054120500033BIB016","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"S0129054120500033BIB017","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"S0129054120500033BIB018","doi-asserted-by":"publisher","DOI":"10.1145\/2699909"},{"key":"S0129054120500033BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"S0129054120500033BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"S0129054120500033BIB021","first-page":"1","author":"Zhu Y.","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"S0129054120500033BIB022","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982514"},{"key":"S0129054120500033BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"S0129054120500033BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"S0129054120500033BIB025","first-page":"289","volume-title":"Workshop on the Theory and Application of Cryptographic Techniques","author":"Blum M.","year":"1984"},{"key":"S0129054120500033BIB026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_21"},{"key":"S0129054120500033BIB027","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"S0129054120500033BIB028","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952994"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054120500033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T09:17:36Z","timestamp":1583745456000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054120500033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":27,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["10.1142\/S0129054120500033"],"URL":"https:\/\/doi.org\/10.1142\/s0129054120500033","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2]]}}}