Design and implementation of a cloud encryption transmission scheme supporting integrity verification

被引:3
作者
Cai, Zengyu [1 ]
Wu, Zuodong [2 ]
Zhang, Jianwei [2 ,3 ]
Wang, Wenqian [1 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Comp & Commun Coll, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ Light Ind, Software Coll, Zhengzhou 450002, Peoples R China
[3] Henan Key Lab Food Safety Data Intelligence, Zhengzhou 450002, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud storage; Chinese commercial encryption algorithms; SM2; SM3; discrete logarithm; Diffie-Hellman; elliptic curve; cloud data transmission encryption; integrity verification; privacy protection; EFFICIENT; PROTOCOL;
D O I
10.1504/IJES.2021.116108
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the cloud storage environment, the integrity of private data is one of the most concerned issues for users, which has become the focus of cloud storage research. For this kind of problem, the existing schemes usually sacrifice the communication efficiency of users for higher security, which often causes a lot of computing overhead. Therefore, the purpose of this paper is to achieve the coexistence of safety and efficiency, and adopts the ideas of Chinese commercial encryption algorithms SM2 and SM3, proposes a cloud encryption transmission scheme that supports integrity verification, and gives a security analysis under the assumption of discrete logarithm problem on elliptic curve and Diffie-Hellman problem. Finally, the actual test and comparative experiment results show that our scheme can realise the cloud data transmission encryption and cloud storage integrity verification functions at the same time without affecting the performance of the cloud server. Moreover, it can effectively resist all kinds of common attacks, reduce the storage and computing burden of cloud users, and has certain guiding significance for the research of user privacy protection in the cloud environment.
引用
收藏
页码:218 / 228
页数:11
相关论文
共 31 条
[1]  
Abubakr O.A., 2019, IEEE TRANS NETW SERV, V16, P1
[2]  
Ajeena Ruma Kareem K., 2017, 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), P14, DOI 10.1109/CRCSIT.2017.7965554
[3]  
[Anonymous], 2016, INT J DISTRIB SENS N
[4]  
Bokhari M. U., 2019, PROC INT C COMPUT SU, P890
[5]   Vehicular cloud computing: Architectures, applications, and mobility [J].
Boukerche, Azzedine ;
De Grande, Robson E. .
COMPUTER NETWORKS, 2018, 135 :171-189
[6]  
Cai C.H, 2018, J INFORM SECURITY RE, V6, P21
[7]  
Chen Z, 2018, J INFORM SECURITY RE, V4, P646
[8]   An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited [J].
Cui, Hui ;
Deng, Robert H. ;
Lai, Junzuo ;
Yi, Xun ;
Nepal, Surya .
COMPUTER NETWORKS, 2018, 133 :157-165
[9]  
Hu W., 2018, INFORM NETWORK SECUR, V7, P13
[10]   A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment [J].
Jin, Byung-Wook ;
Park, Jung-Oh ;
Mun, Hyung-Jin .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (02) :599-618