Abstract

In the cloud storage environment, the integrity of private data is one of the most concerned issues for users, which has become the focus of cloud storage research. For this kind of problem, the existing schemes usually sacrifice the communication efficiency of users for higher security, which often causes a lot of computing overhead. Therefore, the purpose of this paper is to achieve the coexistence of safety and efficiency, and adopts the ideas of Chinese commercial encryption algorithms SM2 and SM3, proposes a cloud encryption transmission scheme that supports integrity verification, and gives a security analysis under the assumption of discrete logarithm problem on elliptic curve and Diffie-Hellman problem. Finally, the actual test and comparative experiment results show that our scheme can realise the cloud data transmission encryption and cloud storage integrity verification functions at the same time without affecting the performance of the cloud server. Moreover, it can effectively resist all kinds of common attacks, reduce the storage and computing burden of cloud users, and has certain guiding significance for the research of user privacy protection in the cloud environment.

Highlights

  • With the continuous maturity of 5G technology and its in-depth application to the future market (Shahzadi et al, 2019), cloud computing services will grow rapidly in the few years and are undergoing profound changes in the direction of intensification, scale and specialisation

  • When user B wants to download the shared data M′ uploaded by user A, our scheme will uses SM3 and SM2 signature verification algorithms to jointly verify the integrity of data M′, where the SM2 signature verification algorithm uses the public key (PK) and signed results (r′, s′)

  • The security of cloud storage affects the development of cloud computing applications

Read more

Summary

Introduction

With the continuous maturity of 5G technology and its in-depth application to the future market (Shahzadi et al, 2019), cloud computing services will grow rapidly in the few years and are undergoing profound changes in the direction of intensification, scale and specialisation. Jin et al (2019) proposed a secure communication protocol in IoT convergence cloud environment This protocol supports multi-user cipher-text computing and multi-user data sharing, supports fine-grained access control of cipher-text, and can resist collusion attacks. Chen et al (2018) abandoned foreign cryptography technology and developed a cloud storage sharing encryption system based on SM9, SM3 and SM4 algorithms, which effectively improves the security of cloud files. Given the existing cloud storage security researches, there are two main problems: one is that the traditional cloud storage protection mechanism lacks the integrity verification technology for cloud data, and the third party may tamper with the sensitive data of the user to cause privacy disclosure. Based on the idea of SM2 signature algorithm, this paper proposes a cloud encryption transmission scheme that supports integrity verification and designs and implements it.

Chinese commercial cryptographic algorithms
Cloud data encryption transmission
SM3 hash algorithm
Filling
Iteration and expansion
SM2 signature algorithm
The design of our scheme
Data upload process
Security analysis
Confidentiality
Authentication
Integrity
Unforgeability
Forward security
Key size analysis
Calculate cost analysis
Efficiency analysis
Scheme realisation
Test result analysis
Security test and analysis
Correlation analysis
Histogram analysis
Efficiency test and analysis
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call