Abstract
In the cloud storage environment, the integrity of private data is one of the most concerned issues for users, which has become the focus of cloud storage research. For this kind of problem, the existing schemes usually sacrifice the communication efficiency of users for higher security, which often causes a lot of computing overhead. Therefore, the purpose of this paper is to achieve the coexistence of safety and efficiency, and adopts the ideas of Chinese commercial encryption algorithms SM2 and SM3, proposes a cloud encryption transmission scheme that supports integrity verification, and gives a security analysis under the assumption of discrete logarithm problem on elliptic curve and Diffie-Hellman problem. Finally, the actual test and comparative experiment results show that our scheme can realise the cloud data transmission encryption and cloud storage integrity verification functions at the same time without affecting the performance of the cloud server. Moreover, it can effectively resist all kinds of common attacks, reduce the storage and computing burden of cloud users, and has certain guiding significance for the research of user privacy protection in the cloud environment.
Highlights
With the continuous maturity of 5G technology and its in-depth application to the future market (Shahzadi et al, 2019), cloud computing services will grow rapidly in the few years and are undergoing profound changes in the direction of intensification, scale and specialisation
When user B wants to download the shared data M′ uploaded by user A, our scheme will uses SM3 and SM2 signature verification algorithms to jointly verify the integrity of data M′, where the SM2 signature verification algorithm uses the public key (PK) and signed results (r′, s′)
The security of cloud storage affects the development of cloud computing applications
Summary
With the continuous maturity of 5G technology and its in-depth application to the future market (Shahzadi et al, 2019), cloud computing services will grow rapidly in the few years and are undergoing profound changes in the direction of intensification, scale and specialisation. Jin et al (2019) proposed a secure communication protocol in IoT convergence cloud environment This protocol supports multi-user cipher-text computing and multi-user data sharing, supports fine-grained access control of cipher-text, and can resist collusion attacks. Chen et al (2018) abandoned foreign cryptography technology and developed a cloud storage sharing encryption system based on SM9, SM3 and SM4 algorithms, which effectively improves the security of cloud files. Given the existing cloud storage security researches, there are two main problems: one is that the traditional cloud storage protection mechanism lacks the integrity verification technology for cloud data, and the third party may tamper with the sensitive data of the user to cause privacy disclosure. Based on the idea of SM2 signature algorithm, this paper proposes a cloud encryption transmission scheme that supports integrity verification and designs and implements it.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have