Title: An identity-based integrity verification scheme for cloud storage in 5G environment

Authors: Zuodong Wu; Jianwei Zhang; Zengyu Cai

Addresses: Software College, Zhengzhou University of Light Industry, Zhengzhou, Henan, China; School of Computer and Communication Engineering, Henan Key Laboratory of Food Safety Data Intelligence, Zhengzhou 450002, China ' Software College, Zhengzhou University of Light Industry, Zhengzhou, Henan, China; School of Computer and Communication Engineering, Henan Key Laboratory of Food Safety Data Intelligence, Zhengzhou 450002, China ' Software College, Zhengzhou University of Light Industry, Zhengzhou, Henan, China; School of Computer and Communication Engineering, Henan Key Laboratory of Food Safety Data Intelligence, Zhengzhou 450002, China

Abstract: In order to solve the security problems such as leakage, tampering of sensitive data in cloud storage, the previous schemes usually sacrificed communication efficiency for higher security, which caused serious computing overhead. Therefore, in this paper, we adopt the idea of Chinese Commercial Cryptographic SM9 and SM3 algorithm, and regard user identity identification as interference factor and verification mechanism, so as to propose an identity-based integrity verification scheme for cloud storage. Furthermore, we also give the security analysis under the assumption of Diffie-Hellman and discrete logarithm problem on elliptic curve. Finally, simulation results show that our scheme can not only verify the integrity of sensitive data correctly, but also resist common malicious attacks. Especially in terms of efficiency, our scheme can effectively reduce the storage and computing burden, space and time cost. This will have a certain guiding significance for the privacy protection of cloud storage in 5G environment.

Keywords: cloud storage; Chinese commercial cryptographic; SM9; SM3; identification; Diffie-Hellman; discrete logarithm; integrity; privacy protection; 5G.

DOI: 10.1504/IJCAT.2020.111610

International Journal of Computer Applications in Technology, 2020 Vol.64 No.2, pp.168 - 177

Received: 23 May 2020
Accepted: 18 Jun 2020

Published online: 03 Dec 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article