You can view the full text of this article for free using the link below.

Title: Design and implementation of a cloud encryption transmission scheme supporting integrity verification

Authors: Zengyu Cai; Zuodong Wu; Jianwei Zhang; Wenqian Wang

Addresses: School of Computer and Communication College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China ' Software College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China ' Software College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China; Henan Key Laboratory of Food Safety Data Intelligence, Zhengzhou, 450002, China ' School of Computer and Communication College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China

Abstract: In the cloud storage environment, the integrity of private data is one of the most concerned issues for users, which has become the focus of cloud storage research. For this kind of problem, the existing schemes usually sacrifice the communication efficiency of users for higher security, which often causes a lot of computing overhead. Therefore, the purpose of this paper is to achieve the coexistence of safety and efficiency, and adopts the ideas of Chinese commercial encryption algorithms SM2 and SM3, proposes a cloud encryption transmission scheme that supports integrity verification, and gives a security analysis under the assumption of discrete logarithm problem on elliptic curve and Diffie-Hellman problem. Finally, the actual test and comparative experiment results show that our scheme can realise the cloud data transmission encryption and cloud storage integrity verification functions at the same time without affecting the performance of the cloud server. Moreover, it can effectively resist all kinds of common attacks, reduce the storage and computing burden of cloud users, and has certain guiding significance for the research of user privacy protection in the cloud environment.

Keywords: cloud storage; Chinese commercial encryption algorithms; SM2; SM3; discrete logarithm; Diffie-Hellman; elliptic curve; cloud data transmission encryption; integrity verification; privacy protection.

DOI: 10.1504/IJES.2021.116108

International Journal of Embedded Systems, 2021 Vol.14 No.3, pp.218 - 228

Received: 25 Jan 2020
Accepted: 06 Apr 2020

Published online: 12 Jul 2021 *

Full-text access for editors Full-text access for subscribers Free access Comment on this article