Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2023, Vol. 49 ›› Issue (3): 49-57. doi: 10.19678/j.issn.1000-3428.0065088

• Research Hotspots and Reviews • Previous Articles     Next Articles

Verifiable Cloud Data Sharing Scheme that Supports Privacy Protection

ZHANG Xiaojun1, LIU Qing1, ZHENG Shuang1, WANG Xin1, XUE Jingting1, WANG Shixiong2   

  1. 1. Research Center for Cyber Security, School of Computer Science, Southwest Petroleum University, Chengdu 610500, China;
    2. Academy of Military Sciences, Beijing 100091, China
  • Received:2022-06-27 Revised:2022-09-29 Published:2022-11-14

支持隐私保护的可验证云端数据分享方案

张晓均1, 刘庆1, 郑爽1, 王鑫1, 薛婧婷1, 王世雄2   

  1. 1. 西南石油大学 计算机科学学院 网络空间安全研究中心, 成都 610500;
    2. 军事科学院, 北京 100091
  • 作者简介:张晓均(1985—),男,副教授,主研方向为密码学、信息安全;刘庆、郑爽、王鑫,硕士研究生;薛婧婷,讲师、博士;王世雄(通信作者),助理研究员、博士。
  • 基金资助:
    国家自然科学基金(61902327,62102440);中国博士后科学基金(2020M681316);成都市科技局项目(2021-YF05-00965-SN);西南石油大学研究生教研教改项目(JY20ZD06)。

Abstract: With the rapid development of mobile Internet technology, an increasing amount of data is stored on remote cloud servers, thereby increasing the search and sharing of sensitive data in outsourced cloud storage.To cope with these issues, a public-key searchable encryption algorithm is designed based on an elliptic curve and a verifiable data sharing scheme that supports privacy protection in cloud storage systems is proposed.In this scheme, the data sender uses message authentication code technology to generate a ciphertext corresponding to keywords using his/her own private key and the public key of the data receiver.The data receiver also uses message authentication code technology and generates a searchable trapdoor using his/her own private key and the public key of the data sender.In this way, the cloud server can quickly match the ciphertext corresponding to the keywords with a searchable trapdoor, and thus the scheme ensures the confidentiality and searchability of outsourced data.The scheme simultaneously achieves ciphertext and trapdoor indistinguishability when selecting keywords;thus, it can resist internal keyword guessing attacks.In addition, to prevent a cloud server from malicious deception or returning incorrect searchable ciphertexts, this scheme leverages cloud auditing techniques and adds an integrity verification phase for cloud storage ciphertexts.Performance analysis and comparison results show that this scheme only requires 2.17 ms to share cloud encrypted data, and its efficiency is at least 39.98% higher than that of PEKS, PAEKS, dIBAEKS, and CLEKS schemes;hence, it is more conducive to deployment in resource-constrained intelligent terminal devices.

Key words: cloud storage, privacy protection, data sharing, searchable encryption, integrity verification

摘要: 随着移动互联网技术的飞速发展,海量数据将存储在远程云服务器,由此带来外包云存储敏感数据的搜索与安全共享问题。基于椭圆曲线设计公钥可搜索加密算法,提出云存储系统中支持隐私保护的可验证数据分享方案。在该方案中,数据发送方结合消息认证码技术,使用自己的私钥和数据接收方的公钥产生关键词对应的密文,数据接收方结合消息认证码技术,使用自己的私钥和数据发送方的公钥产生搜索陷门,从而云服务器可以对关键词密文和搜索陷门进行快速匹配测试。该方案可保证云端存储数据的机密性,实现对外包云存储数据的可搜索功能,并在选择关键词攻击下满足密文不可区分性与搜索陷门不可区分性,抵抗内部关键词猜测攻击。此外,为防止云服务器出现恶意欺骗或返回不正确的搜索密文行为,引入云审计的设计思想,对存储在云端的密文数据进行完整性验证。性能分析与比较结果表明,该方案云端加密数据分享过程耗时仅为2.17 ms,与PEKS、PAEKS、dIBAEKS、CLEKS方案相比效率提升39.98%以上,更有利于部署在资源受限的智能终端设备。

关键词: 云存储, 隐私保护, 数据分享, 可搜索加密, 完整性验证

CLC Number: