Verifiable Cloud Data Sharing Scheme That Supports Privacy Protection

ZHANG Xiaojun,LIU Qing,ZHENG Shuang,WANG Xin,XUE Jingting,WANG Shixiong
DOI: https://doi.org/10.19678/j.issn.1000-3428.0065088
2023-01-01
Abstract:With the rapid development of mobile Internet technology,an increasing amount of data is stored on remote cloud servers,thereby increasing the search and sharing of sensitive data in outsourced cloud storage.To cope with these issues,a public-key searchable encryption algorithm is designed based on an elliptic curve and a verifiable data sharing scheme that supports privacy protection in cloud storage systems is proposed. In this scheme,the data sender uses message authentication code technology to generate a ciphertext corresponding to keywords using his/her own private key and the public key of the data receiver. The data receiver also uses message authentication code technology and generates a searchable trapdoor using his/her own private key and the public key of the data sender.In this way,the cloud server can quickly match the ciphertext corresponding to the keywords with a searchable trapdoor,and thus the scheme ensures the confidentiality and searchability of outsourced data. The scheme simultaneously achieves ciphertext and trapdoor indistinguishability when selecting keywords;thus,it can resist internal keyword guessing attacks.In addition,to prevent a cloud server from malicious deception or returning incorrect searchable ciphertexts,this scheme leverages cloud auditing techniques and adds an integrity verification phase for cloud storage ciphertexts.Performance analysis and comparison results show that this scheme only requires 2.17 ms to share cloud encrypted data,and its efficiency is at least 39.98% higher than that of PEKS,PAEKS,dIBAEKS,and CLEKS schemes;hence,it is more conducive to deployment in resource-constrained intelligent terminal devices.
What problem does this paper attempt to address?