Computer Science ›› 2026, Vol. 53 ›› Issue (3): 459-468.doi: 10.11896/jsjkx.241200102

• Information Security • Previous Articles    

Efficient Data Sharing Scheme with Integrity Auditing Functions in Cloud Storage

ZHANG Yuhang1, CHANG Jinyong1,2, YANG Luyao1, XU Maozhi3   

  1. 1 School of Information and Control Engineering, Xi’an University of Architecture and Technology, Xi’an 710055, China
    2 State Key Laboratory of ISN, Xidian University, Xi’an 710055, China
    3 School of Mathematic Sciences, Peking University, Beijing 100871, China
  • Received:2024-12-16 Revised:2025-03-10 Published:2026-03-12
  • About author:ZHANG Yuhang,born in 1999,postgraduate,is a member of CCF(No.Y0752G).His main research interests inlcude cryptography and communications.
    CHANG Jinyong,born in 1982,Ph.D,professor.His main research interests include cryptography and information security.
  • Supported by:
    National Natural Science Foundation of China(62476212,62072363),Open Project of State Key Laboratory of Integrated Services Networks(ISN25-02) and Project of Interdisciplinary Cultivation in Xi’an University of Architecture and Technology(X20220088).

Abstract: With the popularity of cloud storage technology,the accompanying security is becoming more and more prominent:cloud servers may lose users’ stored data due to failures or external attacks,while the process of sharing data based on cloud sto-rage may also face the risk of unauthorized access by malicious users.Existing research mostly focuses on the implementation of a single security feature in cloud storage environments.In this paper,secure access control of data sharing process is accomplished on the basis of security audit of cloud storage data integrity.In the process of data integrity auditing,identity-based homomorphic authentication technology is used to generate tags for the stored data,and the user can be informed of the integrity of the stored data by verifying the aggregated tags returned by the cloud server,thus solving the problem of accidental loss of cloud storage data.In the data sharing phase,the hybrid form of attribute-based encryption and symmetric encryption can not only reduce the computation,communication and storage overhead of outsourced data,but also achieve the control of privilege management for unauthorized users,thus solving the problem of balancing high efficiency and privilege management during data sharing.The performance analysis shows that thedesigned system has low computation and communication overheads as well as storage redundancy in both data integrity auditing and sharing processes,which provides new research ideas for secure data storage and efficient sharing in cloud storage environment.

Key words: Cloud storage, Integrity auditing, Data sharing, Attribute-based encryption

CLC Number: 

  • TP391
[1]LYU Z,LOU R,LI J,et al.Big Data Analytics for 6G-enabledMassive Internet of Things[J].IEEE Internet of Things Journal,2021,8(7):5350-5359.
[2]GE C,SUSILO W,LIU Z,et al.Secure Keyword Search and Data Sharing Mechanism for Cloud Computing[J].IEEE Transactions on Dependable and Secure Computing,2021,18(6):2787-2800.
[3]HUANG P,FAN K,YANG H,et al.A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage system[J].IEEE Access,2020,8:94780-94794.
[4]GE C,SUSILO W,BAEK J,et al.Revocable Attribute-BasedEncryption with Data Integrity in Clouds[J].IEEE Transactions on Dependable and Secure Computing,2021,19(5):2864-2872.
[5]SHEN W,YU J,YANG M,et al.Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage[J].IEEE Transactions on Dependable and Secure Computing,2022,20(6):4593-4606.
[6]LIU Z,WANG S,LIU Y.Block-Based Integrity Auditing forShared Data in Storage with File Prediction[J].Computer Networks,2023,236:110040.
[7]DING R,XU Y,ZHONG H,et al.An Efficient Integrity Che-cking Scheme with Full Identity Anonymity for Cloud Data Sharing[J].IEEE Transactions on Cloud Computing,2023,11(3):2922-2935.
[8]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:598-609.
[9]JUELS A,KALISKI B S.PORs:Proofs of Retrievability forLarge Files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:584-597.
[10]WANG C,CHOW S,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
[11]TIAN H,GAN N,PENG F,et al.Smart Contract-Based Public Integrity Auditing for Cloud Storage Against Malicious Auditiors[J].Future Generation Computer Systems.2025,166:107709.
[12]PENG W,LU T,WANG Z,et al.An Efficient Blockchain-Based Framework for File Sharing[J].Scientific Reports,2024,14:18009.
[13]SHEN W,QIN J,YU J,et al.Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage[J].IEEE Transactions on Information Forensics and Security,2018,14(2):331-345.
[14]LIU Z,REN L,LI R,et al,ID-based Sanitizable Signature Data Integrity Auditing Scheme with Privacy-Preserving[J].Compu-ters & Security,2022,121:102858.
[15]SINGH P,SAGAR S,SINGH S,et al.Blockchain-Enabled Verification of Medical Records Using Soul-Bound Tokens and Cloud Computing[J].Scientific Reports,2024,14:24830.
[16]FENG S,DENG L,GAO Y,et al.Blockchain-Based Remote Data Integrity Auditing Scheme with Deduplication Mechanism[J].Cluster Computing-The Journal of Networks Software Tools and Applications,2025,28(1):33-47.
[17]ZHANG X,SU Y,QIN J.A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security[J].Security and Communication Networks,2020,1:1-13.
[18]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2006:89-98.
[19]WATERS B.Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Eealization[C]//International Workshop on Public Key Cryptography.Berlin:Springer,2011:53-70.
[20]LI H,PEI L,LIAO D,et al.FADE:A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain[J].IEEE Access,2020,8:85190-85203.
[21]DUAN X,LI Y,XU Y,et al.An Authentication Scheme with Attribute-Based Encryption for Power Internet of Things[C]//Proceedings of the 2024 3rd International Conference on Networks,Communications and Information Technology.New York:ACM,2024:161-165.
[22]QIAO J,WANG N,FU J,et al.A Lightweight CP-ABE Scheme for EHR Over Cloud Based on Blockchain and Secure Multi-Party Computation[J].Transactions on Emerging Telecommunications Technologies,2025,36:70053.
[23]XIONG H,WANG H,MENG W,et al.Attribute-Based dataSharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System[J].IEEE Transactions on Industrial Informatics,2023,19(11):10977-10986.
[24]GUO Z,WANG G,LI Y,et al.Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network[J].IEEE Internet of Things Journal,2023,10(8):7011-7026.
[25]SONG C,CHEN L,WU X,et al.A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology[J].Sensors.2025,25:160.
[26]ZHANG W X,YAN Y X,WU Y H,et al.Certificateless Sanitizable Signature Scheme in Cloud Storage[J].Computer Systems &Applications,2023,32(1):281-287.
[27]KIM H,JEON Y,KIM G,et al.PIPO:A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations[C]//Information Conference on Information Security & Cryptology.Cham:Springer,2020:99-122.
[1] ZHENG Kaifa, SUN Wei, ZHOU Junxu, WU Yunkun, XU Zhen, LIU Zhiquan , HE Qiang. Weakly-decentralized Scheme for Sensitive Data Sharing with Hierarchical Access Control [J]. Computer Science, 2026, 53(2): 431-441.
[2] LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395.
[3] YANG Ke, GUO Qinglei, SHEN Yiming, BAI Neng, SONG Wenting, WANG Weiyu. Privacy-preserving Cross-certificate System Authentication and Access Control Model for Material Supply Chain [J]. Computer Science, 2025, 52(11A): 250100131-10.
[4] LIU Zhanghui, LIN Zhexu, CHEN Hanlin, MA Xinjian, CHEN Xing. Data Trusted Sharing Scheme Based on Consortium Blockchain [J]. Computer Science, 2025, 52(11): 398-407.
[5] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[6] YUE Meng, ZHU Shibo, HONG Xueting, DUAN Bingyan. Airborne Software Audit Method Based on Trusted Implicit Third Party [J]. Computer Science, 2024, 51(6A): 230400088-6.
[7] LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47.
[8] AN Ruicheng, WANG Huaqun. Proxy Provable Data Possession with Key-exposure Resilient [J]. Computer Science, 2024, 51(12): 310-316.
[9] JIANG Luhan, TIAN Youliang, XIANG Axin. CP-ABE Scheme Supports Fully Policy and Attribute Hidden [J]. Computer Science, 2024, 51(12): 317-325.
[10] ZHOU Yiteng, TANG Xin, JIN Luchao. Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [J]. Computer Science, 2024, 51(12): 352-360.
[11] YAN Li, YIN Tian, LIU Peishun, FENG Hongxin, WANG Gaozhou, ZHANG Wenbin, HU Hailin, PAN Fading. Overview of Attribute-based Searchable Encryption [J]. Computer Science, 2024, 51(11A): 231100137-12.
[12] YUE Meng, WEN Cheng, HONG Xueting, YAN Simin. Airborne Software Provable Data Possession for Cloud Storage [J]. Computer Science, 2024, 51(11A): 240400040-10.
[13] WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370.
[14] WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307.
[15] YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!