Algorithm Substitution-Resistant SM9-Based Searchable Encryption With Cryptographic Reverse Firewall for Cloud Storage

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING
Gaimei Gao, Mingbo Duan, Yaling Xun, Chunxia Liu, Weichao Dang
{"title":"Algorithm Substitution-Resistant SM9-Based Searchable Encryption With Cryptographic Reverse Firewall for Cloud Storage","authors":"Gaimei Gao,&nbsp;Mingbo Duan,&nbsp;Yaling Xun,&nbsp;Chunxia Liu,&nbsp;Weichao Dang","doi":"10.1002/cpe.70073","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>To protect data privacy in cloud storage, sensitive data is commonly encrypted before being uploaded to a cloud storage server (CSS). This process challenges secure and efficient ciphertext retrieval. Identity-based encryption with keyword search (IBEKS) enables secure ciphertext retrieval but remains vulnerable to internal adversary attacks, particularly algorithm substitution attacks (ASA) in SM9-based searchable encryption schemes. Additionally, existing protocols lack proactive defense mechanisms, making them vulnerable to insider threats that compromise system integrity. To address these challenges, this article proposes SM9-based Searchable Encryption with Cryptographic Reverse Firewall (SM9SE-CRF), a novel scheme designed to resist internal attacks while ensuring efficient ciphertext retrieval. Initially, a re-randomizable IBEKS framework is developed as the foundation for constructing the SM9 searchable encryption scheme, enhancing both security and performance. Furthermore, Cryptographic reverse firewalls are deployed at both the Key Generation Center (KGC) and user ends, which dynamically re-randomize cryptographic parameters to mitigate risks posed by internal adversaries. The SM9SE-CRF scheme is implemented using the JPBC library and evaluated through comprehensive security and performance analyses. Results demonstrate that SM9SE-CRF effectively mitigates offline keyword guessing attacks and ASA threats from malicious insiders. Performance evaluations reveal that at a 128-bit security level, SM9SE-CRF achieves a 93% reduction in runtime compared to existing schemes, with the cryptographic reverse firewall adding merely 1.16% overhead. This minimal computational cost highlights the practical applicability of SM9SE-CRF in privacy-preserving cloud storage systems, particularly in enterprise data sharing, secure outsourced storage, and cloud-based information retrieval applications.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70073","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

Abstract

To protect data privacy in cloud storage, sensitive data is commonly encrypted before being uploaded to a cloud storage server (CSS). This process challenges secure and efficient ciphertext retrieval. Identity-based encryption with keyword search (IBEKS) enables secure ciphertext retrieval but remains vulnerable to internal adversary attacks, particularly algorithm substitution attacks (ASA) in SM9-based searchable encryption schemes. Additionally, existing protocols lack proactive defense mechanisms, making them vulnerable to insider threats that compromise system integrity. To address these challenges, this article proposes SM9-based Searchable Encryption with Cryptographic Reverse Firewall (SM9SE-CRF), a novel scheme designed to resist internal attacks while ensuring efficient ciphertext retrieval. Initially, a re-randomizable IBEKS framework is developed as the foundation for constructing the SM9 searchable encryption scheme, enhancing both security and performance. Furthermore, Cryptographic reverse firewalls are deployed at both the Key Generation Center (KGC) and user ends, which dynamically re-randomize cryptographic parameters to mitigate risks posed by internal adversaries. The SM9SE-CRF scheme is implemented using the JPBC library and evaluated through comprehensive security and performance analyses. Results demonstrate that SM9SE-CRF effectively mitigates offline keyword guessing attacks and ASA threats from malicious insiders. Performance evaluations reveal that at a 128-bit security level, SM9SE-CRF achieves a 93% reduction in runtime compared to existing schemes, with the cryptographic reverse firewall adding merely 1.16% overhead. This minimal computational cost highlights the practical applicability of SM9SE-CRF in privacy-preserving cloud storage systems, particularly in enterprise data sharing, secure outsourced storage, and cloud-based information retrieval applications.

基于算法抗替换sm9的云存储可搜索加密与加密反向防火墙
为了保护云存储中的数据隐私,敏感数据在上传到云存储服务器(CSS)之前通常都要进行加密。这一过程对安全高效的密文检索提出了挑战。具有关键字搜索功能的基于身份的加密(IBEKS)可实现安全的密文检索,但仍然容易受到内部对手的攻击,特别是基于 SM9 的可搜索加密方案中的算法替换攻击(ASA)。此外,现有协议缺乏主动防御机制,容易受到内部威胁的影响,从而破坏系统的完整性。为了应对这些挑战,本文提出了基于 SM9 的可搜索加密与加密反向防火墙(SM9SE-CRF),这是一种新型方案,旨在抵御内部攻击,同时确保高效的密文检索。首先,开发了一个可重新随机化的 IBEKS 框架,作为构建 SM9 可搜索加密方案的基础,从而提高了安全性和性能。此外,还在密钥生成中心(KGC)和用户端部署了加密反向防火墙,动态重新随机化加密参数,以降低内部对手带来的风险。SM9SE-CRF 方案是利用 JPBC 库实现的,并通过全面的安全性和性能分析进行了评估。结果表明,SM9SE-CRF 能有效缓解离线关键字猜测攻击和来自恶意内部人员的 ASA 威胁。性能评估显示,在 128 位安全级别下,SM9SE-CRF 的运行时间比现有方案减少了 93%,加密反向防火墙仅增加了 1.16% 的开销。这种最小的计算成本凸显了SM9SE-CRF在保护隐私的云存储系统中的实际应用性,特别是在企业数据共享、安全外包存储和基于云的信息检索应用中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Concurrency and Computation-Practice & Experience
Concurrency and Computation-Practice & Experience 工程技术-计算机:理论方法
CiteScore
5.00
自引率
10.00%
发文量
664
审稿时长
9.6 months
期刊介绍: Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of: Parallel and distributed computing; High-performance computing; Computational and data science; Artificial intelligence and machine learning; Big data applications, algorithms, and systems; Network science; Ontologies and semantics; Security and privacy; Cloud/edge/fog computing; Green computing; and Quantum computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信