ZTE Communications ›› 2026, Vol. 24 ›› Issue (1): 45-55.DOI: 10.12142/ZTECOM.202601007
• Special Topic • Previous Articles Next Articles
Wang Jigang1,2(
), Liu Dong1,2, Wan Changsheng3, Lu Ping1,2
Received:2024-06-26
Online:2026-03-25
Published:2026-03-17
About author:Wang Jigang (wang.jigang@zte.com.cn) is General Manager of the Cybersecurity Product Line at ZTE Corporation. His research interests include operating systems, cybersecurity, and cloud computing. Dr. Wang has participated in and supported a number of national key science and technology projects and national science and technology support programs, and has published multiple academic papers.Supported by:Wang Jigang, Liu Dong, Wan Changsheng, Lu Ping. Efficient and Secure Data Storage in 5G Industrial Internet Collaborative Systems[J]. ZTE Communications, 2026, 24(1): 45-55.
Add to citation manager EndNote|Ris|BibTeX
URL: https://zte.magtechjournal.com/EN/10.12142/ZTECOM.202601007
| Notation | Description |
|---|---|
| The cyclic group, its generator, and prime order | |
| Identities of the data owner and the data user, respectively | |
| Keying materials for | |
| Hash functions | |
| The file to be uploaded and downloaded | |
| The digital signature of | |
| The ciphertext of | |
| Decryption function | |
| The attribute values of the data user | |
| Random number generated by the data owner for authentication | |
| Random numbers generated by the data owner and the data user for authentication, respectively | |
| Key generated by the data owner for encrypting the file | |
| Two sets of public and private keys of the authentication server | |
| Parameters used for mutual authentication between the data owner and the data user | |
| The symmetric encryption function with keys | |
| The session key | |
| Secret and public information of the authentication request message | |
| Public information of the authentication response message | |
| The set of public keying materials |
Table 1 Key notations and definitions in this paper
| Notation | Description |
|---|---|
| The cyclic group, its generator, and prime order | |
| Identities of the data owner and the data user, respectively | |
| Keying materials for | |
| Hash functions | |
| The file to be uploaded and downloaded | |
| The digital signature of | |
| The ciphertext of | |
| Decryption function | |
| The attribute values of the data user | |
| Random number generated by the data owner for authentication | |
| Random numbers generated by the data owner and the data user for authentication, respectively | |
| Key generated by the data owner for encrypting the file | |
| Two sets of public and private keys of the authentication server | |
| Parameters used for mutual authentication between the data owner and the data user | |
| The symmetric encryption function with keys | |
| The session key | |
| Secret and public information of the authentication request message | |
| Public information of the authentication response message | |
| The set of public keying materials |
| 0.5 | 1.8 | 689.3 | 79.5 | 3.8 | 1.4 |
Table 2 Computational costs of basic cryptographic operations (μs)
| 0.5 | 1.8 | 689.3 | 79.5 | 3.8 | 1.4 |
| Metric | Proposed Data Storage Scheme | Ref. [ | Ref. [ |
|---|---|---|---|
Table 3 Comparison of computational costs (ms)
| Metric | Proposed Data Storage Scheme | Ref. [ | Ref. [ |
|---|---|---|---|
| Metric | Proposed Data Storage Scheme | Ref. [ | Ref. [ |
|---|---|---|---|
| Len |
Table 4 Comparison of message lengths (bit)
| Metric | Proposed Data Storage Scheme | Ref. [ | Ref. [ |
|---|---|---|---|
| Len |
| [1] | Gao Y, Chen J J, and Li D P. Intelligence driven wireless networks in B5G and 6G era: a survey [J]. ZTE communications, 2024, 22(3): 99–105. doi: 10.12142/ZTECOM.202403012 . |
| [2] | Wang B Y, Li B C, Li H. Oruta: privacy-preserving public auditing for shared data in the cloud [J]. IEEE transactions on cloud computing, 2014, 2(1): 43–56. DOI: 10.1109/TCC.2014.2299807 |
| [3] | Shen J, Shen J, Chen X F, et al. An efficient public auditing protocol with novel dynamic structure for cloud data [J]. IEEE transactions on information forensics and security, 2017, 12(10): 2402–2415. DOI: 10.1109/TIFS.2017.2705620 |
| [4] | Jin H, Jiang H, Zhou K. Dynamic and public auditing with fair arbitration for cloud data [J]. IEEE transactions on cloud computing, 2018, 6(3): 680–693. DOI: 10.1109/TCC.2016.2525998 |
| [5] | Wang C, Wang Q, Ren K, et al. Privacy-preserving public auditing for data storage security in cloud computing [C]//Proc. IEEE INFOCOM. IEEE, 2010: 1–9. DOI: 10.1109/INFCOM.2010.5462173 |
| [6] | Yang P, Xiong N X, Ren J L. Data security and privacy protection for cloud storage: a survey [J]. IEEE access, 2020, 8: 131723–131740. DOI: 10.1109/ACCESS.2020.3009876 |
| [7] | Xu H, Sun B, Ding J W, et al. Analysis of feasible solutions for railway 5G network security assessment [J]. ZTE communications, 2025, 23(3): 59–70. doi: 10.12142/ZTECOM.202503007 . |
| [8] | Lee K. Comments on “secure data sharing in cloud computing using revocable-storage identity-based encryption” [J]. IEEE transactions on cloud computing, 2020, 8(4): 1299-1300. DOI: 10.1109/TCC.2020.2973623 |
| [9] | Xu S M, Yang G M, Mu Y. Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation [J]. Information sciences, 2019, 479: 116–134. DOI: 10.1016/j.ins.2018.11.031 |
| [10] | Xiong H, Zhao Y N, Peng L, et al. Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing [J]. Future generation computer systems, 2019, 97: 453–461. DOI: 10.1016/j.future.2019.03.008 |
| [11] | Wei J H, Chen X F, Huang X Y, et al. RS-HABE: revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud [J]. IEEE transactions on dependable and secure computing, 2021, 18(5): 2301–2315. DOI: 10.1109/TDSC.2019.2947920 |
| [12] | Li J Q, Wang S L, Li Y, et al. An efficient attribute-based encryption scheme with policy update and file update in cloud computing [J]. IEEE transactions on industrial informatics, 2019, 15(12): 6500–6509. DOI: 10.1109/TII.2019.2931156 |
| [13] | Zhang L Y, Cui Y L, Mu Y. Improving security and privacy attribute based data sharing in cloud computing [J]. IEEE systems journal, 2020, 14(1): 387–397. DOI: 10.1109/JSYST.2019.2911391 |
| [14] | Almutairi S, Alghanmi N, Mostafa M. Survey of centralized and decentralized access control models in cloud computing [J]. International journal of advanced computer science and applications, 2021, 12(2): 1–8. DOI: 10.14569/IJACSA.2021.0120243 |
| [15] | Li J G, Chen N Y, Zhang Y C. Extended file hierarchy access control scheme with attribute-based encryption in cloud computing [J]. IEEE transactions on emerging topics in computing, 2021, 9(2): 983–993. DOI: 10.1109/TETC.2019.2904637 |
| [16] | Ghaffar Z, Ahmed S, Mahmood K, et al. An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems [J]. IEEE access, 2020, 8: 47144–47160. DOI: 10.1109/ACCESS.2020.2977264 |
| [17] | Liu T L, Wu J G, Li J X, et al. Efficient decentralized access control for secure data sharing in cloud computing [J]. Concurrency and computation: practice and experience, 2023, 35(17): e6383. DOI: 10.1002/cpe.6383 |
| [18] | Begum B R, Chitra P. SEEDDUP: a three-tier secure data deduplication architecture-based storage and retrieval for cross-domains over cloud [J]. IETE journal of research, 2023, 69(4): 2224–2241. DOI: 10.1080/03772063.2021.1886882 |
| [19] | Gao X, Yu J, Shen W T, et al. Achieving low-entropy secure cloud data auditing with file and authenticator deduplication [J]. Information sciences, 2021, 546: 177–191. DOI: 10.1016/j.ins.2020.08.021 |
| [20] | Shen W T, Su Y, Hao R. Lightweight cloud storage auditing with deduplication supporting strong privacy protection [J]. IEEE access, 2020, 8: 44359–44372. DOI: 10.1109/ACCESS.2020.2977721 |
| [21] | Premkamal P K, Pasupuleti S K, Singh A K, et al. Enhanced attribute based access control with secure deduplication for big data storage in cloud [J]. Peer-to-peer networking and applications, 2021, 14(1): 102–120. DOI: 10.1007/s12083-020-00940-3 |
| [22] | Cui H, Deng R H, Li Y J, et al. Attribute-based storage supporting secure deduplication of encrypted data in cloud [J]. IEEE transactions on big data, 2019, 5(3): 330–342. DOI: 10.1109/TBDATA.2017.2656120 |
| [23] | OpenSSL.org. OpenSSL-1.0.1e.tar.gz [EB/OL]. [2023-10-20]. |
| [24] | Lynn B. PBC library manual 0.5.11.2006 [EB/OL]. [2023-10-20]. |
| [1] | CHEN Yan, WEN Xitao, LENG Xue, YANG Bo, Li Erran Li, ZHENG Peng, HU Chengchen. Optimization Framework for Minimizing Rule Update Latency in SDN Switches [J]. ZTE Communications, 2018, 16(4): 15-29. |
| [2] | Qinghua Shen, Xuemin (Sherman) Shen, Tom H. Luan, and Jing Liu. MAC Layer Resource Allocation forWireless Body Area Networks [J]. ZTE Communications, 2014, 12(3): 13-21. |
| [3] | Aiqun Hu, Tao Li, and Mingfu Xue. Security Service Technology for Mobile Networks [J]. ZTE Communications, 2011, 9(3): 49-54. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||