| In the cloud storage environment,the data owner is not only able to save local storage resources by storing data in the cloud server,but can also share data with other users through the cloud server.However,when data is uploaded to the cloud server,the data owner loses control of the data and has no assurance that the data is stored intact in the cloud server.In order to safeguard the integrity of outsourced data,data integrity auditing technology has emerged.This technology enables the verifier to check the integrity of data without having to download all the data from the cloud server.At the same time,the outsourced data in cloud servers often contains sensitive information such as the name and age of the data owner,which will inevitably be leaked to the cloud server and other users when the data is shared.Therefore,it is of great theoretical value and research significance to investigate how to achieve data integrity checking while protecting sensitive information in outsourced data from being leaked.This paper provides an in-depth study of data integrity auditing schemes to support sensitive information hiding in cloud storage.The details are as follows:(1)Aiming at the issues of sensitive information hiding and data dynamics in data integrity auditing schemes,this paper proposes a certificateless data integrity auditing scheme that supports sensitive information hiding and data dynamics by combining certificateless cryptography with sanitizable signature technology.The proposed scheme introduces a thirdparty sanitizer to sanitize sensitive information in outsourced data and transform the corresponding tags.At the same time,the proposed scheme utilizes the extended double linked list information table to enable data dynamic operations.In addition,the proposed scheme addresses the issues of certificate management and key escrow.Security proof shows that the proposed scheme satisfies unforgeability,auditing soundness,data privacy,and immutability under the random oracle model based on the CDH assumption and the ECDL assumption.Performance analysis indicates that the proposed scheme is efficient and practical compared to known schemes.(2)Aiming at the issues of sensitive information hiding and access control in data integrity auditing schemes,this paper proposes a certificate-based data integrity auditing scheme that supports sensitive information hiding and access control using certificate-based cryptography and elliptic curve cryptography.In this scheme,the data owner shares sensitive information to other users in a controlled manner while achieving sensitive information hiding.In the scheme,users can only access the data in the cloud server after obtaining access authorization from the data owner.At the same time,the proposed scheme avoids certificate management,key escrow,and secure channel issues.Security proof illustrates that the proposed scheme satisfies unforgeability,auditing soundness,and data privacy under the random oracle model based on the ECDL assumptions.Performance analysis demonstrates that the proposed scheme has lower computational and communication costs compared to related schemes. |