Secure Data Sharing in a Cyber-Physical Cloud Environment
Main Article Content
Keywords
cloud computing, data sharing protocol, cyber-physical environment
Abstract
Cloud computing plays a significant role in digital workplaces and has become an integral part of everyday life. However, the security issues associated with cloud computing remain a major concern that hinders the wider adoption of this technology. In a cyber-physical cloud environment, achieving secure and efficient file storage remains a tough goal. This is particularly the case owing to the wide variety of devices that are being utilised to access the various services and data. Thus, the employment of a secure data sharing protocol is one of the essential techniques to better protect the shared data. A formal agreement between entities or organisations in exchanging personal or business data is called a data sharing protocol. A secure data sharing protocol ensures that data is encrypted and secured when being transferred. There are many different encryption algorithms and protocols in use to devise various secure and efficient data sharing protocols. This paper first reviews the state of the art of some existing data sharing protocols and subsequently implements a secure and efficient data sharing protocol as an application in a cyber-physical cloud environment. The performance analysis conducted on the developed secure data sharing protocol application shows positive results.
Downloads
References
De Caro, A., & Iovino, V. (2011). Introduction. JPBC – Java Pairing-Based Cryptography Library. Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Corfu, Greece. http://gas.dia.unisa.it/projects/jpbc/
Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., & Shi, W. (2014). Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Information Sciences, 275, 370–384. https://doi.org/10.1016/j.ins.2014.01.035
Han, S., Han, K., & Zhang, S. (2019). A data sharing protocol to minimize security and privacy risks of cloud storage in big data era. IEEE Access, 7, 60290–60298. https://doi.org/10.1109/ACCESS.2019.2914862
Java Platform, Standard Edition Security Developer’s Guide. (n.d.). Oracle. https://docs.oracle.com/javase/9/security/java-security-overview1.htm#JSSEC-GUID-2EF91196-D468-4D0F-8FDC-DA2BEA165D10
Karati, A., Amin, R., Islam, S. H., & Choo, K.-K. R. (2018). Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment. IEEE Transactions on Cloud Computing, 9(1), 318–330. https://doi.org/10.1109/TCC.2018.2834405
Li, H., Huang, Q., & Susilo, W. (2022). A secure cloud data sharing protocol for enterprise supporting hierarchical keyword search. IEEE Transactions on Dependable and Secure Computing, 19(3), 1532–1543. https://doi.org/10.1109/TDSC.2020.3027611
Lu, X., Pan, Z., & Xian, H. (2020). An efficient and secure data sharing scheme for mobile devices in cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 9, 60. https://doi.org/10.1186/s13677-020-00207-5
Salvi, A. H. (2019). Information and network security with cryptography. International Journal of Research in Electronics and Computer Engineering – a Unit of I2OR, 7(3), 879–883. http://nebula.wsimg.com/8340cc87de92fbce086c7959a2ab45e1?AccessKeyId=DFB1BA3CED7E7997D5B1&disposition=0&alloworigin=1
Shao, J., Lu, R., & Lin, X. (2015). Fine-grained data sharing in cloud computing for mobile devices. 2015 IEEE Conference on Computer Communications (INFOCOM), 2677–2685. https://doi.org/10.1109/INFOCOM.2015.7218659