Implementing an Advanced and Secure Framework for Data Sharing in Mobile Cloud Platforms

Authors

  • Jeetendra Singh Yadav, Ashish Pandey

Keywords:

Mobile Cloud Computing; Secure Data Sharing; Hybrid Encryption; Data Privacy;

Abstract

Mobile cloud computing enables resource-constrained devices to store and share data via powerful cloud platforms, but it also introduces serious data privacy concerns. This paper proposes an advanced and secure data sharing framework tailored for mobile cloud environments, emphasizing end-to-end encryption and user privacy. The framework integrates symmetric and asymmetric cryptography in a hybrid model: large data are protected with efficient symmetric encryption, while key distribution is secured with elliptic-curve-based public-key encryption. We present a rigorous mathematical formulation of the encryption workflow and implement the scheme in MATLAB to evaluate its performance. Experimental results demonstrate that the proposed framework achieves strong confidentiality guarantees with minimal computational overhead on mobile devices. A 256-bit symmetric cipher (e.g., AES or Blowfish) combined with elliptic curve encryption for key exchange provides robust security, while execution time is significantly improved compared to using asymmetric encryption alone. We also analyze the security of the framework, showing that it withstands cryptographic attacks and preserves data and user privacy. The proposed solution offers a practical balance between security and efficiency, making it suitable for privacy-preserving data sharing in mobile cloud platforms.

Downloads

Download data is not yet available.

References

Limin Zhang, Li Wang, "A hybrid encryption approach for efficient and secure data transmission in IoT devices," Journal of Engineering and Applied Science, vol. 71, article 138, 2024. jeas.springeropen.comjeas.springeropen.com

Bala Anand Muthu et al., "Secured User Authentication and Data Sharing for Mobile Cloud Computing Using 2C-Cubehash and PWCC," Int. J. of Intelligent Systems and Applications in Engineering, vol. 12, no. 4, 2024. ijisae.org

X. Lu et al., "An efficient and secure data sharing scheme for mobile devices in cloud computing," Journal of Cloud Computing, vol. 9, no. 1, 2020. journalofcloudcomputing.springeropen.comjournalofcloudcomputing.springeropen.com

Rui Chen et al., "High-Security Sequence Design for Differential Frequency Hopping Systems," IEEE Trans. on Information Forensics and Security, 2020 (context of hybrid encryption explanation). researchgate.net

S. Singh et al., "Hybrid Cryptography Algorithms for Cloud Data Security," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2018. jeas.springeropen.com

W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. on Information Theory, 1976 (classic paper introducing concept of hybrid encryption).

Darshan D. Rathod, "MATLAB Implementation of AES-256 Encryption," MATLAB Central File Exchange, 2023. (for AES implementation reference in MATLAB). jeas.springeropen.com

NIST FIPS 197, "Advanced Encryption Standard (AES)," 2001.

NIST FIPS 186-4, "Digital Signature Standard (DSS) – includes ECDSA," 2013.

Certicom Research, "SEC 2: Recommended Elliptic Curve Domain Parameters," Standards for Efficient Cryptography, 2010. (Parameters for ECC curves). jeas.springeropen.com

S. Salami et al., "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing," Algorithms, vol. 12, no. 10, 2019. jeas.springeropen.com

William Stallings, Cryptography and Network Security: Principles and Practice, 7th Ed., Pearson, 2017. (for general cryptographic hardness discussions).

Li, J., et al. (2019). Secure data sharing for dynamic groups in the cloud. IEEE Transactions on Cloud Computing, 7(2), 556–568.

Zhang, Y., et al. (2018). Cloud-based secure and privacy-preserving EHR sharing with fine-grained access control. IEEE Transactions on Dependable and Secure Computing, 15(6), 983–995.

Alabdulatif, A., et al. (2019). Privacy-preserving cloud-based healthcare data sharing and analysis: Review and outlook. IEEE Access, 7, 51670–51694.

Wang, L., et al. (2021). A secure fine-grained access control scheme for mobile cloud computing. Journal of Network and Computer Applications, 173, 102870.

Li, H., et al. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131–143.

Saxena, N., et al. (2019). Efficient symmetric key management for secure communications in cloud-enabled Internet of Things. IEEE Internet of Things Journal, 6(1), 257–268.

Dinh, H. C., et al. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.

Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.

Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73.

Wang, C., et al. (2012). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.

Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586–615.

Jiang, Z., et al. (2020). Lightweight fine-grained access control for mobile cloud computing. IEEE Transactions on Services Computing, 13(4), 726–738.

He, D., et al. (2017). Privacy-preserving fine-grained data access control in smart grid. IEEE Transactions on Smart Grid, 8(2), 906–918.

Downloads

Published

24.03.2024

How to Cite

Jeetendra Singh Yadav. (2024). Implementing an Advanced and Secure Framework for Data Sharing in Mobile Cloud Platforms. International Journal of Intelligent Systems and Applications in Engineering, 12(19s), 942 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7818

Issue

Section

Research Article