Implementing an Advanced and Secure Framework for Data Sharing in Mobile Cloud Platforms
Keywords:
Mobile Cloud Computing; Secure Data Sharing; Hybrid Encryption; Data Privacy;Abstract
Mobile cloud computing enables resource-constrained devices to store and share data via powerful cloud platforms, but it also introduces serious data privacy concerns. This paper proposes an advanced and secure data sharing framework tailored for mobile cloud environments, emphasizing end-to-end encryption and user privacy. The framework integrates symmetric and asymmetric cryptography in a hybrid model: large data are protected with efficient symmetric encryption, while key distribution is secured with elliptic-curve-based public-key encryption. We present a rigorous mathematical formulation of the encryption workflow and implement the scheme in MATLAB to evaluate its performance. Experimental results demonstrate that the proposed framework achieves strong confidentiality guarantees with minimal computational overhead on mobile devices. A 256-bit symmetric cipher (e.g., AES or Blowfish) combined with elliptic curve encryption for key exchange provides robust security, while execution time is significantly improved compared to using asymmetric encryption alone. We also analyze the security of the framework, showing that it withstands cryptographic attacks and preserves data and user privacy. The proposed solution offers a practical balance between security and efficiency, making it suitable for privacy-preserving data sharing in mobile cloud platforms.
Downloads
References
Limin Zhang, Li Wang, "A hybrid encryption approach for efficient and secure data transmission in IoT devices," Journal of Engineering and Applied Science, vol. 71, article 138, 2024. jeas.springeropen.comjeas.springeropen.com
Bala Anand Muthu et al., "Secured User Authentication and Data Sharing for Mobile Cloud Computing Using 2C-Cubehash and PWCC," Int. J. of Intelligent Systems and Applications in Engineering, vol. 12, no. 4, 2024. ijisae.org
X. Lu et al., "An efficient and secure data sharing scheme for mobile devices in cloud computing," Journal of Cloud Computing, vol. 9, no. 1, 2020. journalofcloudcomputing.springeropen.comjournalofcloudcomputing.springeropen.com
Rui Chen et al., "High-Security Sequence Design for Differential Frequency Hopping Systems," IEEE Trans. on Information Forensics and Security, 2020 (context of hybrid encryption explanation). researchgate.net
S. Singh et al., "Hybrid Cryptography Algorithms for Cloud Data Security," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2018. jeas.springeropen.com
W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. on Information Theory, 1976 (classic paper introducing concept of hybrid encryption).
Darshan D. Rathod, "MATLAB Implementation of AES-256 Encryption," MATLAB Central File Exchange, 2023. (for AES implementation reference in MATLAB). jeas.springeropen.com
NIST FIPS 197, "Advanced Encryption Standard (AES)," 2001.
NIST FIPS 186-4, "Digital Signature Standard (DSS) – includes ECDSA," 2013.
Certicom Research, "SEC 2: Recommended Elliptic Curve Domain Parameters," Standards for Efficient Cryptography, 2010. (Parameters for ECC curves). jeas.springeropen.com
S. Salami et al., "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing," Algorithms, vol. 12, no. 10, 2019. jeas.springeropen.com
William Stallings, Cryptography and Network Security: Principles and Practice, 7th Ed., Pearson, 2017. (for general cryptographic hardness discussions).
Li, J., et al. (2019). Secure data sharing for dynamic groups in the cloud. IEEE Transactions on Cloud Computing, 7(2), 556–568.
Zhang, Y., et al. (2018). Cloud-based secure and privacy-preserving EHR sharing with fine-grained access control. IEEE Transactions on Dependable and Secure Computing, 15(6), 983–995.
Alabdulatif, A., et al. (2019). Privacy-preserving cloud-based healthcare data sharing and analysis: Review and outlook. IEEE Access, 7, 51670–51694.
Wang, L., et al. (2021). A secure fine-grained access control scheme for mobile cloud computing. Journal of Network and Computer Applications, 173, 102870.
Li, H., et al. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131–143.
Saxena, N., et al. (2019). Efficient symmetric key management for secure communications in cloud-enabled Internet of Things. IEEE Internet of Things Journal, 6(1), 257–268.
Dinh, H. C., et al. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.
Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73.
Wang, C., et al. (2012). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586–615.
Jiang, Z., et al. (2020). Lightweight fine-grained access control for mobile cloud computing. IEEE Transactions on Services Computing, 13(4), 726–738.
He, D., et al. (2017). Privacy-preserving fine-grained data access control in smart grid. IEEE Transactions on Smart Grid, 8(2), 906–918.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.