Skip to main content

A Security Data Sharing Model for Cloud Network

  • Conference paper
  • First Online:
Data Mining and Big Data (DMBD 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1454))

Included in the following conference series:

  • 951 Accesses

Abstract

With the continuous development and wide application of cloud computing technology, its security threats are also increasing, especially in data security sharing and user privacy security protection. Therefore, it is very necessary to establish a security and reliable data sharing model. Combined with blockchain technology, this paper proposes a security data sharing model for cloud network. Blockchain has the characteristics of non-forgery and traceability. By storing the user identity information into the blockchain, not only the authentication efficiency of the user identity can be improved, but also the security of the data sharing system can be improved. At the same time, bilinear mapping and attribute signature technology are used to realize mutual authentication among different entities in domains, secure data sharing and secure interoperability among domains are protected. In addition, the sharing model has the characteristics of low network delay, supporting massive data access and elastic infrastructure. After proof and analysis, the scheme has better security and performance than other references.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guan, Z., Liu, X., Wu, L., et al.: Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Journal 514, 523–540 (2020)

    Google Scholar 

  2. Wang, W., Deng, Z., Wang, J., et al.: Securing cryptographic chips against scan-based attacks in wireless sensor network applications. Journal 19(20), 4598 (2019)

    Google Scholar 

  3. Simeone, A., Caggiano, A., Boun, L., et al.: Intelligent cloud manufacturing platform for efficient resource sharing in smart manufacturing networks. Journal 79, 233–238 (2019)

    Google Scholar 

  4. Lu, Y., Huang, X., Dai, Y., et al.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. Journal 16(6), 4177–4186 (2019)

    Google Scholar 

  5. Zhang, Q., Zhao, K., Kuang, X., et al.: Multidomain security authentication for the Internet of things. Journal 2020(5), e5777 (2020)

    Google Scholar 

  6. Liu, X., Luo, Y., Yang, X.: Traceable attribute-based secure data sharing with hidden policies in mobile health networks. Journal 2020(5), 1–12 (2020)

    Google Scholar 

  7. Xue, Y., Xue, K., Gai, N., et al.: An attribute-based controlled collaborative access control scheme for public cloud storage. Journal 14(11), 2927–2942 (2019)

    Google Scholar 

  8. Salonikias, S., Gouglidis, A., Mavridis, I., Gritzalis, D.: Access control in the industrial Internet of Things. In: Alcaraz, C. (ed.) Security and Privacy Trends in the Industrial Internet of Things. ASTSA, pp. 95–114. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12330-7_5

    Chapter  Google Scholar 

  9. Li, B., Huang, D., Wang, Z., et al.: Attribute-based access control for ICN naming scheme. Journal 15(2), 194–206 (2018)

    Google Scholar 

  10. Huang, H., Zhu, P., Xiao, F., et al.: A Blockchain-based scheme for privacy-preserving and secure sharing of medical data. Journal 99, 102010 (2020)

    Google Scholar 

  11. Chi, J., Li, Y., Huang, J., et al.: A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. Journal 167, 102710 (2020)

    Google Scholar 

  12. Zhang, Q., Li, Y., Wang, R., et al.: Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things. Journal 36(1), 94–111 (2021)

    Google Scholar 

  13. Guo, S., Hu, X., Guo, S., et al.: Blockchain meets edge computing: a distributed and trusted authentication system. Journal 16(3), 1972–1983 (2019)

    Google Scholar 

  14. Wang, J., Wu, L., Choo, K., et al.: Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. Journal 16(3), 1984–11992 (2019)

    Google Scholar 

  15. Cheng, Y., Lei, M., Chen, S., et al.: IoT security access authentication method based on blockchain. In: International Conference on Advanced Hybrid Information Processing, pp. 229−238. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36405-2_24

  16. Zhong, H., Zhu, W., Xu, Y., Cui, J.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft. Comput. 22(1), 243–251 (2016). https://doi.org/10.1007/s00500-016-2330-8

    Article  MATH  Google Scholar 

  17. Lara, E., Aguilar, L., Sanchez, M., et al.: Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial internet of things. Journal 20(2), 501 (2020)

    Google Scholar 

  18. Caviglione, L., Podolski, M., Mazurczyk, W., et al.: Covert channels in personal cloud storage services: the case of dropbox. Journal 13(4), 1921–1931 (2016)

    MathSciNet  Google Scholar 

  19. Zhang, Q., Li, Y., Zhang, Q., et al.: A self-certified cross-cluster asymmetric group key agreement for wireless sensor networks. Journal 28(2), 280–287 (2019)

    Google Scholar 

  20. Li, Y., Wang, Y., Wang, Y., et al.: A feature-vector generative adversarial network for evading PDF malware classifiers. Journal 523, 38–48 (2020)

    Google Scholar 

  21. Zhang, P., Durresi, M., Durresi, A.: Internet network location privacy protection with multi-access edge computing. Computing 103(3), 473–490 (2020). https://doi.org/10.1007/s00607-020-00860-3

    Article  MathSciNet  Google Scholar 

  22. Mishra, D., Dharminder, D., Yadav, P., et al.: A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party. Journal 55, 102648 (2020)

    Google Scholar 

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China under Grant No. 61772477, and the key technologies R & D Program of Henan Province (No.212102210089, 212102210171, 212102210075), the Natural Science Foundation of Chongqing (Grant No. cstc2020jcyj-msxmX0778), the Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No. KJQN201900608).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, K., Zhang, Q., Wu, Y., Zhu, L., Zhu, H., Wang, R. (2021). A Security Data Sharing Model for Cloud Network. In: Tan, Y., Shi, Y., Zomaya, A., Yan, H., Cai, J. (eds) Data Mining and Big Data. DMBD 2021. Communications in Computer and Information Science, vol 1454. Springer, Singapore. https://doi.org/10.1007/978-981-16-7502-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-7502-7_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-7501-0

  • Online ISBN: 978-981-16-7502-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics