Abstract
With the continuous development and wide application of cloud computing technology, its security threats are also increasing, especially in data security sharing and user privacy security protection. Therefore, it is very necessary to establish a security and reliable data sharing model. Combined with blockchain technology, this paper proposes a security data sharing model for cloud network. Blockchain has the characteristics of non-forgery and traceability. By storing the user identity information into the blockchain, not only the authentication efficiency of the user identity can be improved, but also the security of the data sharing system can be improved. At the same time, bilinear mapping and attribute signature technology are used to realize mutual authentication among different entities in domains, secure data sharing and secure interoperability among domains are protected. In addition, the sharing model has the characteristics of low network delay, supporting massive data access and elastic infrastructure. After proof and analysis, the scheme has better security and performance than other references.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guan, Z., Liu, X., Wu, L., et al.: Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Journal 514, 523–540 (2020)
Wang, W., Deng, Z., Wang, J., et al.: Securing cryptographic chips against scan-based attacks in wireless sensor network applications. Journal 19(20), 4598 (2019)
Simeone, A., Caggiano, A., Boun, L., et al.: Intelligent cloud manufacturing platform for efficient resource sharing in smart manufacturing networks. Journal 79, 233–238 (2019)
Lu, Y., Huang, X., Dai, Y., et al.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. Journal 16(6), 4177–4186 (2019)
Zhang, Q., Zhao, K., Kuang, X., et al.: Multidomain security authentication for the Internet of things. Journal 2020(5), e5777 (2020)
Liu, X., Luo, Y., Yang, X.: Traceable attribute-based secure data sharing with hidden policies in mobile health networks. Journal 2020(5), 1–12 (2020)
Xue, Y., Xue, K., Gai, N., et al.: An attribute-based controlled collaborative access control scheme for public cloud storage. Journal 14(11), 2927–2942 (2019)
Salonikias, S., Gouglidis, A., Mavridis, I., Gritzalis, D.: Access control in the industrial Internet of Things. In: Alcaraz, C. (ed.) Security and Privacy Trends in the Industrial Internet of Things. ASTSA, pp. 95–114. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12330-7_5
Li, B., Huang, D., Wang, Z., et al.: Attribute-based access control for ICN naming scheme. Journal 15(2), 194–206 (2018)
Huang, H., Zhu, P., Xiao, F., et al.: A Blockchain-based scheme for privacy-preserving and secure sharing of medical data. Journal 99, 102010 (2020)
Chi, J., Li, Y., Huang, J., et al.: A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. Journal 167, 102710 (2020)
Zhang, Q., Li, Y., Wang, R., et al.: Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things. Journal 36(1), 94–111 (2021)
Guo, S., Hu, X., Guo, S., et al.: Blockchain meets edge computing: a distributed and trusted authentication system. Journal 16(3), 1972–1983 (2019)
Wang, J., Wu, L., Choo, K., et al.: Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. Journal 16(3), 1984–11992 (2019)
Cheng, Y., Lei, M., Chen, S., et al.: IoT security access authentication method based on blockchain. In: International Conference on Advanced Hybrid Information Processing, pp. 229−238. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36405-2_24
Zhong, H., Zhu, W., Xu, Y., Cui, J.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft. Comput. 22(1), 243–251 (2016). https://doi.org/10.1007/s00500-016-2330-8
Lara, E., Aguilar, L., Sanchez, M., et al.: Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial internet of things. Journal 20(2), 501 (2020)
Caviglione, L., Podolski, M., Mazurczyk, W., et al.: Covert channels in personal cloud storage services: the case of dropbox. Journal 13(4), 1921–1931 (2016)
Zhang, Q., Li, Y., Zhang, Q., et al.: A self-certified cross-cluster asymmetric group key agreement for wireless sensor networks. Journal 28(2), 280–287 (2019)
Li, Y., Wang, Y., Wang, Y., et al.: A feature-vector generative adversarial network for evading PDF malware classifiers. Journal 523, 38–48 (2020)
Zhang, P., Durresi, M., Durresi, A.: Internet network location privacy protection with multi-access edge computing. Computing 103(3), 473–490 (2020). https://doi.org/10.1007/s00607-020-00860-3
Mishra, D., Dharminder, D., Yadav, P., et al.: A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party. Journal 55, 102648 (2020)
Acknowledgments
This work is supported by National Natural Science Foundation of China under Grant No. 61772477, and the key technologies R & D Program of Henan Province (No.212102210089, 212102210171, 212102210075), the Natural Science Foundation of Chongqing (Grant No. cstc2020jcyj-msxmX0778), the Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No. KJQN201900608).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhao, K., Zhang, Q., Wu, Y., Zhu, L., Zhu, H., Wang, R. (2021). A Security Data Sharing Model for Cloud Network. In: Tan, Y., Shi, Y., Zomaya, A., Yan, H., Cai, J. (eds) Data Mining and Big Data. DMBD 2021. Communications in Computer and Information Science, vol 1454. Springer, Singapore. https://doi.org/10.1007/978-981-16-7502-7_31
Download citation
DOI: https://doi.org/10.1007/978-981-16-7502-7_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7501-0
Online ISBN: 978-981-16-7502-7
eBook Packages: Computer ScienceComputer Science (R0)