A Novel Cryptographic Protocol for Secure Data Sharing in Cloud Computing

Main Article Content

Pradeep G
P Satyanaryana
S. Ramamoorthy

Abstract

In the realm of cloud computing, ensuring the secure sharing of data is of paramount importance. This paper introduces a novel cryptographic protocol meticulously designed to address this challenge while achieving several key objectives. The objectives include ensuring the confidentiality and integrity of data shared across cloud platforms, facilitating access control mechanisms for authorized users, and optimizing performance in terms of latency and throughput. The prevalent issue with existing systems lies in their struggle to strike a balance between robust security and optimal performance. Traditional protocols often compromise on one aspect to enhance the other, thereby creating potential vulnerabilities or leading to inefficiencies. The proposed methodology seeks to rectify these shortcomings by presenting a unique combination of encryption techniques. By leveraging both symmetric and asymmetric encryption, the protocol ensures that data shared across the cloud is secure and accessible only to authorized users. Additionally, cryptographic hash functions are employed to verify the integrity of the data, ensuring that it remains unaltered during transmission. An access control mechanism further ensures that only authorized users can access the shared data, thereby enhancing security. The findings from the evaluation of the proposed protocol are noteworthy. The protocol not only achieves a high confidentiality score of 0.99 but also maintains an integrity score of 0.98, indicating that it successfully protects data from unauthorized access and alterations. Moreover, the protocol ensures swift data processing and retrieval, as evidenced by the encryption/decryption time of just 0.05 seconds per MB. These achievements are indicative of the protocol's potential to set new standards in secure data sharing within cloud computing environments. By successfully addressing the limitations of existing systems and presenting a solution that is both secure and efficient, the proposed protocol stands out as a significant contribution to the field.


 


 

Article Details

How to Cite
[1]
Pradeep G, P Satyanaryana, and S. Ramamoorthy, “A Novel Cryptographic Protocol for Secure Data Sharing in Cloud Computing ”, Int. J. Comput. Eng. Res. Trends, vol. 10, no. 11, pp. 10–18, Nov. 2023.
Section
Research Articles

References

] Kaaniche, N., Laurent, M., & Barbori, M. E. (2014). CloudaSec: A novel public-key based framework to handle data sharing security in clouds. In 2014 11th International Conference on Security and Cryptography (SECRYPT) (pp. 1-14). Vienna, Austria.

] Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115. https://doi.org/10.1016/j.ins.2016.09.005

] Singh, A. K., & Saxena, D. (2022). A Cryptography and Machine Learning Based Authentication for Secure Data-Sharing in Federated Cloud Services Environment. Journal of Applied Security Research, 17(3), 385-412. https://doi.org/10.1080/19361610.2020.1870404

] Thabit, F., Can, O., Alhomdy, S., Al-Gaphari, G. H., & Jagtap, S. (2022). A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing. International Journal of Intelligent Networks, 3, 16-30. https://doi.org/10.1016/j.ijin.2022.04.001

] Qin, Z., Xiong, H., Wu, S., & Batamuliza, J. (2016). A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2016.2551238

] Narayanan, U., Paul, V., & Joseph, S. (2022). A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University - Computer and Information Sciences, 34(6), 3121-3135. https://doi.org/10.1016/j.jksuci.2020.05.005

] Brousmiche, K. L., Durand, A., Heno, T., Poulain, C., Dalmieres, A., & Ben Hamida, E. (2018). Hybrid Cryptographic Protocol for Secure Vehicle Data Sharing Over a Consortium Blockchain. 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 1281-1286. https://doi.org/10.1109/Cybermatics_2018.2018.00223

] Kotha, S. K., Rani, M. S., Subedi, B., & Kim, H. (2022). A Comprehensive Review on Secure Data Sharing in Cloud Environment. Wireless Personal Communications, 127(3), 2161-2188. https://doi.org/10.1007/s11277-021-08775-8

] Li, H., Lan, C., Fu, X., Wang, C., Li, F., & Guo, H. (2020). A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing. Sensors, 20(17), 4720. https://doi.org/10.3390/s20174720

] Ogiela, L., Ogiela, M. R., & Ko, H. (2020). Intelligent Data Management and Security in Cloud Computing. Sensors, 20(12), 3458. https://doi.org/10.3390/s20123458

] Putra, F. A., Ramli, K., Hayati, N., & Gunawan, T. S. (2021). PURA-SCIS Protocol: A Novel Solution for Cloud-Based Information Sharing Protection for Sectoral Organizations. Symmetry, 13(12), 2347. https://doi.org/10.3390/sym13122347

] Salunke, P. M., & Mahale, V. V. (2018). Secure Data sharing in Distributed Cloud Environment. 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 262-266. https://doi.org/10.1109/I-SMAC.2018.8653722

] Shen, J., Yang, H., Vijayakumar, P., & Kumar, N. (2022). A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing. IEEE Transactions on Dependable and Secure Computing, 19(4), 2198-2210. https://doi.org/10.1109/TDSC.2021.3050517

] Xiong, H., Zhang, H., & Sun, J. (2019). Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing. IEEE Systems Journal, 13(3), 2739-2750. https://doi.org/10.1109/JSYST.2018.2865221

] Wei, J., Liu, W., & Hu, X. (2018). Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption. IEEE Transactions on Cloud Computing, 6(4), 1136-1148. https://doi.org/10.1109/TCC.2016.2545668

] Xue, K., & Hong, P. (2014). A Dynamic Secure Group Sharing Framework in Public Cloud Computing. IEEE Transactions on Cloud Computing, 2(4), 459-470. https://doi.org/10.1109/TCC.2014.2366152