4.8 Article

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 7, Pages 5368-5379

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3109274

Keywords

Cloud computing; Security; Servers; Memory; Data models; Computational modeling; Cryptography; Authentication; BAN Logic; cloud storage; data access; data sharing; Random Oracle Model; Scyther

Funding

  1. FCT/MCTES [UIDB/50008/2020]
  2. Brazilian National Council for Research and Development (CNPq) [431726/2018-3, 313036/2020-9]
  3. Natural Science Foundation of China [61902054]

Ask authors/readers for more resources

This article proposes a secure and authenticated data storage, access, and sharing model for private cloud storage. It includes three components to provide secure storage, controlled sharing, and authenticated access for users.
Contrary to the public cloud storage services that impose users to accept the security restrictions delivered by the service provider, users in the private cloud benefit from self-managed, authenticated data access services. However, this may lead to security issues. A critical challenge is the provision of secure and authenticated data storage for the data owner. Moreover, the data owner should be able to access the stored data and share it with others in a controlled manner. In this article, a secure and authenticated data storage, access, and sharing model is proposed for private cloud storage, which has three components. The data storage component provides the user with secure storage of information. The data-sharing component enables sharing the stored data under the control of the data owner. The data access component enables authenticated access to the cloud storage. The security analysis demonstrates that the model is secure against various attacks. The scheme is validated to be secure via the Scyther tool, BAN Logic, and in Random Oracle Model. The performance analysis regarding the computation and communication cost via simulation in OMNeT++ show that it obtains the required security goals and efficiency of computation and communication, compared to the related methods.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available