Contact Us Search Paper

A Robust and Verifiable Data Sharing Architecture Driven by Cloud-Edge Coordination

Mengjun Wang1, 4, Chunbo Wang1, 4, Chunhua Su2, Xiaoqiang Di1, 4, Nannan Xie1, 4, Pengfei Hu3, and Hui Qi1, 4, *

Corresponding Author:

Hui Qi

Affiliation(s):

1School of Computer Science and Technology, Changchun University of Science and Technology, Changchun, Jilin, 130022, China

2Department of Computer Science and Engineering, Division of Computer Science, University of Aizu, Aizuwakamatsu, 965-8580, Japan

3School of Computer Science and Technology, Shandong University, Qingdao, Shandong, 266237, China

4Jilin Province Key Laboratory of Network and Information Security, Changchun University of Science and Technology, Changchun, Jilin, 130022, China

*Corresponding author

Abstract:

The Internet of Vehicles (IoV) generates massive real-time data involving both user privacy and driving safety. To overcome the single-point-of-failure and key abuse risks of centralized cloud storage, we propose a secure and verifiable data sharing scheme based on cloud–edge collaboration. The scheme leverages edge–cloud cooperation to improve data access efficiency, employs ciphertext-policy attribute-based encryption (CP-ABE) for fine-grained access control, and adopts a multi-authority architecture with a permissioned PBFT-based blockchain deployed on resource-rich regional servers to ensure consistent key distribution without burdening resource-constrained edge nodes. In addition, BLS short signatures are integrated to verify data integrity. Performance evaluation of the blockchain prototype demonstrates acceptable transaction latency and manageable communication overhead, confirming the practicality of key consensus in real-world IoV deployments.

Keywords:

Vehicle Information Security, Cloud–Edge Collaboration, Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key Consensus, Data Tamper-Resistance

Downloads: 17 Views: 184
Cite This Paper:

Mengjun Wang, Chunbo Wang, Chunhua Su, Xiaoqiang Di, Nannan Xie, Pengfei Hu, and Hui Qi (2025). A Robust and Verifiable Data Sharing Architecture Driven by Cloud-Edge Coordination. Journal of Networking and Network Applications, Volume 5, Issue 2, pp. 85–98. https://doi.org/10.33969/J-NaNA.2025.050204.

References:

[1] S. R. Gudimetla, “Data encryption in cloud storage,” International Re-search Journal of Modernization in Engineering Technology and Science, vol. 6, pp. 2582–5208, 2024.

[2] F. Shang and X. Deng, “A data sharing scheme based on blockchain for privacy protection certification of Internet of Vehicles,” Vehicular Communications, vol. 51, Art. no. 100864, 2025.

[3] Y. Yang, R. Shi, K. Li, et al., “Multiple access control scheme for EHRs combining edge computing with smart contracts,” Future Generation Computer Systems, vol. 129, pp. 453–463, 2022.

[4] J. Qin, Y. Xun, and J. Liu, “Cvmids: Cloud-vehicle collaborative intru-sion detection system for Internet-of-Vehicles,” IEEE Internet of Things Journal, vol. 11, no. 1, pp. 321–332, 2023.

[5] X. Shi, Y. Guo, W. Jin, et al., “Toward forward-secure end-to-end data sharing: an attribute-key-free CP-ABE scheme,” in Proc. ICASSP 2025 IEEE Int. Conf. on Acoustics, 2025, pp. 1–5.

[6] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symp. Security and Privacy (SP’07), 2007, pp. 321–334.

[7] V. Goyal, O. Pandey, A. Sahai, et al., “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th ACM Conf. Computer and Communications Security, 2006, pp. 89–98.

[8] L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proc. 14th ACM Conf. Computer and Communications Security, 2007, pp. 456–465.

[9] A. Lewko, T. Okamoto, A. Sahai, et al., “Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,” in Advances in Cryptology–EUROCRYPT 2010, Springer, 2010, pp. 62–91.

[10] S. Wang, K. Liang, J. K. Liu, et al., “Attribute-based data sharing scheme revisited in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1661–1673, 2016.

[11] X. Liu, W. Chen, and Y. Xia, “Security-aware information dissemination with fine-grained access control in cooperative multi-RSU of VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 3, pp. 2170–2179, 2020.

[12] N. Chen, J. Li, Y. Zhang, et al., “Efficient CP-ABE scheme with shared decryption in cloud storage,” IEEE Transactions on Computers, vol. 71, no. 1, pp. 175–184, 2020.

[13] Z. Zhang and X. Ren, “Data security sharing method based on CP-ABE and blockchain,” Journal of Intelligent & Fuzzy Systems, vol. 40, no. 2, pp. 2193–2203, 2021.

[14] S. Das and S. Namasudra, “Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure,” IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 821–829, 2022.

[15] Z. Guo, G. Wang, Y. Li, et al., “Accountable attribute-based data-sharing scheme based on blockchain for vehicular ad hoc network,” IEEE Internet of Things Journal, vol. 10, no. 8, pp. 7011–7026, 2022.

[16] L. Zhang, Y. Zhang, Q. Wu, et al., “A secure and efficient decentralized access control scheme based on blockchain for vehicular social networks,” IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17938–17952, 2022.

[17] S. J. Horng, C. C. Lu, and W. Zhou, “An identity-based and revoca-ble data-sharing scheme in VANETs,” IEEE Transactions on Vehicular Technology, vol. 69, no. 12, pp. 15933–15946, 2020.

[18] J. Liu, Y. Li, R. Sun, et al., “SDSS: Secure data sharing scheme for edge enabled IoV networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 11, pp. 12038–12049, 2023.

[19] B. Jiang, C. Li, Y. Tang, et al., “Secure cross-chain transactions for medical data sharing in blockchain-based Internet of Medical Things,” International Journal of Network Management, vol. 35, no. 1, Art. no. e2279, 2025.

[20] J. Li, D. Han, T. H. Weng, et al., “A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption,” Computer Standards & Interfaces, vol. 91, Art. no. 103887, 2025.

[21] L. Zhang, Z. Ou, C. Hu, et al., “Data sharing in the metaverse with key abuse resistance based on decentralized CP-ABE,” IEEE Transactions on Computers, 2024.

[22] S. Li, K. Niu, and B. Wu, “A blockchain-based secure data sharing scheme with efficient attribute revocation,” Journal of Systems Architec-ture, vol. 159, Art. no. 103309, 2025.

[23] T. Liu, Z. Li, Y. Ji, et al., “Efficient key-escrow-free and vehicle-revocable data sharing protocol for vehicular ad hoc network,” IEEE Internet of Things Journal, vol. 11, no. 7, pp. 11540–11553, 2023.

[24] H. Deng, Z. Qin, Q. Wu, et al., “Achieving fine-grained data sharing for hierarchical organizations in clouds,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 2, pp. 1364–1377, 2022.

[25] Z. Wang, J. Wang, Y. Liu, et al., “Privacy-preserving attribute-based access control scheme with intrusion detection and policy hiding for data sharing in VANET,” IEEE Internet of Things Journal, vol. 11, no. 13, pp. 23348–23369, 2024.

[26] X. Zhou, D. He, J. Ning, et al., “AADEC: Anonymous and auditable dis-tributed access control for edge computing services,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 290–303, 2022.

[27] K. Yang, J. Shu, and R. Xie, “Efficient and provably secure data selective sharing and acquisition in cloud-based systems,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 71–84, 2022.

[28] B. Xie, Y. P. Zhou, X. Y. Yi, et al., “An improved multi-authority attribute access control scheme based on blockchain and elliptic curve for efficient and secure data sharing,” Electronics, vol. 12, no. 7, Art. no. 1691, 2023.

[29] C. Zhao, L. Xu, J. Li, et al., “Toward secure and privacy-preserving cloud data sharing: Online/offline multiauthority CP-ABE with hidden policy,” IEEE Systems Journal, vol. 16, no. 3, pp. 4804–4815, 2022.

[30] F. Wang, J. Cui, Q. Zhang, et al., “Blockchain-based secure cross-domain data sharing for edge-assisted industrial Internet of Things,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3892–3905, 2024.

[31] J. Li, Y. Fan, X. Bian, et al., “Online/offline MA-CP-ABE with crypto-graphic reverse firewalls for IoT,” Entropy, vol. 25, no. 4, Art. no. 616, 2023.

[32] S. Roy, J. Agrawal, A. Kumar, et al., “Mh-ABE: Multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing,” Cluster Computing, vol. 27, no. 5, pp. 6013–6038, 2024.

[33] P. Duan, Z. Ma, H. Gao, et al., “Multi-authority attribute-based encryp-tion scheme with access delegation for cross blockchain data sharing,” IEEE Transactions on Information Forensics and Security, vol. 20, pp. 323–337, 2025.

[34] W. Li, C. Feng, L. Zhang, et al., “A scalable multi-layer PBFT consensus for blockchain,” IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 5, pp. 1146–1160, 2020.

[35] Z. Li, J. Wang, and Y. Li, “An improved PBFT consensus algorithm based on reputation and gaming,” The Journal of Supercomputing, vol. 81, no. 1, pp. 323, 2025.