ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Data Privacy Protection and Access Control Mechanisms in Cross-Domain Cloud Computing Environments
PDF
HTML

Keywords

Data Privacy Protection
Access Control Mechanisms
Cross-Domain Cloud Computing
Cloud Security
Attribute-Based Access Control (ABAC)
Role-Based Access Control (RBAC)
Differential Privacy and Trust Management

How to Cite

[1]
H. . Lu, . P. . Zhu, and L. . Liu, “Data Privacy Protection and Access Control Mechanisms in Cross-Domain Cloud Computing Environments”, JCSANDM, vol. 14, no. 06, pp. 1447–1474, Jan. 2026.

Abstract

This article offers multi-domain privacy and access control. For safe and flexible resource access, we recommend trust mechanisms, RBAC, and ATBAC. The differentiated privacy techniques in our design protect sensitive data. We build classes and connections that represent access control and privacy protection’s complexity to support our suggested system’s implementation and assessment. Access Control Match Score, Privacy Constraint Score, Cross-Domain Enforcement Rate, and User-Role-Resource Graph Density have positives and downsides, according to our study. The proposed system excels in policy enforcement, trust, and privacy with a dense role-resource structure, optimal privacy, best access match, and robust cross-domain enforcement. Access rates and trust levels and how privacy noise affects query results are also presented. Experimental findings show that the suggested model outperforms others. Over the best baseline, it increases ABAC match success by 18.5%, RBAC approval rate by 17.1%, and access throughput by 13.6%. It also reduces differential privacy noise by 20%, improving the privacy-utility tradeoff, and has a good connection (0.87) between trust measures and access choices.

https://doi.org/10.13052/jcsm2245-1439.1466
PDF
HTML

References

Kollipara, V. N. H., Kalakota, S. K., Chamarthi, S., Ramani, S., Malik, P., and Karuppiah, M. (2023). Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices. Journal of Cyber Security and Mobility, 12(01), 77–102. https://doi.org/10.13052/jcsm2245-1439.1214.

Örencik C, Savaş (2014) An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib Parallel Database 32(1):119–160.

Liang K, Huang X, Guo F, Liu JK (2016) Privacy-preserving and regular language search over encrypted cloud data. IEEE Trans Inf Forensics Secur 11(10):2365–2376.

Yang JJ et al. (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43–44:74–86.

Li J et al. (2014) Privacy-preserving data utilization in hybrid clouds. Future Gener Comput Syst 30(1):98–106.

Li Y et al. (2016) Privacy preserving cloud data auditing with efficient key update. Future Gener Comput Syst 78:789–798.

Wang Y (2015) Privacy-preserving data storage in cloud using array BP-XOR codes. IEEE Trans Cloud Comput 3(4):425–436.

Zheng Q et al. (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE conference computer communication (INFOCOM).

Cash D et al. (2013) Highly-scalable searchable symmetric encryption with support for Boolean queries. In: Advances in cryptology – CRYPTO, Berlin, Germany.

Komishani EG et al. (2016) PPTD: preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl Based Syst 94:43–59.

Chun-I Fan S-YH (2013) Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Gener Comput Syst 29:1716–1724.

Zhang W et al. (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566–1578.

Yan Z et al. (2016) Two schemes of privacy-preserving trust evaluation. Future Gener Comput Syst 62:175–189.

Zhang G et al. (2012) A historical probability based noise generation strategy for privacy protection in cloud computing. J Comput Syst Sci 78:1374–1381.

Jesu Vedha Nayahi J, Kavitha V (2016) Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2016.10.022.

Jesu Vedha Nayahi J, Kavitha V (2015) An efficient clustering for anonymizing data and protecting sensitive labels. Int J Uncert Fuzziness Knowl Based Syst 23:685–714.

Amiri F et al. (2015) Hierarchical anonymization algorithms against background knowledge attack in data releasing. Knowl-Based Syst 101:71–89.

Kohlmayer F et al. (2014) A flexible approach to distributed data anonymization. J Biomed Inform 50:62–76.

Zhang X et al. (2015) Proximity-aware local recoding anonymization with mapreduce for scalable big data privacy preservation in cloud. IEEE Trans Comput 64(8):2293–2307.

Wen-Yang L et al. (2015) Privacy preserving data anonymization of spontaneous ADE reporting system dataset. BMC Med Inform Decis Mak 16:58.

Goryczka S et al. (2014) m-Privacy for collaborative data publishing. IEEE Trans Knowl Data Eng 26(10).

Soria-Comas J et al. (2015) t-Closeness through microaggregation: strict privacy with enhanced utility preservation. IEEE Trans Knowl Data Eng 27(11):3098–3110.

Rena SQ et al. (2016) Secure searching on cloud storage enhanced by homographic indexing. Future Gener Comput Syst 65:102–110.

Örencik C et al. (2014) An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib Parallel Datab 32:119–160.

K. Fan et al., A secure and efficient outsourced computation on data sharing scheme for privacy computing, J. Parallel Distrib. Comput. (2020).

Z. Guan et al., Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid, J. Parallel Distrib. Comput. (2021).

Li Xiaowei et al., A review of security protocols in edge computing environments, Comput. Res. Develop. (2022).

P. Ranaweera et al., Survey on multi-access edge computing security and privacy, IEEE Commun. Surv. Tutor. (2021).

Hu Xingtong, Research On Searchable Encryption Authentication Algorithm and Its Application in Cloud Storage (2021).

T. Shahien et al., Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage, J. Ambient. Intell. Humaniz. Comput. (2020).

Zhang, Y., Yutaka, M., Sasabe, M., et al., Attribute-based access control for smart cities: A smart-contract-driven framework. IEEE IoT J. 8(8), 6372–6384 (2020).

Xiang, Anhao, and Jun Zheng. “A situation-aware scheme for efficient device authentication in smart grid-enabled home area networks.” Electronics 9.6 (2020): 989.

R. Ghazal, A. K. Malik, N. Qadeer, B. Raza, A. R. Shahid and H. Alquhayz, “Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments,” in IEEE Access, vol. 8, pp. 12253–12267, 2020, doi: 10.1109/ACCESS.2020.2965333.

Ahmad Salehi Shahraki, Carsten Rudolph, Hooman Alavizadeh, A.S.M. Kayes, Wenny Rahayu, Zahir Tari, Securing cross-domain data access with decentralized attribute-based access control, Ad Hoc Networks, Volume 173, 2025, https://doi.org/10.1016/j.adhoc.2025.103807.

Zhang, Y., Chen, X., Chen, X., and Xiang, Y. (2016). Ensuring Data Storage Security Through a Novel Third Party Auditor Scheme in Cloud Computing. IEEE Transactions on Computers, 65(1), 1–13. DOI: 10.1109/TC.2015.2401004.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2026 Journal of Cyber Security and Mobility

Downloads

Download data is not yet available.