JOURNAL ARTICLE

Secure Data Sharing using Cloud Computing

Afza KulsumDr Soumyasri S M

Year: 2025 Journal:   International Journal of Advanced Research in Science Communication and Technology Pages: 215-222   Publisher: Shivkrupa Publication's

Abstract

Cloud-based file sharing is now ubiquitous across education, healthcare, finance, and government, yet widely used platforms still suffer from misconfigured links, provider-side key custody, and coarse, user- managed permissions. This paper presents Secure File Sharing Using Cloud, a production-oriented web system that unifies client-side AES encryption with an admin- controlled authorization workflow to deliver end-to-end confidentiality, accountable access, and practical scalability. The system adopts a three-tier architecture— React frontend, PHP/AJAX application layer, and MySQL data layer—deployed on AWS EC2 for elasticity and high availability. Files are encrypted prior to upload and remain ciphertext at rest; cross-user retrieval is possible only after explicit administrative approval, with all actions captured in immutable audit logs. We formalize a threat model covering eavesdroppers, credential guessing, SQL injection, and honest-but-curious cloud providers, and map each risk to concrete controls: HTTPS transport, authenticated encryption (AES-GCM), salted password hashing, strict session handling, least-privilege queries, and centralized authorization. A prototype implementation demonstrates that secure operation need not compromise usability: uploads and downloads of files up to 50 MB complete within 3–5 seconds, and the system remains stable with 100 concurrent users while preventing unauthorized access by design. Compared with prior work that emphasizes cryptographic strength, big-data throughput, or system-level mechanisms in isolation, our approach integrates cryptography, governance, and cloud deployment into a cohesive platform suitable for small-to-medium organizations and academic institutions. We discuss extendability to role- based access control, multi-factor authentication, hybrid key distribution (AES + RSA), and verifiable, tamper- evident logging. We release implementation artifacts, schema templates, and threat-model checklists to support replication, audits, and classroom adoption and practitioner use

Keywords:
Cloud computing Encryption Data sharing Upload Password Credential Audit trail Attribute-based encryption Client-side encryption Public-key cryptography

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
9
Refs
0.77
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Web Application Security Vulnerabilities
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Secure Data Sharing Using Mobile Cloud Computing

R AmuthaT YasthikaSyed Munawar Razvi

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2019
JOURNAL ARTICLE

Secure Data Sharing Using Mobile Cloud Computing

R AmuthaYasthika TRazvi, Syed Munawar

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2019
JOURNAL ARTICLE

SECURE DATA SHARING IN CLOUD COMPUTING USING HASBE

M. Yu. MikheevSonya Helal

Journal:   XXI Century Resumes of the Past and Challenges of the Present plus Year: 2022 Vol: 11 (58)
JOURNAL ARTICLE

Secure data sharing for mobile cloud computing using RSA

Mahesh ArumugamS. DeepaG ArunP. SathishkumarA.K. Jeevanantham

Journal:   IOP Conference Series Materials Science and Engineering Year: 2021 Vol: 1055 (1)Pages: 012108-012108
BOOK-CHAPTER

Secure Sharing of Data in Cloud Computing

Deepnarayan TiwariG. R. Gangadharan

Communications in computer and information science Year: 2015 Pages: 24-35
© 2026 ScienceGate Book Chapters — All rights reserved.