Cloud-Network-End Security Integration for Smart Wireless Environments
DOI:
https://doi.org/10.63665/phmqef60Keywords:
Cloud-Network-End Security, Wireless Network Security, AES Encryption, SHA-256, Cloud Computing, IoT Security, Collaborative Security Architecture, Data Integrity, Heterogeneous Networks.Abstract
The rapid evolution of wireless communication infrastructure, cloud computing, and the Internet of Things (IoT) has fundamentally transformed modern information systems. Traditional wireless network security mechanisms, which focus primarily on end-to-end data transmission protection using cryptographic techniques, are no longer adequate for the complex demands of cloud-based collaborative services. The shift from data transmission to cloud-driven information services introduces new security vulnerabilities across cloud platforms, network layers, and end devices. To address this critical challenge, this paper proposes a Cloud-Network-End Collaborative Security Architecture that provides coordinated protection across all three layers. The proposed framework integrates Advanced Encryption Standard (AES-256) for data confidentiality, SHA-256 for integrity verification, role-based access control for authorization, and a centralized cloud server for scalable data management. The architecture is implemented using Java EE (JSP, Servlets), Apache Tomcat, and MySQL, and is evaluated through functional and non-functional testing. Results demonstrate improved data confidentiality, end-to-end integrity assurance, and efficient access control in heterogeneous network environments. The proposed system supports emerging applications including smart cities, healthcare, autonomous transportation, and industrial IoT, providing a trustworthy and scalable security foundation for next-generation wireless environments.
Downloads
References
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," Comput. Netw., vol. 38, no. 4, pp. 393–422, 2002.
[2] I. F. Akyildiz and X. Wang, "A survey on wireless mesh networks," IEEE Commun. Mag., vol. 43, no. 9, pp. S23–S30, 2005.
[3] S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith, and A. Jamalipour, "Wireless body area networks: A survey," IEEE Commun. Surv. Tutorials, vol. 16, no. 3, pp. 1658–1686, 2014.
[4] J. Liu, Y. Shi, Z. M. Fadlullah, and N. Kato, "Space-air-ground integrated network: A survey," IEEE Commun. Surv. Tutorials, vol. 20, no. 4, pp. 2714–2741, 2018.
[5] C. Zhang, P. Patras, and H. Haddadi, "Deep learning in mobile and wireless networking: A survey," IEEE Commun. Surv. Tutorials, vol. 21, no. 3, pp. 2224–2287, 2019.
[6] Z. Shen, J. Jin, C. Tan, A. Tagami, S. Wang, Q. Li, Q. Zheng, and J. Yuan, "A survey of next-generation computing technologies in space-air-ground integrated networks," ACM Comput. Surv., vol. 56, no. 1, p. 23, 2023.
[7] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, "A survey on wireless security: Technical challenges, recent advances, and future trends," Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, 2016.
[8] C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949.
[9] R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols," in Proc. 42nd IEEE Symp. Foundations of Computer Science, 2001, pp. 136–145.
[10] D. Lu, M. Shi, X. Ma, X. Liu, R. Guo, T. Zheng, Y. Shen, X. Dong, and J. Ma, "Smaug: A TEE-assisted secured SQLite for embedded systems," IEEE Trans. Dependable Secure Comput., vol. 20, no. 5, pp. 3617–3635, 2023.
[11] X. Wang, J. Ma, X. Liu, Y. Miao, Y. Liu, and R. H. Deng, "Forward/backward and content private DSSE for spatial keyword queries," IEEE Trans. Dependable Secure Comput., vol. 20, no. 4, pp. 3358–3370, 2023.
[12] T. Yang, J. Ma, Y. Miao, Y. Wang, X. Liu, K. K. R. Choo, and B. Xiao, "MU-TEIR: Traceable encrypted image retrieval in the multi-user setting," IEEE Trans. Serv. Comput., vol. 16, no. 2, pp. 1282–1295, 2023.
[13] X. Li, Q. Tong, J. Zhao, Y. Miao, S. Ma, J. Weng, J. Ma, and K. K. R. Choo, "VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data," IEEE Trans. Serv. Comput., vol. 16, no. 1, pp. 698–710, 2023.
[14] V. K. Yadav, N. Andola, S. Verma, and S. Venkatesan, "A survey of oblivious transfer protocol," ACM Comput. Surv., vol. 54, no. 10, pp. 1–37, 2022.
[15] J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. IEEE Symp. Security and Privacy, 2007, pp. 321–334.
[16] Q. Jiang, J. Ni, J. Ma, L. Yang, and X. Shen, "Integrated authentication and key agreement framework for vehicular cloud computing," IEEE Netw., vol. 32, no. 3, pp. 28–35, 2018.
[17] M. Sabt, M. Achemlal, and A. Bouabdallah, "Trusted Execution Environment: What it is, and what it is not," in Proc. IEEE Trustcom/BigDataSE/ISPA, 2015, pp. 57–64.
[18] D. He, N. Kumar, M. Khan, and J. H. Lee, "Anonymous two-factor authentication for consumer roaming service in global mobility networks," IEEE Trans. Consumer Electron., vol. 59, no. 4, pp. 811–817, 2013.
[19] S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. ACM Conf. Computer and Communications Security, 2012, pp. 965–976.
[20] C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annual ACM Symp. Theory of Computing, 2009, pp. 169–178.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Authors

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
