Next Article in Journal
An Efficient and Effective Model for Preserving Privacy Data in Location-Based Graphs
Previous Article in Journal
A Skewness-Based Density Metric and Deep Learning Framework for Point Cloud Analysis: Detection of Non-Uniform Regions and Boundary Extraction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Symmetry-Enhanced Secure and Traceable Data Sharing Model Based on Decentralized Information Flow Control for the End–Edge–Cloud Paradigm

College of Computer Science and Engineering, Jishou University, Jishou 416000, China
*
Authors to whom correspondence should be addressed.
Symmetry 2025, 17(10), 1771; https://doi.org/10.3390/sym17101771
Submission received: 13 August 2025 / Revised: 8 October 2025 / Accepted: 13 October 2025 / Published: 21 October 2025
(This article belongs to the Section Computer)

Abstract

The End–Edge–Cloud (EEC) paradigm hierarchically orchestrates Internet of Things (IoT) devices, edge nodes, and cloud, optimizing system performance for both delay-sensitive data and compute-intensive processing tasks. Securing IoT data sharing in the EEC-driven paradigm while maintaining data traceability poses critical challenges. In this paper we propose STDSM, a symmetry-enhanced secure and traceable data sharing model for the EEC-driven data sharing paradigm. STDSM enables IoT data owners to share data securely by attaching symmetric security labels (for secrecy and integrity) to their data. This mechanism symmetrically controls both data outflow and inflow. Furthermore, STDSM can also track data user identity. Subsequently, the security properties of STDSM, including data confidentiality, integrity, and identity traceability, are formally verified; the verification takes 280 ms, using a novel approach that combines High-Level Petri Net modeling with the satisfiability modulo theories library and the Z3 solver. In addition, our experimental results show that STDSM reduces time overhead by up to 15% while providing enhanced traceability.

1. Introduction

The proliferation of Internet of Things (IoT) [1] devices, including sensors, actuators, and mobile devices, has led to an exponential growth of data generated at the network edge. This trend is further amplified by the increasing deployment of data-intensive applications, such as those powered by artificial intelligence [2,3], that require timely processing and sharing of data.
In the era of IoT, data sharing mainly comprises the cloud-assisted IoT data sharing paradigm [4] or the edge-assisted IoT data sharing paradigm [5]. In the cloud-assisted IoT data sharing paradigm, data processing is delegated to cloud platforms; this overcomes resource restrictions through on-demand computing and massive data storage, yet it fails to answer the delay-sensitive requirements of IoT applications. Alternatively, in the edge-assisted IoT data sharing paradigm the collected data are transferred to the edge servers that provide delay-sensitive services to the users, the edge servers being located in proximity to the end IoT users. Nonetheless, edge servers exhibit constrained processing power and modest storage capacity, while excelling in low-latency computational tasks.
Accordingly, we are likely to see a hierarchical computing paradigm that could revolutionize the current cloud computing and edge computing architecture [6]. This consists of a large number of end IoT ends, distributed edge servers near the network edge, and the cloud center. As shown in Figure 1, the three-layer End–Edge–Cloud (EEC) paradigm requires synergistic operation across all layers to achieve optimal performance. This synergy enables both high-throughput processing and real-time responsiveness, meeting the evolving demands of data sharing.
From the perspective of data sharing in the EEC-driven paradigm, the end data owner first collects data using the sensors and then uploads that data to edge servers through the wireless network. In the edge layer, the edge servers store the uploaded data or transfer the data to the cloud according to the delay-sensitive characteristic of the data. That is, the edge servers will locally store and process the received data if the data are delay-sensitive. Otherwise, the data will be transferred to the cloud, which provides powerful capability for the data processing services for the ends. Moreover, the edge servers and cloud center also execute data sharing decisions to decide whether the requested data can be shared with the data users.
To ensure secure data sharing within the EEC-driven paradigm illustrated in Figure 1, the following three fundamental security properties must be preserved:
  • Data confidentiality is essential, as the shared data often contain sensitive information. This property prevents unauthorized data users or malicious entities from accessing the data during its transmission and storage across the edge and cloud layers. By ensuring confidentiality, data owners will be willing to share their data.
  • Data integrity guarantees the accuracy and reliability of data throughout the entire sharing process, from the original data owner to the end user. This ensures that the data has not been altered or tampered with, maintaining its trustworthiness.
  • Identity traceability is equally critical, as it enables the system to track the identity of data users in the event of illegal access or for accountability purposes. This capability acts as a deterrent against misuse and provides a mechanism for forensic analysis should a security incident occur.
Accordingly, this paper proposes STDSM, a symmetry-enhanced secure and traceable data sharing model based on the decentralized information flow control (DIFC) model [7], for the EEC-driven secure data sharing paradigm. We believe STDSM is the first DIFC-based model specifically designed for the EEC paradigm that integrates symmetrical security labels (secrecy and integrity) to protect data confidentiality and integrity and also identity traceability via owner tags and trace data. This paper makes the following key contributions:
(1)
The confidentiality and integrity of the shared data are preserved:
To preserve data confidentiality and integrity, the secrecy label and integrity label are attached on the share data before the data are uploaded to the edge servers and the cloud center. Here, the secrecy label restricts read access for unauthorized users, while the integrity label blocks write operations by unauthorized users, thereby preserving data confidentiality and integrity.
(2)
Identity traceability is achieved by STDSM:
In order to achieve identity traceability, STDSM introduces the owner tag and trace data. Furthermore, owner tags serve as identifiers for both data owner and user, while trace data capture user identities during data sharing. When data sharing occurs, the data owner’s owner tag attached on the shared data and the owner tag of data user are used to generate trace data. Such trace data records data flow information, thereby enabling STDSM to enable identity traceability.
(3)
The security of STDSM is formally verified and performance evaluation is conducted:
To verify the security of STDSM, we employ a novel method that combines High-Level Petri Net (HLPN) modeling with the satisfiability modulo theories library (SMT-Lib) and the Z3 solver. This method implements bounded model checking [4] to validate STDSM. Our verification results show that STDSM has the capabilities of protecting data confidentiality and integrity, and it can also track data user identity. Our performance evaluation results show STDSM’s high efficiency compared with the related works.
Unlike prior works that often lack rigorous formal analysis for the DIFC-based model, we introduce a comprehensive verification method. This method utilizes HLPN for precise system modeling and employs SMT-Lib theories along with the Z3 solver for automated, rigorous verification of security properties. This methodological combination, applied specifically to a symmetric DIFC model, represents a novel contribution to the field.
The outline of this paper is as follows: Section 2 reviews the related works, and preliminaries are given in Section 3. Section 4 proposes STDSM and its workflows, Section 5 formally analyzes STDSM, Section 6 conducts performance evaluation of STDSM, and Section 7 concludes and discusses this paper.

2. Related Work

2.1. Secure Data Sharing in EEC Paradigm

As for secure data sharing in the EEC-driven paradigm, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) [8], Proxy Re-encryption (PRE) [9], Identity-Based Encryption (IBE) [10], Blockchain [11], and smart contract [12,13] are usually used in the literature. Fan et al. [14] firstly presented a data sharing approach for the EEC paradigm, which achieves cross-domain data sharing. In this proposal, the cloud service provider is responsible for system initialization and facilitates cross-domain data sharing by precisely directing users to target domains. Lin et al. [15] utilized CP-ABE to prevent a revoked user from colluding with a non-revoked user. Ding et al. [16] proposed the LSHS system to secure IoT-based sharing. LSHS also supports lightweight edge-assisted data integrity verification and preserves the privacy of the patient’s identity. Nonetheless, LSHS does not focus on providing delay-sensitive data sharing services but on secure edge-assisted data storage. Based on homomorphic encryption [17], Zhang et al. [11] developed a blockchain-enabled data sharing framework for mobile edge computing (MEC) scenarios, where edge nodes are tasked with dual cryptographic operations while concurrently handling time-sensitive data processing and user service delivery. Additionally, the powerful data processing and analysis services are performed in the cloud center. The HDS framework [18] enables seamless regional and cross-regional data sharing in MEC environments through a dual-component design: (1) an optimized intra-region protocol for accelerated data localization, and (2) a single-hop geographic routing mechanism for efficient cross-region data access. For vehicular edge computing and networking [19], Zuo et al. [20] proposed to use blockchain securely stored data from autonomous vehicles across multiple edge nodes, reducing the risks associated with data transmission. In addition, Liu et al. [21] utilized the route hash-chain on vehicles’ driving routes to track data and achieve identity authentication.
Nonetheless, the aforementioned works entail complex cryptographic computation to achieve data confidentiality protection and identity traceability, causing high computation costs to the end data owner. Additionally, these works cannot achieve end-to-end data confidentiality and integrity protection.

2.2. Decentralized Information Flow Control

Alternatively, DIFC [22,23] enables data confidentiality and integrity protection through attaching security labels (i.e., secrecy and integrity labels) to the shared data; it also defines the enforceable information flow rules to restrict data sharing, preserving the end-to-end confidentiality and integrity of the data. In DIFC, every active distributed entity has corresponding privileges to manage its security context, which is suitable for securing data sharing in the EEC-driven scenario. Myers et al. [22] introduced the foundational DIFC model for decentralized environments, employing dual security classification (secrecy and integrity) to preserve both data confidentiality and integrity. Thereafter, DIFC-AC [24] was proposed to track data flow through attaching security labels on shared Pass data. Furthermore, DIFC-AC sets authorization conditions on security labels to restrict data access. However, the scalability of DIFC-AC is limited by the authorization conditions stipulated on the label. FlowK [25] and Camflow [7] constituted complementary information flow control systems in platform as the service (PaSS) cloud. While FlowK’s Pileus component maintained data confidentiality and integrity even in compromised cloud environments, Camflow specialized in three key areas: (1) application sand boxing, (2) cross-boundary data sharing, and (3) leakage mitigation. Nonetheless, FlowK and Camflow required operation system integration; consequently, they were nly suitable for PaSS cloud. Subsequently, Camflow was used for securing patients’ health data sharing in cloud-assisted IoT data sharing scenarios, presenting secure-Camflow [26]. By leveraging the DIFC model, Lu et al. [27] proposed the DIFCS scheme to secure data sharing in cross-cloud data sharing scenarios. The DIFCS scheme also demonstrated that DIFC-based approaches have less computation cost compared with encryption-based approaches, to some degree. However, DIFCS is only suitable for data sharing scenarios in multi-clouds. In summary, the comprehensive comparisons of the aforementioned works are shown in Table 1.
Nevertheless, current DIFC-based methods in data sharing scenarios exhibit two critical limitations: absence of identity-tracking mechanisms and lack of theoretical analysis of their security properties. Accordingly, the main purposes of this paper are addressing identity traceability using DIFC to secure data sharing in the EEC-driven paradigm and providing a novel theory analysis method to prove the security properties for DIFC-based schemes.

3. Preliminaries

This section mainly introduces HLPN, SMT-Lib, and Z3 solver, which are used to formally analyze and verify the security of STDSM in this paper. In addition, they are also used to prove the security property of the proposals, such as the xDAuth protocol [28] and the CTAC model [29].

3.1. High-Level Petri Net

Although Petri Nets [30,31] are broadly applicable for system modeling, their graphical representation suffers from scalability issues when applied to complex systems, manifesting as exponential growth in component count. To address these limitations, HLPN [4,27,32,33], was introduced as an advanced modeling formalism. This semi-graphical technique enhances traditional Petri Nets through three key innovations: (1) abstraction via high-level data structures as tokens, (2) algebraic annotation of network components, and (3) integrated support for system specification, design, and verification. In this paper, HLPN is also used for formally modeling and analyzing STDSM, in which the definition of HLPN is introduced as detailed in our previous works [4,27].

3.2. SMT-Lib and Z3 Solver

The satisfiability modulo theory (SMT) [4] constitutes a specialized branch of automated reasoning that investigates the decidability of first-order logical expressions. The SMT framework examines formulaic instances in first-order predicate calculus where function and predicate symbols may possess context-dependent semantic interpretations. At its core, this paradigm addresses the fundamental decision problem of establishing solution existence for such constrained logical expressions. Through domain-specific theoretical restrictions—particularly though not exhaustively applied to quantifier-free formula classes—these dedicated techniques enable solver implementations demonstrating superior computational efficiency compared to universal theorem-proving systems. Within computing science, SMT finds extensive application across diverse domains including but not limited to automated planning protocols, formal model verification, and systematic test case synthesis.
SMT-Lib [34] establishes a unified specification language and evaluation infrastructure for satisfiability modulo theories implementations. This framework supplies foundational logical theories—including array, bit-vector, and finite set formalisms—that underpin SMT problem formulations. Modern SMT solvers accept as input both a target theory and the corresponding logical formula f, subsequently determining f’s satisfiability within the specified theoretical constraints. Our verification methodology employs the Z3 theorem prover [35] in conjunction with SMT-Lib’s array theory constructs, leveraging Z3’s demonstrated efficiency in formal verification tasks to analyze the STDSM model.

4. STDSM

At first, this section presents the STDSM model, in which the elements and corresponding rules are defined and designed, respectively. Subsequently, the EEC-driven data sharing paradigm is formally modeled using STDSM. The workflows of STDSM in the EEC-driven data sharing paradigm are finally depicted.

4.1. Model Description

This subsection describes STDSM as follows:
Entity. Entity consists of subject and object. In STDSM, subject means the end data owners and end data users. Object refers to the accessed or shared data. For example, in an EEC-driven e-health system, the patients’ health data are the objects, and patients and medical persons are the subjects. In the EEC scenario, edge servers and the cloud server are the subjects. In particular, an active subject can create a new subject or object.
Tag and label. Tags, denoted by t, are defined as random characters, which means some security properties of secrecy or integrity. Tags have no inherent meaning until they are assigned to the corresponding secrecy or integrity labels, denoted by L. In STDSM, an entity is associated with a symmetric pair of security labels ( L S for secrecy and L I for integrity) and an owner tag ( t O ). This symmetry between secrecy and integrity is fundamental: the secrecy label symmetrically restricts read access, while the integrity label symmetrically restricts write operations, thereby providing a balanced and comprehensive protection mechanism. The strength of IFC lies in its ability to ensure that aspects of the security context do not interfere [7] with each other.
Owner tag and trace data. Owner tag, denoted by t O , is used to mark the owner. It is also used to record the data flow trace from data sender to data receiver. In the EEC-driven paradigm, a data item flowing from end data owner (EO) to end data user (EU), t O ( E O ) t O ( E U ) , means the trace data from EO to EU, while t O is also attached to data and is propagated along with the data. Additionally, except for the data owner, the owner tag cannot be changed by other entities in the EEC-driven paradigm.
Decentralized privileges. When generating a new tag t, the creating subject immediately receives modification privileges (add privilege or remove privilege) for t within both its secrecy or integrity label. In detail, t P X + ( E ) means an entity E with the privilege of adding t to its secrecy label or integrity label, and t P X ( E ) implies an entity with the privilege of removing t from its secrecy label or integrity label, in which X can be secrecy or integrity. Accordingly, a subject has the symmetric privileges of P S + ( E ) , P S ( E ) , P I + ( E ) , and P S ( E ) .
Definition 1 
(creating a new entity).  A A is denoted as entity A creates A in STDSM, which must meet the following rule:
i f A A then L X A : = L X ( A ) t O ( A ) : = t O ( A ) P X A a s s i g n P X ± ( A ) .
This rule mandates that the creating entity configures the security context appropriately for the new entity. That is, the created entity A inherits the security context of its creator A, and entity A assigns the corresponding privileges to the created entity A , where P X ( A ) P X ± ( A ) . In particular, X can be S or I, and P X ( A ) can be P X + ( A ) or P X ( A ) .
Definition 2 
(secure information flow rule with trace). After executing the secure information flow rule in Definition 1, the allowed and prevented flows of information are recorded in trace data. The rule is shown below:
L S ( A ) L S ( B ) L I ( B ) L I ( A ) N Y ξ t O ( A ) , t O ( B ) A B .
As for security check ( L S ( A ) L S ( B ) ), the receiver (B) must have at least all the secrecy tags of the sender (A). Think of this as the receiver needing a high enough security clearance to read the data. As for integrity check ( L I ( B ) L I ( A ) ), the sender (A) must have at least all the integrity tags of the receiver (B). This ensures the data comes from a trusted source that the receiver approves. In this rule, the information flow trace is also recorded in the trace data, ξ t O ( A ) , t O ( B ) A B , regardless of whether the information flow satisfies the secure information flow rule. Here, t O ( A ) and t O ( B ) are the owner tag of entity A and B, respectively. Accordingly, the trace data can be used to reveal the actual identity of entity A and B. Under the constraint of this rule, STDSM not only enables secure data flow from sender to receiver but also achieves identity traceability.
Example: Patient Alice (EO) wants to send her health data to Doctor Bob (EU). Alice’s data have labels L S ( A l i c e ) = m e d i c a l ,   a l i c e _ p r i v a t e L I ( A l i c e ) = f r o m _ a l i c e _ d e v i c e :
  • Bob can read the data only if his secrecy label L S ( B o b ) also contains both m e d i c a l and a l i c e _ p r i v a t e ;
  • Bon will accept the data only if his integrity label L I ( B o b ) is a subset of Alice’s, e.g., L I ( B o b ) = { f r o m _ a l i c e _ d e v i c e } , meaning he trusts data from Alice’s device;
  • Regardless of the decision, the trace data ξ records that Alice and Bob attempted this data transfer.
Definition 3 
(label change rule).  L X ( A ) L X ( A ) denotes label change of entity A, which must obey the following:
L X ( A ) L X ( A ) L X ( A ) { t } = L X ( A ) if t P X + ( A ) L X ( A ) { t } = L X ( A ) if t P X ( A ) ,
where X means secrecy (S) or integrity (I). In STDSM, there are declassifier (D) and endorser (E) subjects with the corresponding privileges to change their security context. Furthermore, D and E change their labels with privilege P X ± ( D ) and P X ± ( E ) , respectively.
Example: A declassifier (D) might be a hospital administrator. They have the privilege ( P X + ( D ) ) for a tag d e i d e n t i f i e d . They can add this tag to Alice’s data, effectively lowering its secrecy level from a l i c e _ p r i v a t e to a less sensitive d e i d e n t i f i e d version, allowing it to be used for research.
Definition 4 
(privileges delegation rule). Privilege delegation is intrinsically limited, as entity E can only assign privileges it currently possesses. The security condition for valid delegation requires t P X ± ( E ) , where X represents either secrecy (S) or integrity (I).

4.2. Modeling

The EEC-driven data sharing paradigm is formally modeled with the STDSM model, as shown in Figure 2. The owner subjects labels the shared objects before the objects are outsourced to the edge and cloud. Additionally, the blue and red objects in Figure 2 mean delay-sensitive objects and delay-insensitive objects, respectively. The defined secure rules are deployed in the edge and cloud to prevent the outsourced data from maliciously accessing.

4.3. Workflows

This section depicts the workflows of EEC-driven data sharing using STDSM. There are five entities, namely end owner (EO), end user (EU), trusted authority (TA), edge server (ES), and cloud server (CS), in which TA is introduced to assign the unique ID and compute tags for the other participants.
EO and EU. In the EEC-driven paradigm, EO and EU must register at TA to achieve legal data request and upload. EO first labels the shared data using the distributed security labels and its owner tag, then uploads data to the edge server. EU requests the data it needs from the edge server by sending a request message that contains the security labels and its owner tag.
TA. It is trusted by other participants in the EEC-driven data sharing paradigm, taking charge of user registration and assigning a unique ID to EO, EU, ES, and CS. In particular, TA computes tags for other entities, and it distributes the owner tags simultaneously when it assigns the unique ID to EO and EU, respectively. Moreover, TA also stores the trace data generated based on the owner tags.
ES and CS. They are the honest-but-curious entities; that is, they would honestly enforce the security policies—however, they are curious about the contents of the uploaded data. ES takes charge of storing the delay-sensitive data and providing a delay-sensitive service for the ends. CS provides powerful computation services for the EEC ends and takes charge of the complex computations and analysis tasks.
The workflows, shown in Figure 3, for EEC-driven data sharing by using STDSM are as follows:
(1)
EO and EU are registered at the TA using their attributes, and then TA generates and distributes the unique ID to them. Furthermore, TA also simultaneously computes and distributes the owner tag t O ( E O ) and t O ( E U ) to them, respectively.
(2)
On the EO side, it first aggregates raw data, then requests secrecy L S ( E O ) and integrity labels L I ( E O ) from TA and, finally, labels raw data using L S ( E O ) , L I ( E O ) , and owner tag t O ( E O ) based on the rule of Definition 1. After that, EO uploads the labeled data to ES. In addition, the labels and owner tag are also propagated along with the data.
(3)
Once the labeled data are received, ES first checks the data and determines whether it is delay-sensitive, and if so then ES locally stores the data. Otherwise, ES uploads the received data to the cloud.
(4)
EU first requests secrecy, L S ( E U ) , and integrity labels, L I ( E U ) , from TA, then requests data by sending a request message to ES, in which the EU secrecy label L S ( E U ) , the integrity label L I ( E U ) , and the owner tag t O ( E U ) are contained in the message.
(5)
Once ES has determined that the requested data are delay-sensitive, it then makes a sharing decision by enforcing the secure rules of Definition 2 to 3.
(6)
Subsequently, the trace data are also generated according to t O ( E O ) and t O ( E U ) , and it is stored in TA regardless of the sharing decision. Meanwhile, upon verification of a positive data sharing decision, the requested data are transmitted to the end user. Finally, EU accesses the shared data based on the rule of Definition 4.
(7)
Alternatively, once the requested data are delay-insensitive, ES redirects the data request to the cloud. Then, CS makes a sharing decision by enforcing the secure rules of Definition 2 to 3 to decide whether to share data.
(8)
The trace data are also generated according to t O ( E O ) and t O ( E U ) and are stored in TA regardless of the sharing decision. Meanwhile, upon verification of a positive data sharing decision, the requested data are transmitted to the end user. Finally, EU accesses the shared data based on the rule of Definition 4.
Step (1) and step (2) depict user registration and data labeling. Step (3) depicts data outsource. Step (4) to step (8) depict data request and delivery.

5. Formal Analysis and Verification of STDSM

The present section develops a formal HLPN-based model of STDSM, followed by automated verification through SMT-Lib theorem proving and Z3 solver validation, thereby proving both functional correctness and security guarantees.

5.1. Formal Analysis

Figure 4 presents an HLPN model of STDSM, while Table 2 enumerates place and mappings and Table 3 specifies the employed data types.

5.1.1. Register and Data Labeling

At first, both EO and EU register at TA to acquire the unique ID and owner tag. Subsequently, EO aggregates data and requests security labels and owner tag from TA, and then attaches such labels and tag to data. This procedure is shown in Figure 5.
End data owner and data user register at the trusted authority. The registration outcomes can be successes or failures. The transition o r g s depicts the successful registration of the end data owner, shown as the EO place in Figure 5, in which TA computes ID using the function of GEN_ID() and assigns it to the end data owner. Subsequently, TA computes the owner tag based on the ID using the OWNER_TAG() function and simultaneously distributes it to the end data owner for later usage, as shown in (1). Furthermore, TA generates and maintains a mapping against the end data owner’s ID and owner tag. The constraint must be checked, as the registration outcome in the EO place must be TRUE:
R ( o r g s ) = c C , d D c [ 5 ] = TRUE d [ 1 ] : = c [ 1 ] d [ 2 ] : = c [ 2 ] d [ 4 ] : = G E N _ I D ( [ 2 ] , c [ 1 ] ) c [ 3 ] : = d [ 4 ] d [ 3 ] : = O W N E R _ T A G ( c [ 2 ] , c [ 3 ] ) d [ 5 ] : = M A P ( d [ 3 ] , d [ 4 ] ) C = C { c [ 3 ] , c [ 4 ] } D = D { d [ 1 ] , d [ 2 ] , d [ 3 ] , d [ 4 ] , d [ 5 ] } .
The transition o r g f depicts the failed registration of the end data owner. The rule of the end data owner failed registration is depicted in (2), where the registration outcome is FALSE:
R ( o r g f ) = c C , d D c [ 5 ] = FALSE C = C .
The successful registration of end data user is depicted in u r g s . Similar to (1), the corresponding rule is shown in (3), in which TA generates a unique ID using the GEN_ID() function and assigns it to the end data user. TA computes the owner tag based on the computed ID using the OWNER_TAG() function and simultaneously distributes it to the end data user for later usage. Moreover, TA generates and maintains a mapping against the end data user’s ID and owner tag. The constraint must be checked, as the registration outcome in the EU place must be TRUE:
R ( u r g s ) = e e E E , d d D D e e [ 5 ] = TRUE d d [ 1 ] : = e e [ 1 ] d d [ 2 ] : = e e [ 2 ] d d [ 4 ] : = G E N _ I D ( e e [ 2 ] , e e [ 1 ] ) e e [ 3 ] : = d d [ 4 ] d d [ 3 ] : = O W N E R _ T A G ( e e [ 2 ] , e e [ 3 ] ) d d [ 5 ] : = M A P ( d d [ 3 ] , d d [ 4 ] ) E = E E { e e [ 3 ] , e e [ 4 ] } D D = D D { d d [ 1 ] , d d [ 2 ] , d d [ 3 ] , d d [ 4 ] , d d [ 5 ] } .
As shown in (4), the transition u r g f depicts the failed registration for the end data user, in which the registration result of the end data user is FALSE:
R ( u r g f ) = e e E E , d d D D e e [ 5 ] = FALSE .
Afterward, as shown in (5), the end data owner collects data from the physical world through the sensors on their devices, such as heart rate meter, micro-camera, etc. The transition d c depicts this procedure; the collected data are temporarily stored in their devices, in which the data collection result mapped at TC and EO must be matched, and its value must be TRUE:
R ( d c ) = a A , b B B , a c A C b b [ 5 ] = a a [ 1 ] = TRUE a [ 6 ] : = a c [ 1 ] a [ 7 ] : = a c [ 4 ] a [ 8 ] : = a c [ 2 ] a [ 9 ] : = a c [ 6 ] a [ 10 ] : = a c [ 3 ] b [ 5 ] : = a [ 11 ] A = A { a [ 6 ] , a [ 7 ] , a [ 8 ] , a [ 9 ] , a [ 10 ] } B = B { b [ 5 ] } .
Once the data have been collected, as shown in (6), the end data owner first requests tags from TA, and then TA computes and generates tags and security labels according to data information, using the functions of GEN_TAG(), SEC_LABEL(), and INT_LABEL(), respectively. Finally, TA distributes the security labels to EO:
R ( l r ) = f F , g G f [ 13 ] = g [ 8 ] = T R U E g [ 1 ] : = f [ 8 ] g [ 2 ] : = f [ 10 ] g [ 3 ] : = G E N _ T A G ( f [ 1 ] ) g [ 4 ] : = G E N _ T A G ( f [ 2 ] ) g [ 5 ] : = S E C _ L A B E L ( g [ 3 ] , g [ 7 ] ) g [ 6 ] : = I N T _ L A B E L ( g [ 3 ] , g [ 4 ] , g [ 7 ] ) f [ 14 ] : = g [ 7 ] f [ 15 ] : = g [ 5 ] f [ 16 ] : = g [ 6 ] F = F { f [ 14 ] , f [ 15 ] , f [ 16 ] } G = G { g [ 1 ] , g [ 2 ] , g [ 3 ] , g [ 4 ] , g [ 5 ] , g [ 6 ] , g [ 7 ] } .
As soon as the security labels are received, by executing the DATA_LABELING() function, EO attaches security labels and an owner tag to the collected data, based on their privileges, as shown in (7). The transition d l s depicts the successful data labeling, in which the data labeling result must be TRUE:
R ( d l s ) = h H , j J j [ 8 ] = TRUE   j [ 1 ] : = h [ 4 ] j [ 2 ] : = h [ 15 ] j [ 3 ] : = h [ 16 ] j [ 4 ] : = h [ 6 ] j [ 5 ] : = h [ 10 ] j [ 7 ] : = D A T A _ L A B E L I N G ( h [ 4 ] , h [ 15 ] , h [ 16 ] , h [ 14 ] ) J = J { j [ 1 ] , j [ 2 ] , j [ 3 ] , j [ 4 ] , j [ 5 ] , j [ 7 ] } .
However, data labeling will fail if the data labeling result is checked to be FALSE. The transition dlf depicts this procedure, and the corresponding rule is shown in (8):
R ( dlf ) = h H , k K , j J j [ 8 ] = F A L S E J = J .

5.1.2. Data Outsource

After EO has labeled its aggregated data, it uploads those data to the edge server. Subsequently, those data are stored in the edge server once the received data are checked as delay-sensitive. Otherwise, the labeled data are transferred and stored in the cloud server. This procedure is depicted in HLPN, shown in Figure 6:
The end data owner uploads the labeled data to the edge server. As shown in (9), the transition u p s depicts the successful data upload, in which the security labels and owner tag of the end data owner propagate along with the labeled data:
R ( u p s ) = l L , q Q q [ 8 ] = l [ 8 ] = T R U E   q [ 3 ] : = l [ 9 ] q [ 4 ] : = l [ 10 ] q [ 7 ] : = l [ 7 ] q [ 9 ] : = l [ 2 ] q [ 10 ] : = l [ 3 ] q [ 11 ] : = l [ 1 ] q [ 8 ] : = l [ 8 ] L = L ( l [ 8 ] ) Q = Q { q [ 3 ] , q [ 4 ] , q [ 7 ] , q [ 9 ] , q [ 10 ] , q [ 11 ] } .
When receiving the uploaded data and corresponding information from the end data owner, the edge server first authenticates the end data owner. The transition a u t h o performs successful authentication of the end data owner, in which the constraint is that the authentication result mapped at ATHE, ES, and DC must be matched, and its value must be TRUE. As shown in (10), the edge server is triggered to store or provisionally store the uploaded data after the end data owner is successfully authenticated:
R ( a h t o ) = r R , n N , v V n [ 12 ] = r [ 3 ] = v [ 1 ] = T R U E   r [ 1 ] : = n [ 3 ] r [ 2 ] : = n [ 4 ] n [ 3 ] : = A U T H O ( n [ 3 ] , n [ 4 ] ) n [ 12 ] : = r [ 3 ] v [ 1 ] : = r [ 3 ] N = N ( n [ 12 ] ) R = R { r [ 1 ] , r [ 2 ] , r [ 3 ] } V = V { v [ 1 ] } .
As soon as the end data owner is successfully authenticated, the edge server checks whether the received data are delay-sensitive. As shown in (11), the transition c k s depicts the successful delay-sensitive data checking, in which the edge server first checks the uploaded data with the SENSITIVE_CHECK() function, then locally stores such data once the check result is TRUE. That is, the received data are delay-sensitive; such data are used to provide delay-sensitive service to the end data users:
R ( c k s ) = o O , p P p [ 1 ] = o [ 7 ] = T R U E   p [ 1 ] : = S E N S I T I V E _ C H E C K ( o [ 2 ] , o [ 3 ] ) o [ 7 ] : = p [ 1 ] p [ 2 ] : = o [ 3 ] p [ 3 ] : = o [ 2 ] p [ 4 ] : = o [ 4 ] p [ 5 ] : = o [ 5 ] p [ 6 ] : = o [ 6 ] O = O { o [ 7 ] } P = P { p [ 1 ] , p [ 2 ] , p [ 3 ] , p [ 4 ] , p [ 5 ] , p [ 6 ] } .
Alternatively, the edge server transfers data to the cloud once the delay-sensitive checking result is FALSE; that is, such data are delay-insensitive. As shown in (12), the transition c k f depicts this procedure, in which the received data are transferred to the cloud center and the output of the SENSITIVE_CHECK() must be FALSE:
R ( c k f ) = t T , y Y y [ 1 ] = t [ 7 ] = F A L S E   y [ 1 ] : = S E N S I T I V E _ C H E C K ( t [ 2 ] , t [ 3 ] ) t [ 7 ] : = p [ 1 ] y [ 2 ] : = t [ 3 ] y [ 3 ] : = t [ 2 ] y [ 4 ] : = t [ 4 ] y [ 5 ] : = t [ 5 ] y [ 6 ] : = t [ 6 ] T = T { t [ 7 ] } P = P { y [ 1 ] , y [ 2 ] , y [ 3 ] , y [ 4 ] , y [ 5 ] , y [ 6 ] } .
Data propagation to the cloud is mediated by transition e t c , as shown in (13), with successful transmission contingent upon a TRUE result:
R ( e t c ) = k k K K , n n N N n n [ 13 ] = k k [ 9 ] = T R U E   n n [ 3 ] : = k k [ 7 ] n n [ 4 ] : = k k [ 8 ] n n [ 5 ] : = k k [ 2 ] n n [ 6 ] : = k k [ 3 ] n n [ 7 ] : = k k [ 4 ] n n [ 8 ] : = k k [ 5 ] n n [ 9 ] : = k k [ 6 ] N N = N N { n n [ 3 ] , n n [ 4 ] , n n [ 5 ] , n n [ 6 ] , n n [ 7 ] , n n [ 8 ] , n n [ 9 ] } .
Once the transferred data and corresponding information from the edge server are received, the cloud first authenticates the edge server on transition a t h s e using the AUTH_EDGE() function. Then, the authentication result is also fed to the data center of the cloud shown as place UD in Figure 6. Moreover, the authentication result mapped at the CS place, UD place, and ATHC places must be the same, and its value must be TRUE:
R ( a t h s e ) = s s S S , r r R R , p p P P r r [ 1 ] = p p [ 5 ] = s s [ 14 ] = T R U E   p p [ 3 ] : = s s [ 7 ] p p [ 4 ] : = s s [ 8 ] p p [ 5 ] : = A U T H _ E D G E ( s s [ 7 ] , s s [ 8 ] ) r r [ 1 ] : = p p [ 5 ] s s [ 14 ] : = p p [ 5 ] P P = P P { p p [ 3 ] , p p [ 4 ] , p p [ 5 ] } S S = S S { s s [ 14 ] } R R = R R { r r [ 1 ] } .
Afterwards, the cloud server stores the received data at its data center once the edge server is successfully authenticated. The transition d s depicts this procedure, and its rule is shown in (15):
R ( d s ) = t t T T , u u U U u u [ 2 ] : = t t [ 5 ] u u [ 3 ] : = t t [ 6 ] u u [ 4 ] : = t t [ 7 ] u u [ 5 ] : = t t [ 8 ] u u [ 6 ] : = t t [ 9 ] U U = U U { u u [ 2 ] , u u [ 3 ] , u u [ 4 ] , u u [ 5 ] , u u [ 6 ] } .

5.1.3. Data Request and Delivery

EU requests data that it needs from the edge server through triggering a data request that contains L S ( E U ) , L I ( E U ) , and t O ( E U ) . Subsequently, the edge server authenticates the end data user and searches for the requested data. Once the requested data have been searched, the edge server makes a sharing decision by enforcing the rule in Definition 2. In addition, the trace data are also generated and stored in TA regardless of the data sharing decision. In response, the edge server delivers the requested data to EU once the data sharing decision result is TRUE. Otherwise, the data request is redirected to the cloud. Then, the cloud makes a similar enforcement as that of the edge server to deliver data and generates the trace data. This procedure is depicted in HLPN, shown as Figure 7:
Before requesting data from the edge server, as shown in (16), tags are first computed by TA. Subsequently, TA generates security labels based on the SEC_LABEL() function and the INT_LABEL() function, respectively. Finally, TA distributes such labels to EU:
R ( u r l ) = j k J K , k j K J k j [ 8 ] = j k [ 17 ]   k j [ 1 ] : = j k [ 7 ] k j [ 2 ] : = j k [ 9 ] k j [ 3 ] : = G E N _ T A G ( j k [ 1 ] ) k j [ 4 ] : = G E N _ T A G ( j k [ 2 ] ) k j [ 5 ] : = S E C _ L A B E L ( k j [ 3 ] , k j [ 7 ] ) k j [ 6 ] : = I N T _ L A B E L ( k j [ 3 ] , k j [ 4 ] , k j [ 7 ] ) j k [ 10 ] : = k j [ 5 ] j k [ 11 ] : = k j [ 6 ] j k [ 12 ] : = k j [ 7 ] J K = J K { j k [ 10 ] , j k [ 11 ] , j k [ 12 ] } K J = K J { k j [ 1 ] , k j [ 2 ] , k j [ 3 ] , k j [ 4 ] , k j [ 5 ] , k j [ 6 ] } .
Once the labels are successfully distributed, EU requests data from the edge server by sending a request message that contains L S ( E U ) , L I ( E U ) , and t O ( E U ) , which is depicted in (17):
R ( d r ) = f f F F , g g G G g g [ 5 ] : = f f [ 3 ] g g [ 6 ] : = f f [ 2 ] g g [ 9 ] : = f f [ 14 ] g g [ 10 ] : = f f [ 15 ] g g [ 13 ] : = f f [ 4 ] g g [ 14 ] : = f f [ 7 ] g g [ 15 ] : = f f [ 9 ] G G = G G { g g [ 5 ] , g g [ 6 ] , g g [ 9 ] , g g [ 10 ] , g g [ 13 ] , g g [ 14 ] , g g [ 15 ] } .
As shown in (18), once the data request is received, the edge server first authenticates the end data user, in which process the edge server authenticates EU using the AUTHU() function. In particular, the authentication output mapped at places among ES, ATHE, and DC must be TRUE:
R ( a t h u ) = w W , m M , s S w [ 12 ] = m [ 3 ] = s [ 1 ] = T R U E   m [ 4 ] : = w [ 5 ] m [ 5 ] : = w [ 6 ] m [ 3 ] : = A U T H U ( w [ 5 ] , w [ 6 ] ) w [ 12 ] : = m [ 3 ] s [ 1 ] : = m [ 3 ] W = W ( w [ 12 ] ) M = M { m [ 3 ] , m [ 4 ] , m [ 5 ] , m [ 6 ] } S = S { s [ 1 ] } .
Subsequently, the edge server locally searches data and checks whether the requested data are delay-sensitive and if so then the edge server will outsource those data to EU. As shown in (19), the edge server searches the requested data using the DATA_SEARCH() function and checks the requested data using the SENSITIVE_CHECK() function, respectively. In addition, the data search result and data delay-sensitive checking result must be TRUE:
R ( d s s ) = z Z , x X x [ 7 ] = z [ 8 ] = T R U E z [ 7 ] = x [ 1 ] = T R U E   x [ 8 ] : = z [ 9 ] x [ 7 ] : = D A T A _ S E A R C H ( z [ 9 ] ) z [ 8 ] : = x [ 7 ] x [ 3 ] : = z [ 2 ] x [ 1 ] : = S E N S I T I V E _ C H E C K ( z [ 2 ] , z [ 9 ] ) z [ 7 ] : = x [ 1 ] Z = Z { z [ 7 ] , z [ 8 ] } X = X { x [ 1 ] , x [ 3 ] , x [ 7 ] , x [ 8 ] } .
After that, the edge server makes a data sharing decision by executing the secure trace-supported information flow control rule at its decision point. As shown in (20), the transition d s m e depicts the decision-making procedure, in which the decision point executes the SUBSET_SEC() function, the SUBSET_INT() function, and the DECISION() function to decide whether to agree to provide the requested data to the end data user. The requested data are provided to the requester once the output of the DECISION() function is TRUE. In addition, the trace data are also generated using the TRACE() function and stored at TA regardless of whether or not the decision point agrees to share with the requester. In particular, the value of the data sharing decision output mapped at DPE and TSD places must be TRUE:
R ( d s m e ) = a a A A , b b B B , c c C C b b [ 9 ] = a a [ 9 ] = T R U E   b b [ 7 ] : = S U B S E T _ S E C ( a a [ 4 ] , b b [ 4 ] ) b b [ 8 ] : = S U B S E T _ I N T ( b b [ 5 ] , a a [ 5 ] ) b b [ 9 ] : = D E C I S I O N ( b b [ 7 ] , b b [ 8 ] ) a a [ 9 ] : = b b [ 9 ] c c [ 6 ] : = T R A C E ( a a [ 3 ] , b b [ 6 ] ) C C = C C { c [ 6 ] } A A = A A { a a [ 9 ] } B B = B B { b b [ 7 ] , b b [ 8 ] , b b [ 9 ] } .
When a data sharing decision is TRUE, as shown in (21), the edge server then delivers the shared data to the end data user:
R ( e t u ) = o o O O , i i J J m m [ 9 ] = T R U E   i i [ 6 ] : = m m [ 4 ] i i [ 7 ] : = m m [ 3 ] i i [ 9 ] : = m m [ 8 ] i i [ 10 ] : = m m [ 4 ] i i [ 11 ] : = m m [ 5 ] i i [ 4 ] : = o o [ 6 ] I I = I I { i i [ 4 ] , i i [ 6 ] , i i [ 7 ] , i i [ 9 ] , i i [ 10 ] , i i [ 11 ] } .
Alternatively, if the delay-sensitive checking result is FALSE then the edge server will redirect the data request to the cloud server. As shown in (22), transition r r performs data request redirection, in which all request parameters are sent to the cloud center:
R ( r r ) = o o O O , l l L L o o [ 3 ] : = l l [ 7 ] o o [ 4 ] : = l l [ 8 ] o o [ 10 ] : = l l [ 13 ] o o [ 11 ] : = l l [ 11 ] o o [ 12 ] : = l l [ 12 ] o o [ 15 ] : = l l [ 14 ] O O = O O { o o [ 3 ] , o o [ 4 ] , o o [ 10 ] , o o [ 11 ] , o o [ 12 ] , o o [ 15 ] } .
When the redirected data request is received, as shown in (23), the cloud center first authenticates the end data user using the AUTHU() function. Additionally, the authentication outcome, requiring the value of TRUE, is also fed to the data center of the cloud server:
R ( a t h u ) = x x X X , v v V V , w w W W x x [ 14 ] = w w [ 5 ] = v v [ 1 ] = TRUE   w w [ 6 ] : = x x [ 15 ] w w [ 5 ] : = A U T H U ( x x [ 15 ] ) x x [ 14 ] : = w w [ 5 ] v v [ 1 ] : = w w [ 5 ] V V = V V { v v [ 1 ] } X X = X X { x x [ 14 ] } W W = W W { w w [ 5 ] , w w [ 6 ] } .
Then, the cloud server makes a data sharing decision by executing the trace-supported secure information flow rule after the cloud successfully authenticates the end data user. As shown in (24), the transition d s m c depicts successful decision making in the cloud, in which the decision point executes the SUBSET_SEC() function, the SUBSET_INT() function, and the DECISION() function to decide whether or not to provide the requested data to the data requester. The requested data are provided to EU after the output of the DECISION() function is TRUE. Additionally, the trace data are also generated using the TRACE() function and then stored at TA regardless of whether the sharing decision point of the cloud, shown as the DPC place in Figure 7, agrees to share the requested data with the end data user:
R ( d s m c ) = a b A B , z z Z Z , y y Y Y y y [ 7 ] = z z [ 9 ] = T R U E   z z [ 7 ] : = S U B S E T _ S E C ( y y [ 4 ] , y y [ 4 ] ) z z [ 8 ] : = S U B S E T _ I N T ( y y [ 5 ] , y y [ 5 ] ) z z [ 9 ] : = D E C I S I O N ( z z [ 7 ] , z z [ 8 ] ) y y [ 7 ] : = z z [ 9 ] a b [ 6 ] : = T R A C E ( y y [ 6 ] , z z [ 3 ] ) Y Y = Y Y { y y [ 7 ] } A B = A B { a b [ 6 ] } Z Z = Z Z { z z [ 7 ] , z z [ 8 ] , z z [ 9 ] } .
As shown in (25), the cloud-to-EU data delivery, formalized by transition d t u , is conditionally executed only when the data search operation yields a TRUE verification result:
R ( d t u ) = o o O O , j j J J o o [ 9 ] = T R U E   j j [ 6 ] : = o o [ 2 ] j j [ 7 ] : = o o [ 3 ] j j [ 9 ] : = o o [ 8 ] j j [ 10 ] : = o o [ 4 ] j j [ 11 ] : = o o [ 5 ] j j [ 4 ] : = o o [ 6 ] J J = J J { j j [ 4 ] , j j [ 6 ] , j j [ 7 ] , j j [ 9 ] , j j [ 10 ] , j j [ 11 ] } .
Following the data delivery process, shown in (26), EU retrieves the shared resources through transition u r l :
R ( a c ) = a d A D , e a E A e a [ 1 ] : = a d [ 6 ] e a [ 2 ] : = a d [ 10 ] e a [ 3 ] : = a d [ 11 ] e a [ 4 ] : = a d [ 4 ] e a [ 5 ] : = A C C E S S _ D A T A ( a d [ 6 ] , a d [ 12 ] ) E A = E A { e a [ 1 ] , e a [ 2 ] , e a [ 3 ] , e a [ 4 ] , e a [ 5 ] } .
The systematic enforcement of these transition rules enables secure data sharing between data owners and designated data users.

5.2. Formal Verification

For this section, firstly the security properties of STDSM were specified, and then the security properties of STDSM and its HLPN model, which included transition rules and security constraints, were systematically encoded into SMT-Lib’s array theory. During verification, the QF_AUFLIA logic of SMT-Lib was used for the implementation. Finally, Z3 verified STDSM by taking those implementations as input.

5.2.1. Assertions for Security Properties

To verify the security of STDSM, this paper designed the assertions of data confidentiality, integrity, and identity traceability, which are depicted as follows:
  • Assertion for data confidentiality. Let L S be the secrecy label attached to data d in EEC system S. Data confidentiality is preserved if
    d S , t T , L S ( d , t ) = L s ( d , t 0 ) ,
    where d is the shared data, S means the data set within system, T is the system lifetime, and t 0 is the labeling time. Accordingly, our formal verification adopts this foundational assertion:
    ( assert ( not ( or ( and ( = ( select l   2 ) ( select x   4 ) ) ( = ( select x   4 ) ( select ii   2 ) ) ) ( and ( = ( select l   2 ) ( select uu 4 ) ) ( = ( select uu 4 ) ( select ii 12 ) ) ) ) ) ) ( check - sat ) .
  • Assertion for data integrity. Similarly, let L I be the secrecy label attached to data d in EEC system S. Data integrity is preserved if
    d S , t T , L I ( d , t ) = L I ( d , t 0 ) .
    Accordingly, our formal verification utilizes this foundational assertion:
    ( assert ( not ( or ( and ( = ( select l   3 ) ( select x   5 ) ) ( = ( select x   5 ) ( select ii 13 ) ) ) ( and ( = ( select l   3 ) ( select uu 5 ) ) ( = ( select uu 5 ) ( select ii 13 ) ) ) ) ) ) ( check - sat ) .
  • Assertion for identity traceability. Similarly to the confidentiality and integrity assertions, let t O be the owner tag attached to data d in EEC system S. Identity traceability is preserved if
    d S , t T , τ T , τ ( d , t ) = ( t O ( E O ) , t O ( E U ) , t ) ,
    where t O ( E O ) and t O ( E U ) represent the owner tag of data owner and data user. In STDSM, the shared data are also labeled using the owner tag. Accordingly, our formal verification utilizes this foundational assertion:
    ( assert ( not ( and ( = ( select l   1 ) ( select dd 7 ) ) ( = ( select dd 8 ) ( select ii 4 ) ) ) ) ) ( check - sat ) .

5.2.2. Result

The translated model performed well and produced the expected results with u n s a t within 280 ms during automatic verification in the Z3 solver, which indicates that STDSM satisfies confidentiality, integrity, and identity traceability.

6. Performance Evaluation

6.1. Experimental Setup

For this section, we conducted experiments to evaluate STDSM’s performance based on Python 3.0, which mainly evaluates the time overhead of the secure information flow rule, trace data generation, and identity tracking. During our experiments, a server with Ubuntu 18.04 and a desktop with Windows 11 served as cloud and edge server, respectively. Additionally, EO and EU were equipped with two mobile phones. The detailed implementation environments are shown in Table 4. Furthermore, SHA-256 was used for computing tags and labels, with the number of tags increasing from 5 to 200. All the experimental results were run 100 times, and the average value was taken as the final results. In addition, while evaluating the overhead of the data sharing compared with the related works, the data size was set to increase from 10 MB to 100 MB. Such overhead of all the compared works signified the turnaround time from tag generation to data access.

6.2. Numerical Result

The numerical results mainly consist of STDSM’s performance and comparison of the data sharing overhead, shown in Figure 8 and Figure 9, respectively.
Figure 8a depicts the time overhead of the secure information flow rule execution ( T _ s e ) with varying data users’ attributes, which shows that the time increases with the attributes of the data users. It can also be seen that the label size has less effect for T _ s e . For instance, under 1024 bits tag condition, T _ s e rises from 40 ms to 200 ms. Furthermore, T _ s e is almost stabilized to 115 ms when the number of tags is set to 100. The reason is that secure execution of the information flow control rule is mainly based on the tag number.
Figure 8b shows the time overhead of the trace data generation and identity tracking ( T _ t i ) under varying tag sizes. As for the time overhead of the trace data generation, it slightly increased with increasing tag size. The reason was that the larger tag size took more time to generate trace data. Additionally, Figure 8b further demonstrates that variations in tag size exhibited negligible impact on the time required for identity tracking.
The time overhead of STDSM for sharing data compared with the related works is shown in Figure 9, which demonstrates STDSM took the lowest time overhead. In detail, in DIFC-AC [24] the authorization conditions related to the user roles and attributes were set on each label to restrict data users’ read and write access. Therefore, STDSM reduced the time overhead by up to 14.3% compared with DIFC-AC. Unlike DIFC-AC, both Flowk [25] and Secure-Camflow [26] used the Chinese wall policy (CWP) [36] when sharing data to check the conflict of interests, leading to lower overhead compared with DIFC-AC. Both FlowK and Camflow reduced the time overhead by almost 5.8%. However, Secure-Camflow utilized the lightweight cryptographic primitive, thereby taking almost 1.5% more time overhead compared with FlowK and CamFlow. In addition, Secure-camflow took 14.5% less overhead compared with DIFC-AC. DIFCS [27] took the less overhead compared with DIFC-AC, FlowK, Camflow, and Secure-Camflow. However, STDSM took the lowest time overhead, reducing the time overhead by up to 15% compared with the above four related works.

6.3. Storage Overhead Analysis

Beyond the time overhead evaluation, we analyzed the storage overhead introduced by STDSM’s core components: security labels, owner tags, and trace data. This analysis was crucial for assessing the model’s suitability for resource-constrained environments like the EEC paradigm.
The storage overhead in STDSM primarily originates from three sources:
Security Labels: Each data object is associated with a secrecy label and an integrity label. In our implementation, a label is a set of tags, and each tag is generated as an SHA-256 hash value. The storage required for a single label is 32 × n bytes, where n is the number of tags in that label. Since each data object has two labels, the total storage overhead for labels per data object is 64 × n bytes.
Owner Tag: Each entity (data owner and user) has a unique owner tag, which is also a 256-bit hash. This tag is attached to the data and propagated during the sharing process. The storage overhead for a single owner tag is 32 bytes. For any data sharing transaction, the owner tags of both the data owner and the data user are involved in generating the trace data. However, only the data owner’s tag is physically attached to the data object itself, adding a constant 32 bytes per object.
Trace Data: Trace data is generated for every data access request, regardless of whether it is granted. Each trace record contains the owner tags of the data owner and the data user. A single trace record therefore requires 64 bytes.

6.4. Functional Comparison

This section mainly compares STDSM with the related works [7,25,26,27], shown in Table 5, from the aspects of security functions, such as data confidentiality, data integrity, etc.
STDSM exhibits notable advancements over existing decentralized information flow control (DIFC) models by integrating comprehensive security features with operational efficiency. As summarized in Table 4, while prior approaches including DIFC-AC [24], FlowK [25], DIFCS [27], Camflow [7], and Secure-Camflow [26] provide foundational confidentiality and integrity protections, they uniformly lack inherent identity traceability capabilities. Furthermore, DIFC-AC imposes restrictive, label-centric authorization policies that attenuate scalability and administrative flexibility. Although FlowK and Camflow require operation system integration, they take less overhead, due to the simplified label-based rules. In addition, DIFCS is only used in multi-cloud scenarios with moderate overhead compared with other models. In contrast, STDSM introduces a novel owner tag mechanism coupled with trace data recording, enabling robust user identity tracking without necessitating additional label constraints. STDSM supports dynamic authorization while maintaining minimal operational overhead. Consequently, STDSM represents a substantively improved framework, while maintaining stringent security guarantees and superior performance metrics.

7. Conclusions and Discussions

This paper proposes STDSM, a symmetry-enhanced model, to secure EEC-driven paradigm data sharing based on DIFC. STDSM leverages the symmetry between dual security labels and the balance between data sharing and traceability to allow end data owners to securely share their data. By enforcing the designed secure data flow rules, symmetrical control over data outflow and inflow is achieved. We presented a novel formal verification methodology integrating HLPN, SMT-Lib, and Z3, which not only proves the security properties of STDSM but also provides a re-usable and automated framework for rigorously analyzing DIFC-based schemes. Our formal verification results reveal that STDSM has the aforementioned security properties. Performance evaluation was conducted, thereby demonstrating that STDSM can reduce time overhead by up to 15% when sharing data compared with the related works.
From a theoretical perspective, STDSM is expected to perform well in extensive IoT deployments. Computationally, the core security decision relies on set inclusion checks with complexity linearly related to the number of tags. In terms of communication, the security labels and owner tags are of fixed size, introducing constant overhead. However, we acknowledge the primary limitations of this work. Firstly, the empirical validation was constrained to a controlled testbed, leaving its scalability in large-scale, consumption-of-end-devices, real-world deployments unproven. Secondly, this paper does not account for a compromised TA in real and extensive IoT deployment. Lastly, the trace data are stored in a trusted TA, which does not consider the task offloading for TA.
In the near future, by considering a compromised TA, task offloading for TA, and integrating STDSM with Blockchain, hash chain, and policy hidden mechanism, STDSM will be practically implemented in more complex EEC-driven data sharing scenarios, such as intelligent remote healthcare, ad hoc networks, and industrial IoT, to evaluate its effectiveness and practicality.

Author Contributions

Methodology, J.L. (Jintian Lu), J.T. and J.L. (Jianfeng Li); formal analysis, C.Y.; investigation, M.Q. and H.L.; writing—original draft preparation, M.Q.; writing—review and editing, M.Q., C.Y. and H.L.; project administration, J.L. (Jintian Lu); supervisor, J.T. and J.L. (Jianfeng Li). All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of Hunan Province, China, grant numbers 2025JJ60413, 2025JJ60924.

Data Availability Statement

Data are available on request, due to privacy and copyrights.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Aouedi, O.; Vu, T.H.; Sacco, A.; Nguyen, D.C.; Piamrat, K.; Marchetto, G.; Pham, Q.V. A survey on intelligent Internet of Things: Applications, security, privacy, and future directions. IEEE Commun. Surv. Tutor. 2024, 27, 1238–1292. [Google Scholar] [CrossRef]
  2. Huang, Z.; Zhang, Z.; Hua, C.; Liao, B.; Li, S. Leveraging enhanced egret swarm optimization algorithm and artificial intelligence-driven prompt strategies for portfolio selection. Sci. Rep. 2024, 14, 26681. [Google Scholar] [CrossRef]
  3. Liao, B.; Han, L.; Cao, X.; Li, S.; Li, J. Double integral-enhanced Zeroing neural network with linear noise rejection for time-varying matrix inverse. CAAI Trans. Intell. Technol. 2024, 9, 197–210. [Google Scholar] [CrossRef]
  4. Lu, J.; Li, W.; Sun, J.; Xiao, R.; Liao, B. Secure and real-time traceable data sharing in cloud-assisted IoT. IEEE Internet Things J. 2024, 11, 6521–6536. [Google Scholar] [CrossRef]
  5. Wang, C.; Wang, Y.; Yuan, Y.; Peng, S.; Li, G.; Yin, P. Joint computation offloading and resource allocation for end-edge collaboration in internet of vehicles via multi-agent reinforcement learning. Neural Netw. 2024, 179, 106621. [Google Scholar] [CrossRef]
  6. Duan, S.; Wang, D.; Ren, J.; Lyu, F.; Zhang, Y.; Wu, H.; Shen, X. Distributed Artificial Intelligence Empowered by End-Edge-Cloud Computing: A Survey. IEEE Commun. Surv. Tutor. 2022, 25, 591–624. [Google Scholar] [CrossRef]
  7. Pasquier, T.F.M.; Singh, J.; Eyers, D.; Bacon, J. CamFlow: Managed data-sharing for cloud services. IEEE Trans. Cloud Comput. 2015, 5, 472–484. [Google Scholar] [CrossRef]
  8. Zhang, T.; Jiang, M.; Luo, F.; Guo, Y. A lattice-based puncturable CP-ABE scheme with forward security for cloud-assisted IoT. IEEE Internet Things J. 2025, 12, 26538–26554. [Google Scholar] [CrossRef]
  9. Weng, J.; Lai, J. Proxy re-encryption. In Encyclopedia of Cryptography, Security and Privacy; Springer: Cham, Switzerland, 2025; pp. 1992–1997. [Google Scholar] [CrossRef]
  10. Elhabob, R.; Eltayieb, N.; Xiong, H.; Kumari, S. Equality test on identity-based encryption with cryptographic reverse firewalls for telemedicine systems. IEEE Internet Things J. 2024, 12, 2106–2121. [Google Scholar] [CrossRef]
  11. Zhang, L.; Peng, M.; Wang, W.; Jin, Z.; Su, Y.; Chen, H. Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing. Trans. Emerg. Telecommun. Technol. 2021, 32, e4315. [Google Scholar] [CrossRef]
  12. Vacca, A.; Di Sorbo, A.; Visaggio, C.A.; Canfora, G. A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges. J. Syst. Softw. 2021, 174, 110891. [Google Scholar] [CrossRef]
  13. Hu, T.; Liu, X.; Chen, T.; Zhang, X.; Huang, X.; Niu, W.; Lu, J.; Zhou, K.; Liu, Y. Transaction-based classification and detection approach for Ethereum smart contract. Inf. Process. Manag. 2021, 58, 102462. [Google Scholar] [CrossRef]
  14. Fan, K.; Pan, Q.; Wang, J.; Liu, T.; Li, H.; Yang, Y. Cross-domain based data sharing scheme in cooperative edge computing. In Proceedings of the 2018 IEEE International Conference on Edge Computing (EDGE), San Francisco, CA, USA, 2–7 July 2018; pp. 87–92. [Google Scholar] [CrossRef]
  15. Lin, Y.; Xiong, H.; Su, H.; Yeh, K.H. Multi-Authority CP-ABE Scheme With Cryptographic Reverse Firewalls for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2015, 26, 5348–5359. [Google Scholar] [CrossRef]
  16. Ding, R.; Zhong, H.; Ma, J.; Liu, X.; Ning, J. Lightweight privacy-preserving identity-based verifiable IoT-based health storage system. IEEE Internet Things J. 2019, 6, 8393–8405. [Google Scholar] [CrossRef]
  17. Liu, W.; You, L.; Shao, Y.; Shen, X.; Hu, G.; Shi, J.; Gao, S. From accuracy to approximation: A survey on approximate homomorphic encryption and its applications. Comput. Sci. Rev. 2025, 55, 100689. [Google Scholar] [CrossRef]
  18. Xie, J.; Guo, D.; Shi, X.; Cai, H.; Qian, C.; Chen, H. A fast hybrid data sharing framework for hierarchical mobile edge computing. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 2609–2618. [Google Scholar] [CrossRef]
  19. Xie, M.; An, B.; Jia, X.; Zhou, M.; Lu, J. Simultaneous update of sensing and control data using free-ride codes in vehicular networks: An age and energy perspective. Comput. Netw. 2024, 252, 110667. [Google Scholar] [CrossRef]
  20. Zuo, Y.; Dai, C.; Guo, J.; Guo, Z.; Xiao, F.; Jin, S. Secure data sharing for autonomous vehicles in mobile blockchain networks. IEEE Netw. 2025, 39, 166–175. [Google Scholar] [CrossRef]
  21. Liu, H.; Zhang, P.; Pu, G.; Yang, T.; Maharjan, S.; Zhang, Y. Blockchain empowered cooperative authentication with data traceability in vehicular edge computing. IEEE Trans. Veh. Technol. 2020, 69, 4221–4232. [Google Scholar] [CrossRef]
  22. Myers, A.C.; Liskov, B. A decentralized model for information flow control. ACM SIGOPS Oper. Syst. Rev. 1997, 31, 129–142. [Google Scholar] [CrossRef]
  23. Myers, A.C.; Liskov, B. Complete, safe information flow with decentralized labels. In Proceedings of the Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186), Oakland, CA, USA, 6 May 1998; pp. 186–197. [Google Scholar] [CrossRef]
  24. Ye, Z.; Ye, J. DIFC-AC: Information pravicy protection for colud computing system. Comput. Appl. Softw. 2013, 30, 30–34. [Google Scholar] [CrossRef]
  25. Pasquier, T.F.; Bacon, J.; Eyers, D. Flowk: Information flow control for the cloud. In Proceedings of the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, Singapore, 15–18 December 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 70–77. [Google Scholar] [CrossRef]
  26. Khurshid, A.; Khan, A.N.; Khan, F.G.; Ali, M.; Shuja, J.; Khan, A.u.R. Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs. Concurr. Comput. Pract. Exp. 2019, 31, e4729. [Google Scholar] [CrossRef]
  27. Lu, J.; Sun, J.; Xiao, R.; Jin, S. DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control. Comput. Secur. 2022, 117, 102678. [Google Scholar] [CrossRef]
  28. Alam, Q.; Tabbasum, S.; Malik, S.U.; Alam, M.; Ali, T.; Akhunzada, A.; Khan, S.U.; Vasilakos, A.V.; Buyya, R. Formal verification of the xDAuth protocol. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1956–1969. [Google Scholar] [CrossRef]
  29. Alam, Q.; Malik, S.U.; Akhunzada, A.; Choo, K.K.R.; Tabbasum, S.; Alam, M. A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1259–1268. [Google Scholar] [CrossRef]
  30. Peterson, J.L. Petri Nets. ACM Comput. Surv. 1977, 9, 223–252. [Google Scholar] [CrossRef]
  31. Murata, T. Petri nets: Properties, analysis and applications. Proc. IEEE 1989, 77, 541–580. [Google Scholar] [CrossRef]
  32. Anjum, A.; Malik, S.u.R.; Choo, K.K.R.; Khan, A.; Haroon, A.; Khan, S.; Khan, S.U.; Ahmad, N.; Raza, B. An efficient privacy mechanism for electronic health records. Comput. Secur. 2018, 72, 196–211. [Google Scholar] [CrossRef]
  33. Kanwal, T.; Anjum, A.; Malik, S.U.; Sajjad, H.; Khan, A.; Manzoor, U.; Asheralieva, A. A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes. Comput. Secur. 2021, 105, 102224. [Google Scholar] [CrossRef]
  34. Barrett, C.; Stump, A.; Tinelli, C. The smt-lib standard: Version 2.0. In Proceedings of the 8th International Workshop on Satisfiability Modulo Theories, Edinburgh, UK, 14–15 July 2010; Volume 13, p. 14. Available online: https://smtlib.cs.uiowa.edu/papers/smt-lib-reference-v2.6-r2021-05-12.pdf (accessed on 10 July 2025).
  35. Moura, L.d.; Bjørner, N. Z3: An efficient SMT solver. In Proceedings of the International conference on Tools and Algorithms for the Construction and Analysis of Systems, Budapest, Hungary, 29 March–6 April 2008; pp. 337–340. [Google Scholar] [CrossRef]
  36. Tu, H.; Xiang, D.; Ding, Z.; Liu, G. Detecting Information Leakage Against Chinese Wall Policy Based on the Unfolding Technique of Colored Petri Nets. IEEE Trans. Comput. Soc. Syst. 2025, 12, 2108–2119. [Google Scholar] [CrossRef]
Figure 1. The three-layers End–Edge–Cloud paradigm.
Figure 1. The three-layers End–Edge–Cloud paradigm.
Symmetry 17 01771 g001
Figure 2. STDSM-based modeling for EEC-driven data sharing paradigm.
Figure 2. STDSM-based modeling for EEC-driven data sharing paradigm.
Symmetry 17 01771 g002
Figure 3. The workflows of sharing data using STDSM.
Figure 3. The workflows of sharing data using STDSM.
Symmetry 17 01771 g003
Figure 4. The HLPN model of STDSM.
Figure 4. The HLPN model of STDSM.
Symmetry 17 01771 g004
Figure 5. The HLPN model of register and data labeling.
Figure 5. The HLPN model of register and data labeling.
Symmetry 17 01771 g005
Figure 6. The HLPN model of data outsource.
Figure 6. The HLPN model of data outsource.
Symmetry 17 01771 g006
Figure 7. The HLPN model of data request and delivery.
Figure 7. The HLPN model of data request and delivery.
Symmetry 17 01771 g007
Figure 8. STDSM’s performance: (a) time overhead of secure information flow rule execution; (b) time overhead of trace data generation and identity tracking.
Figure 8. STDSM’s performance: (a) time overhead of secure information flow rule execution; (b) time overhead of trace data generation and identity tracking.
Symmetry 17 01771 g008
Figure 9. Overhead comparison.
Figure 9. Overhead comparison.
Symmetry 17 01771 g009
Table 1. Mechanistic comparison of traceability support in DIFC models.
Table 1. Mechanistic comparison of traceability support in DIFC models.
Model/SchemeCore Enforcement MechanismApplication Scenario
DIFC-AC [24]security labels + authorization conditionsPaaS cloud
FlowK [25]security Labels + OS-level enforcementPaaS cloud
Camflow [7]security labels + OS-level enforcementPaaS cloud
Secure-Camflow [26]security labels + cryptographyCloud-assisted IoT
DIFCS [27]security labels + privilege delegationMulti-clouds
STDSM (Ours)symmetrical labels + owner tagsEEC Paradigm
Table 2. The places and their mappings.
Table 2. The places and their mappings.
PlacesDescriptionExplanation
φ ( E O ) P ( o _ a t t r i b u t e × o _ i n f o . ×   o _ i d × o _ o w n e r _ t a g × o _ r g _ r e s u l t × o _ d a t a × o _ d a t a _ t i m e × o _ d a t a _ t y p e × o _ d a t a _ d e s c r i p t i o n × o _ d a t a _ n a m e × o _ d a t a _ r e s u l t × o _ p r i v i l e g e s × o _ l a b e l _ r e s u l t × o _ p r i v i l e g e × o _ s e c r e c y _ l a b e l × o _ i n t e g r i t y _ l a b e l ) End data owner’s attributes
φ ( T A ) P ( t _ e _ a t t r i b u t e × t _ c _ i n f o . ×   t _ o w n e r _ t a g × t _ o i d × t _ I O _ m a p p i n g × t _ t r a c e _ d a t a × t _ o _ o w n e r _ t a g × t _ u _ o w n e r _ t a g ) Attributes of TA
φ ( E U ) P ( u _ a t t r i b u t e × u _ i n f o . ×   u _ i d × u _ o w n e r _ t a g × u _ r e s u l t × u _ d a t a × u _ d a t a _ t y p e × u _ d a t a _ d e s c r i p t i o n × u _ d a t a _ n a m e × u _ i n t e g r i t y _ t a g × u _ s e c r e c y _ l a b e l × u _ i n t e g r i t y _ l a b e l × u _ p r i v i l e g e ) End data user’s attributes
φ ( S D ) P ( d a t a × d a t a _ t y p e × d a t a _ n a m e × d a t a _ t i m e × d a t a _ n a m e × d a t a _ d e s c r i p t i o n ) Attributes of the shared data
φ ( L C ) P ( l c _ d a t a _ t y p e × l c _ d a t a _ n a m e × l c _ t a g × l c _ t a g × l c _ s e c r e c y _ l a b e l × l c _ i n t e g r i t y _ l a b e l × l c _ p r i v i l e g e × l c _ r e s u l t ) Attributes of TA’s label center
φ ( L D ) P ( l _ o w n e r _ t a g × l _ s e c r e c y _ l a b e l × l _ i n t e g r i t y _ l a b e l × l _ d a t a × l _ d a t a _ n a m e × l _ d a t a _ t i m e × l _ l a b e l e d _ d a t a × l _ d a t a _ r e s u l t × l _ o _ i d × l _ o _ i n f o . ) Attributes of the labeled data
φ ( E S ) P ( e s _ i d × e s _ i n f o . ×   e s _ o _ i d × e s _ o _ i n f o . ×   e s _ u _ i d × e s _ u _ i n f o . ×   e s _ d a t a × e s _ u p l o a d _ r e s u l t × e s _ s e c r e c y _ l a b e l × e s _ i n t e g r i t y _ l a b e l × e s _ o _ o w n e r _ t a g × e s _ a u t h _ r e s u l t × e s _ u _ o w n e r _ t a g × e s _ d a t a _ t y p e × e s _ d a t a _ n a m e × e s _ a c c e s s _ r e s u l t ) Attributes of the edge server
φ ( A T H E ) P ( a e _ o _ i d × a e _ o _ i n f o . ×   a e _ r e s u l t × a e _ u _ i d × a e _ u _ i n f o . ) Holds attributes of authentication center on edge
φ ( D C ) P ( d c _ a u t h _ r e s u l t × d c _ d a t a _ t y p e × d c _ l a b e l e d _ d a t a × d c _ s e c r e c y _ l a b e l × d c _ i n t e g r i t y _ l a b e l × d c _ o _ o w n e r _ t a g × d c _ s e n s i t i v e _ r e s u l t × d c _ s e a r c h _ r e s u l t × d c _ d a t a _ n a m e ) Attributes of edge server’s data center
φ ( T S D ) P ( t s _ s e n s i t i v e _ r e s u l t × t s _ l a b e l e d _ d a t a × t s _ d a t a _ t y p e × t s _ s e c r e c y _ l a b e l × t s _ i n t e g r i t y _ l a b e l × t s _ o _ o w n e r _ t a g × t s _ s e a r c h _ r e s u l t × t s _ d a t a _ n a m e × t s _ d e c i s i o n _ r e s u l t × × t s _ e s _ a c c e s s _ r e s u l t × t s _ e s _ a c c e s s _ f a l s e ) Attributes of the time-sensitive data
φ ( F D ) P ( f d _ s e n s i t i v e _ r e s u l t × f d _ l a b e l e d _ d a t a × f d _ d a t a _ t y p e × f d _ s e c r e c y _ l a b e l × f d _ i n t e g r i t y _ l a b e l × f d _ o _ o w n e r _ t a g × f d _ i d × f d _ i n f o . ×   f d _ t r a n s f e r _ r e s u l t × f d _ d a t a _ n a m e × f d _ u _ s e c r e c y _ l a b e l × f d _ u _ i n t e g r i t y _ l a b e l × f d _ u _ o w n e r _ t a g × f d _ u _ i d ) Attributes of the forwarded data
φ ( C S ) P ( C s _ i d × c s _ i n f o . ×   c s _ e _ i d × c s _ e _ i n f o . ×   c s _ l a b e l e d _ d a t a × c s _ d a t a _ t y p e × c s _ s e c r e c y _ l a b e l × c s _ i n t e g r t i y _ l a b e l × c s _ e _ o w n e r _ t a g × c s _ u _ o w n e r _ t a g × c s _ u _ s e c r e c y _ l a b e l × c s _ u _ i n t e g r i t y _ l a b e l × c s _ t r a n s f e r _ r e s u l t × c s _ a u t h _ r e s u l t × c s _ u _ i d × c s _ a c c e s s _ r e s u l t ) Attributes of the cloud
φ ( A T H C ) P ( a _ c i d × a _ i n f o . ×   a _ e _ i d × a _ e _ i n f o × a _ a u t h _ r e s u l t × a _ u _ i d ) Attributes of authentication center on edge
φ ( U D ) P ( u d _ a u t h _ r e s u l t × u d _ l a b e l e d _ d a t a × u d _ d a t a _ t y p e × u d _ s e c r e c y _ l a b e l × u d _ i n t e g r t i y _ l a b e l × u d _ e _ o w n e r _ t a g × u d _ d e c i s i o n _ r e s u l t × u d _ d a t a _ n a m e × u d _ s e a r c h _ r e s u l t × c s _ a c c e s s _ r e s u l t × c s _ a c c e s s _ f a l s e ) Attributes of received data
φ ( D P E ) P ( p e _ o _ s e c r e c y _ l a b e l × p e _ o _ i n t e g r i t y _ l a b e l × p e _ o _ o w n e r _ t a g × p e _ u _ s e c r e c y _ l a b e l × p e _ u _ i n t e g r i t y _ l a b e l × p e _ o _ o w n e r _ t a g × p e _ s c r e c y _ r e s u l t × p e _ i n t e g r i t y _ r e s u l t × p e _ d e c i s i o n _ r e s u l t × p e _ t r a c e _ d a t a ) Attributes of the decision point on edge
φ ( D P C ) P ( p c _ o _ s e c r e c y _ l a b e l × p c _ o _ i n t e g r i t y _ l a b e l × p c _ o _ o w n e r _ t a g × p c _ u _ s e c r e c y _ l a b e l × p c _ u _ i n t e g r i t y _ l a b e l × p c _ o _ o w n e r _ t a g × p c _ s c r e c y _ r e s u l t × p c _ i n t e g r i t y _ r e s u l t × p c _ d e c i s i o n _ r e s u l t × p c _ t r a c e _ d a t a ) Attributes of the decision point on cloud
φ ( A D ) P ( l a b e l e d _ d a t a × s _ l a b e l × i _ l a b e l × o _ t a g × d a t a ) Attributes of shared data
Table 3. Data types used in STDSM.
Table 3. Data types used in STDSM.
ItemsTypes
attribute(s)A string type for attributes
info.A string type for information
idAn integrity number type for identity
tagA string type for tags
labelA string type for security labels
resultA Boolean type for authentication result, tag generation result, etc.
dataA data type for IoT data
timeA date type for time
descriptionA string type for the description of IoT data
nameA string type for the name of IoT data
privilegesAn enumeration type for security privileges
mappingA string type for the places mappings
Table 4. Experimental implementation environments.
Table 4. Experimental implementation environments.
DevicesCPUMemorySystem
Mobile phonesKirin 7104 GBAndroid 8
Snapdragon 7506 GBAndroid 10
DesktopIntel i7-880932 GBWindows 11
LaptopIntel i7-7560U16 GBWindows 11
ServerGold-6330256 GBUbuntu 18.04
Table 5. Functions comparison with related works.
Table 5. Functions comparison with related works.
ModelsComparison Items
C I T Auth. Sca. Trade-Offs/Limitations
DIFC-AC [24]×LimitedLimitedOS kernel and highest overhead.
Flowk [25]×SupportedHighOS kernel and mod. overhead.
Camflow [7]×SupportedHighOS kernel and mod. overhead.
Secure-
Camflow [26]×SupportedHighCry. with higher overhead.
DIFCS [27]×SupportedHighMulti-clouds and less overhead.
STDSMSupportedHighCTA and lowest overhead.
Note: C: Confidentiality; I: Integrity; T: Traceability; OS: Operation System; Auth.: Authorization; Sca.: Scalability; Cry.: cryptography; mod.: moderate; CTA: Centralized Trusted Authority.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lu, J.; Yu, C.; Qi, M.; Luo, H.; Tian, J.; Li, J. A Symmetry-Enhanced Secure and Traceable Data Sharing Model Based on Decentralized Information Flow Control for the End–Edge–Cloud Paradigm. Symmetry 2025, 17, 1771. https://doi.org/10.3390/sym17101771

AMA Style

Lu J, Yu C, Qi M, Luo H, Tian J, Li J. A Symmetry-Enhanced Secure and Traceable Data Sharing Model Based on Decentralized Information Flow Control for the End–Edge–Cloud Paradigm. Symmetry. 2025; 17(10):1771. https://doi.org/10.3390/sym17101771

Chicago/Turabian Style

Lu, Jintian, Chengzhi Yu, Menglong Qi, Han Luo, Jie Tian, and Jianfeng Li. 2025. "A Symmetry-Enhanced Secure and Traceable Data Sharing Model Based on Decentralized Information Flow Control for the End–Edge–Cloud Paradigm" Symmetry 17, no. 10: 1771. https://doi.org/10.3390/sym17101771

APA Style

Lu, J., Yu, C., Qi, M., Luo, H., Tian, J., & Li, J. (2025). A Symmetry-Enhanced Secure and Traceable Data Sharing Model Based on Decentralized Information Flow Control for the End–Edge–Cloud Paradigm. Symmetry, 17(10), 1771. https://doi.org/10.3390/sym17101771

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop