Quantum-Enhanced Security Advances for Cloud Computing Environments

被引:0
作者
Swetha, Devulapally [1 ]
Mohiddin, Dr. Shaik Khaja [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur, Andhra Pradesh, India
[2] Koneru Lakshmaiah Educ Fdn, Dept CSE, Guntur, Andhra Pradesh, India
关键词
Quantum-enhanced security; cloud computing; quantum key distribution; advanced encryption standard; key management;
D O I
10.14569/IJACSA.2024.01506118
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent developments in quantum-enhanced security have demonstrated encouraging promise for enhancing cloud computing environments' security. Utilizing quantum physics, in particular Quantum Key Distribution (QKD), provides a new method for generating cryptographic keys and improves cloud data transport security. The present study offers a thorough investigation of the integration of QKD with conventional encryption techniques, including Advanced Encryption Standard (AES), in order to tackle the dynamic cyber security scenario in cloud computing. The approach entails combining AES for encryption and decryption procedures and establishing a QKD layer within the cloud architecture to produce true quantum keys utilizing Quantum in Cloud technology. Data transmission security is greatly improved by the smooth integration of AES with QKD-generated keys, guaranteeing confidentiality, integrity, and authenticity. In addition, strong key management practices are put in place to handle cryptographic keys safely at every stage of their lifespan, reducing the possibility of unwanted access or interception. The suggested approach successfully addresses the difficulties presented by cyber threats by offering a robust and flexible means of enhancing security in cloud-based systems. Using both traditional and quantum encryption methods, this strategy provides a strong barrier against cyber-attacks, data leaks, and other security flaws. After 70 simulation rounds, the suggested strategy, which is implemented using the QKD-AES framework in Python software, achieved a data access rate of 820 MB/s. In addition to providing an accurate and quantitative assessment of the performance, this also exhibits a high data access rate attained under simulated conditions. At 15 milliseconds, the key generation time was achieved with efficiency, guaranteeing the quick creation of secure cryptographic keys in cloud environments. Overall, there is a lot of potential in using quantum-enhanced security techniques to protect sensitive data and guarantee the integrity of cloud computing infrastructures.
引用
收藏
页码:1162 / 1171
页数:10
相关论文
共 21 条
[1]   QUANTUM-BASED PRIVACY-PRESERVING TECHNIQUES FOR SECURE AND TRUSTWORTHY INTERNET OF MEDICAL THINGS: AN EXTENSIVE ANALYSIS [J].
Dhinakaran, D. ;
Srinivasan, L. ;
Sankar, S. M. Udhaya ;
Selvaraj, D. .
QUANTUM INFORMATION & COMPUTATION, 2024, 24 (3-4) :227-266
[2]  
Dhinakaran D., Int. J. Intell. Syst. Appl. Eng.
[3]   Quantum enhanced optical sensors in data optimization for huge communication network [J].
Gao, Lin'e ;
Nan, Yahui .
OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (03)
[4]   Modern computing: Vision and challenges [J].
Gill, Sukhpal Singh ;
Wu, Huaming ;
Patros, Panos ;
Ottaviani, Carlo ;
Arora, Priyansh ;
Pujol, Victor Casamayor ;
Haunschild, David ;
Parlikad, Ajith Kumar ;
Cetinkaya, Oktay ;
Lutfiyya, Hanan ;
Stankovski, Vlado ;
Li, Ruidong ;
Ding, Yuemin ;
Qadir, Junaid ;
Abraham, Ajith ;
Ghosh, Soumya K. ;
Song, Houbing Herbert ;
Sakellariou, Rizos ;
Rana, Omer ;
Rodrigues, Joel J. P. C. ;
Kanhere, Salil S. ;
Dustdar, Schahram ;
Uhlig, Steve ;
Ramamohanarao, Kotagiri ;
Buyya, Rajkumar .
TELEMATICS AND INFORMATICS REPORTS, 2024, 13
[5]   IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Blockchain-Based Approach Toward a Trustworthy Cloud Computing [J].
Irshad, Reyazur Rashid ;
Hussain, Shahid ;
Hussain, Ihtisham ;
Nasir, Jamal Abdul ;
Zeb, Asim ;
Alalayah, Khaled M. ;
Alattab, Ahmed Abdu ;
Yousif, Adil ;
Alwayle, Ibrahim M. .
IEEE ACCESS, 2023, 11 :105479-105498
[6]  
kaggle, Cloud workload
[7]  
Khakim L., 2020, IOP Conference Series: Materials Science and Engineering, V732, DOI 10.1088/1757-899X/732/1/012044
[8]  
Khan K, Quantum Machine Learning Revolution: Optimizing Adaptive Video Streaming Through the Power of Quantum Computing, V6
[9]   Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment [J].
Khan, Naveed ;
Zhang, Jianbiao ;
Ullah, Intikhab ;
Pathan, Muhammad Salman ;
Lim, Huhnkuk .
CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01) :35-49
[10]  
Kumar YK, 2020, Int J Electrical and Comp Eng, V10, P530, DOI [10.11591/ijece, DOI 10.11591/IJECE]