Total views : 195

Cryptography as a Service (CaaS): Quantum Cryptography for Secure Cloud Computing

Affiliations

  • Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  • Department of Information Teachnology, Central Univerity of Kashmir, Nowgam Campus-II, (Near Puhroo Chowk, Nowgam Bye Pass), Srinagar – 190015, Jammu and Kashmir, India

Abstract


Cloud Computing is an emerging technology nowadays. Due to the accessibility, availability, and cost effectiveness, cloud computing has became essential computing system in both, private and public sectors. However, secure data transfer is still a big question where transferring link between user and server are not stabilized yet. As a result, many cloud users lost their valuable data. However, this paper proposes as integrated service of Advanced Quantum Cryptography with Cloud Computing. To ensure the secure Cloud Environment between sender and receiver, Quantum Cryptography proposes the use of photons and physics to generate cryptographic keys.

Keywords

Cloud Computing, Cryptography, Cloud, Quantum Cryptography.

Full Text:

 |  (PDF views: 241)

References


  • Grodzinsky FS, Wolf MJ, Miller KW. Quantum computing and cloud computing: humans trusting humans
  • via machines. In Institute of Electrical and Electronics Engineers (IEEE) International Symposium on Technology and Society (ISTAS); 2011 May 23–25. p. 1–5. Crossref
  • A Microsoft Research Report. Achieving data privacy in cloud: study of information technology privacy and compliance of small to medium-sized organizations in the united state. In Independently Conducted by Ponemon Institute LLC; 2012 Jun. p. 2–14.
  • Chen CY, Zeng GJ, Lin F, Chou YH, Chao HC. Quantum cryptography and its applications over the internet. Institute of Electrical and Electronics Engineers (IEEE) Network. 2015 Sep; 29(5):64–9. Crossref
  • Li J, Chen S, Song D. Security structure of cloud storage based on homomorphic encryption scheme. In Institute of Electrical and Electronics Engineers (IEEE) 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS). 2012 Oct 30 – Nov 1; 1:224–7.Crossref
  • Ghernaouti-Helie S, Sfaxi MA. Sharing information using quantum cryptography to reach the unconditional security. In Institute of Electrical and Electronics Engineers (IEEE) International Conference on Research, Innovation and Vision for the Future; 2007 Mar 5–9. p. 175–80. Crossref
  • Saroj SK, Chauhan SK, Sharma AK, Vats S. Threshold cryptography based data security in cloud computing. In Institute of Electrical and Electronics Engineers (IEEE) International Conference on Computational Intelligence Communication Technology (CICT); 2015 Feb 13–14. p. 202–7. Crossref
  • Singh H, Sachdev A. The quantum way of cloud computing. In International Conference on Optimization, Reliabilty, and Information Technology (ICROIT); 2014 Feb 6–8. p. 397–400. Crossref
  • Jaber AN, Zolkipli MFB. Use of cryptography in cloud computing. In Institute of Electrical and Electronics Engineers (IEEE) International Conference on Control System, Computing and Engineering (ICCSCE); 2013 Nov 29 – Dec 1. p. 179–84. Crossref
  • Sharma RD, De A. A new secure model for quantum key distribution protocol. In 6th Institute of Electrical and Electronics Engineers (IEEE) International Conference on Industrial and Information Systems (ICIIS); 2011 Aug 16–19. p. 462–6. Crossref
  • Ghonaimy MA. An overview of quantum information systems. In 8th International Conference on Computer Engineering Systems (ICCES); 2013 Nov 26–28. p. xx–xxxii. Crossref
  • Kaaniche N, Boudguiga A, Laurent M. ID based cryptography for cloud data storage. In Institute of Electrical and Electronics Engineers (IEEE) Sixth International Conference on Cloud Computing (CLOUD); 2013 Jun 28 – Jul 3. p. 375–82. Crossref
  • Grodzinsky FS, Wolf MJ, Miller KW. Quantum computing and cloud computing: humans trusting humans via machines. In Institute of Electrical and Electronics Engineers (IEEE) International Symposium on Technology and Society (ISTAS); 2011 May 23–25. p. 1–5. Crossref
  • Kollmitzer, Christian, Pivk, Mario. Applied quantum cryptography. Lecture notes in Physics, Springer. 2010; 797:23–47. Crossref
  • Liu F, Li H. Social network-based quantum trust management. In 2nd International Conference on Computer Science and Network Technology (ICCSNT); 2012 Dec 29–31. p. 487–90. Crossref
  • Niemiec M, Pach AR. Management of security in quantum cryptography. Institute of Electrical and Electronics Engineers (IEEE) Communications Magazine. 2013 Aug; 51(8):36–41. Crossref
  • Kaaniche N, Boudguiga A, Laurent M. ID based cryptography for cloud data storage. In Institute of Electrical and Electronics Engineers (IEEE) Sixth International Conference on Cloud Computing (CLOUD); 2013 Jun 28 – Jul 3. p. 375–82. Crossref
  • Olanrewaju RF, Islam T, Adeniyi AB. r-TOLA: An architecture for real time open learning application foruniversities. In International Conference on Computer and Communication Engineering (ICCCE); 2014 Sep 23–25. p. 292–5. Crossref

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.