Secure key management in cloud environment using quantum cryptography

Secure key management in cloud environment using quantum cryptography

Kranthi Kumar Singamaneni Pasala. Sanyasi Naidu 

Department of CSE, GITAM Institute of Technology, GITAM Deemed to be University,Vishakhapatnam, India

Corresponding Author Email: 
kkranthicse@gmail.com
Page: 
213-222
|
DOI: 
https://doi.org/10.3166/ISI.23.5.213-222
Received: 
| |
Accepted: 
| | Citation

OPEN ACCESS

Abstract: 

Cloud Computing innovation is exceptionally valuable in present everyday life, it utilizes the web and the focal remote servers to give and keep up information and in addition applications. Such applications thusly can be utilized by the end clients by means of the cloud correspondences with no establishment. Besides, the end clients' information records can be gotten to and controlled from some other PC utilizing the web administrations. In spite of the adaptability of information and application getting to and use that Cloud Computing conditions, there are numerous inquiries as yet coming up on the best way to pick up a confided in condition that shield information and applications in mists from programmers and interlopers. This paper reviews the "keys age" instrument and encryption/decoding calculations utilized in Cloud Computing conditions, We proposed new security mechanisms for Cloud Computing condition that considers the Quantum Key Allocation (QKA) and overcomes different security holes however much as could reasonably be expected.

Keywords: 

cloud computing, cloud encryption model, quantum key allocation

1. Introduction
2. Literature survey
3. Proposed method
4. Results
5. Conclusion
  References

Baker S. A. (2008). Server virtualization. InfoWorld. Feb., Vol. 12. http://doi.org/US20130173773 A1

Bhukya S., Pabboju S., Sharma K. V. (2016). Data security in cloud computing and out sourceddatabases. 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 2458-2462. http://doi.org/10.1109/ICEEOT.2016.7755135

Clarke G. (2009). Microsoft's azure cloud suffers first crash. The Register, No. 16, http://www.theregister.co.uk/ 2009/03/16/azure_cloud_crash/

Ferrie P. (2007). Attacks on virtual machine emulators, white paper. Symantec Corporation. http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf

Fowler G., Worthen B. (2010). The internet industry is on a cloud – whatever that may mean. The Wall Street Journal.

Grobauer B., Walloschek T., Stöcker E. (2010). Understanding cloud-computing vulnerabilities. IEEE Security and Privacy, Vol. 99. http://doi.org/10.1109/msp.2010.115

Han J., Liu Y., Sun X., Song L. (2016). Enhancing data and privacy security in mobile cloud computing through quantum cryptography. 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 398-401. http://doi.org/10.1109/ICSESS.2016.7883094

Jensen M., Schwenk J., Gruschka N., Iacono L. L. (2009). On technical security issues in cloud computing. in IEEE ICCC, pp. 21-25. http://doi.org/10.1109/CLOUD.2009.60

John M. (2001). An internet critic who is not shy about ruffling the big names in high technology. New York Times. No. 9.

Kandukuri B. R., Paturi R., Rakshit A. (2009). Cloud security issues. in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520.

Kulshrestha V., Verma S., Challa C. R. K. (2016). A comprehensive evaluation of cryptographic algorithms in cloud computing. 2016 International Conference on Inventive ComputationTechnologies (ICICT), pp. 1-5. http://doi.org/10.1109/INVENTIVE.2016.7823268

Narayana V. L., Bharathi C. R. (2018). Multi-mode routing algorithm with cryptographic techniques and reduction of packet drop using 2ACK scheme in MANETs. in Smart Intelligent Computing and Applications, Springer Nature, Singapore, Vol. 1, pp. 649-658.

Popovic K., Hocenski Z. (2010). Cloud computing security issues and challenges. in The Third International Conference on Advances in uman-oriented and Personalized Mechanisms, Technologies, and Services, pp. 344-349. http://doi.org/10.1109/ITA.2013.91

Steve S. (2009). Cloud computing and EMC deal. New York Times. Feb. 25, 2009. pp. C 6.

Subha T., Jayashri S. (2017). Efficient privacy preserving integrity checking model for cloud data storage security. 2016 Eighth International Conference on Advanced Computing (ICoAC), pp. 55-60. http://doi.org/10.1109/ICoAC.2017.7951745

Swathi R., Subha T. (2017). Enhancing data storage security in cloud using certificate less publicauditing. 2017 2nd International Conference on Computing and Communications Technologies(ICCCT), pp. 348-352. http://doi.org/10.1109/ICCCT2.2017.7972299

Youssef A. M. (2018). Operations of electric vehicle traction system. Mathematical Modelling of Engineering Problems, Vol. 5, No. 2, pp. 51-57. http://doi.org/10.18280/mmep.050201