Abstract
Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.
Similar content being viewed by others
References
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data (2007)
Zennaro, D., Ahmad, A., Vangelista, L., Serpedin, E., Nounou, H., Nounou, M.: Network-Wide clock synchronization via message passing with exponentially distributed link delays. IEEE Trans. Commun. 61(3), 2012–2024 (2013)
Boneh, D., Sahai, A., Waters, B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Proceedings of the Eurocrypt 2006. LNCS 4004. doi:10.1007/11761679_34, pp. 573–592 (2006)
Kaur, P.J., Kaushal, S.: Security concerns in cloud computing. In: Proceedings of the HPAGC 2011. CCIS 169, pp. 103–112 (2011)
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 35th SIGMOD Int’l Conference on Management of Data (SIGMOD 2009). doi:10.1145/1559845.1559862, pp. 139–152 (2009)
Curry, S., Darbyshire, J., Fisher, D.W., Hartman, B., Herrod, S., Kumar, V., Martins, F., Orrin, S., Wolf, D.E.: Infrastructure security: getting to the bottom of compliance in the cloud. The Security Division of EMC (2010)
Lim, C.C.W., Curty, M., Walenta, N., Xu, F.H., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89 (2), 022307 (2014)
Boldyreva, A., Chenette, N., O’Neil, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of the 31st Annual Conference on Advances in Cryptology, pp. 578–595 (2011)
Chen, Y., Wen, X.: The protocol for zero-knowledge quantum identity authentication. J. Quantum Electron. 32(2), 156–160 (in Chinese) (2015)
Wang, W., Du, H., Lv, T.: Trust model of clo ud services based on third party authentication. Theories Pract. Syst. Eng. 32(8), 2774–2779 (in Chinese) (2012)
Li, Y., Liu, J.C., Nie, Y.: Scheme for the cross center quantum network identity authentication based on W state. J. Photons 39(5), 1616–1619 (in Chinese) (2010)
Ceng, G.: Scheme for dynamic quantum identity authentication without dependence on the third party. J. Electron. 32(7), 1148–11511 (in Chinese) (2004)
Liang, H., Tao, X., Zhou, N.: Quantum image encryption based on generalized affine transform and logistic map. Quantum Inf. Process. doi:10.1007/s11128-016-1304-1
Zhou, N., Hua, T., Gong, L., Pei, D., Liao, Q.: Quantum image encryption based on generalized Arnold transform and double random phase encoding. Quantum Inf. Process. 14(4), 1193–1213 (2015)
Hua, T., Chen, J., Pei, D., Zhang, W., Zhou, N.: Quantum image encryption algorithm based on image correlation decomposition. Int. J. Theor. Phys. 54(2), 526–537 (2015)
Zhuan, S.S., Chen, Y., Cai, X.: Scheme for secret keys allocation of quantum certainty Based on the entanglement and swapping in GHZ state. J. Quantum Electron. 32(1), 83–89 (in Chinese) (2015)
Zhang P, Ji, G.: Research on and applications of key technologies for the privacy protection of users’ data in cloud computing. Thesis for master degree of University of Electronic Science and Technology in 2014 (in Chinese)
Xiao, R.: Researching progress on data privacy protection in cloud computing. J. Commun. 35(8), 168–176 (in Chinese) (2014)
Armbrust, M., Fox, A., Griffith, R., et al.: Above the clouds: a berkelcy view of cloud computing. UCB/EECS-2009-28. University of California, EECS Department, Berkeley (2009)
Raj, H., Nathuji, R., Singh, A., et al.: Resource management for isolation enhanced cloud services. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 77–84. ACM, New York (2009)
Jafari, M., Safavi-Naini, R., Sheppard, N.E.: A rights management approach to protection of privacy in a cloud of electronic health records. In: Proceedings of the 11th Annual ACM Workshop on Digital Rights Management, pp. 23–29, Chicago (2011)
Dietrich, K.: Anonymous RFID authentication using trusted computing technologies. In: Yalcin, S.B.O. (ed.) Proceedings of the Radio Frequency Identification: Security and Privacy Issues, pp. 91–102. LNCS 6370. doi:10.1007/978-3.642-16822-2_9. Springer, Berlin (2010)
Vaquero, L.M., Rodero-Merino, I., Caceres, J.I., indner, MA.A: break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39 (1), 50–55 (2009)
Kamara, S., Lauter K: Cryptographic cloud storage. In: Proceedings of the Financial Cryptography Workshops, pp. 136–149, Tenerife, Canary Islands (2010)
Camenisch, J., Kohlweiss, M., Rial, A., et al.: Blind and anonymous identity-based encryption and authorized private searches on public-key encrypted data. In: PKC’09, Proceedings of Public Key Cryptography, LNCS 5443, pp. 196–214, Berlin (2009)
Bobba, R., Khurana, H., Prabhakaran, M.: Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: Proceedings of ESORICS, pp. 587–604. Springer, Berlin (2009)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (61572270, 61173056, and 11547035).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Dong, Y., Xiao, S., Ma, H. et al. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing. Int J Theor Phys 55, 5106–5117 (2016). https://doi.org/10.1007/s10773-016-3132-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-016-3132-6