Skip to main content
Log in

Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data (2007)

  2. Zennaro, D., Ahmad, A., Vangelista, L., Serpedin, E., Nounou, H., Nounou, M.: Network-Wide clock synchronization via message passing with exponentially distributed link delays. IEEE Trans. Commun. 61(3), 2012–2024 (2013)

    Article  Google Scholar 

  3. Boneh, D., Sahai, A., Waters, B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Proceedings of the Eurocrypt 2006. LNCS 4004. doi:10.1007/11761679_34, pp. 573–592 (2006)

  4. Kaur, P.J., Kaushal, S.: Security concerns in cloud computing. In: Proceedings of the HPAGC 2011. CCIS 169, pp. 103–112 (2011)

  5. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 35th SIGMOD Int’l Conference on Management of Data (SIGMOD 2009). doi:10.1145/1559845.1559862, pp. 139–152 (2009)

  6. Curry, S., Darbyshire, J., Fisher, D.W., Hartman, B., Herrod, S., Kumar, V., Martins, F., Orrin, S., Wolf, D.E.: Infrastructure security: getting to the bottom of compliance in the cloud. The Security Division of EMC (2010)

  7. Lim, C.C.W., Curty, M., Walenta, N., Xu, F.H., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89 (2), 022307 (2014)

    Article  ADS  Google Scholar 

  8. Boldyreva, A., Chenette, N., O’Neil, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of the 31st Annual Conference on Advances in Cryptology, pp. 578–595 (2011)

  9. Chen, Y., Wen, X.: The protocol for zero-knowledge quantum identity authentication. J. Quantum Electron. 32(2), 156–160 (in Chinese) (2015)

    Google Scholar 

  10. Wang, W., Du, H., Lv, T.: Trust model of clo ud services based on third party authentication. Theories Pract. Syst. Eng. 32(8), 2774–2779 (in Chinese) (2012)

    Google Scholar 

  11. Li, Y., Liu, J.C., Nie, Y.: Scheme for the cross center quantum network identity authentication based on W state. J. Photons 39(5), 1616–1619 (in Chinese) (2010)

    Google Scholar 

  12. Ceng, G.: Scheme for dynamic quantum identity authentication without dependence on the third party. J. Electron. 32(7), 1148–11511 (in Chinese) (2004)

    Google Scholar 

  13. Liang, H., Tao, X., Zhou, N.: Quantum image encryption based on generalized affine transform and logistic map. Quantum Inf. Process. doi:10.1007/s11128-016-1304-1

  14. Zhou, N., Hua, T., Gong, L., Pei, D., Liao, Q.: Quantum image encryption based on generalized Arnold transform and double random phase encoding. Quantum Inf. Process. 14(4), 1193–1213 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  15. Hua, T., Chen, J., Pei, D., Zhang, W., Zhou, N.: Quantum image encryption algorithm based on image correlation decomposition. Int. J. Theor. Phys. 54(2), 526–537 (2015)

    Article  MATH  Google Scholar 

  16. Zhuan, S.S., Chen, Y., Cai, X.: Scheme for secret keys allocation of quantum certainty Based on the entanglement and swapping in GHZ state. J. Quantum Electron. 32(1), 83–89 (in Chinese) (2015)

    Google Scholar 

  17. Zhang P, Ji, G.: Research on and applications of key technologies for the privacy protection of users’ data in cloud computing. Thesis for master degree of University of Electronic Science and Technology in 2014 (in Chinese)

  18. Xiao, R.: Researching progress on data privacy protection in cloud computing. J. Commun. 35(8), 168–176 (in Chinese) (2014)

    Google Scholar 

  19. Armbrust, M., Fox, A., Griffith, R., et al.: Above the clouds: a berkelcy view of cloud computing. UCB/EECS-2009-28. University of California, EECS Department, Berkeley (2009)

  20. Raj, H., Nathuji, R., Singh, A., et al.: Resource management for isolation enhanced cloud services. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 77–84. ACM, New York (2009)

  21. Jafari, M., Safavi-Naini, R., Sheppard, N.E.: A rights management approach to protection of privacy in a cloud of electronic health records. In: Proceedings of the 11th Annual ACM Workshop on Digital Rights Management, pp. 23–29, Chicago (2011)

  22. Dietrich, K.: Anonymous RFID authentication using trusted computing technologies. In: Yalcin, S.B.O. (ed.) Proceedings of the Radio Frequency Identification: Security and Privacy Issues, pp. 91–102. LNCS 6370. doi:10.1007/978-3.642-16822-2_9. Springer, Berlin (2010)

  23. Vaquero, L.M., Rodero-Merino, I., Caceres, J.I., indner, MA.A: break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39 (1), 50–55 (2009)

    Article  Google Scholar 

  24. Kamara, S., Lauter K: Cryptographic cloud storage. In: Proceedings of the Financial Cryptography Workshops, pp. 136–149, Tenerife, Canary Islands (2010)

  25. Camenisch, J., Kohlweiss, M., Rial, A., et al.: Blind and anonymous identity-based encryption and authorized private searches on public-key encrypted data. In: PKC’09, Proceedings of Public Key Cryptography, LNCS 5443, pp. 196–214, Berlin (2009)

  26. Bobba, R., Khurana, H., Prabhakaran, M.: Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: Proceedings of ESORICS, pp. 587–604. Springer, Berlin (2009)

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (61572270, 61173056, and 11547035).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yumin Dong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dong, Y., Xiao, S., Ma, H. et al. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing. Int J Theor Phys 55, 5106–5117 (2016). https://doi.org/10.1007/s10773-016-3132-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-016-3132-6

Keywords

Navigation