Skip to main content
Log in

Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

In today's advanced and technologically advanced world, cloud computing has emerged as a popular platform for managing and maintaining data, information, and services worldwide. Therefore, it is essential to deal with security concerns and develop sufficient procedures to protect the confidentiality and integrity of data. This study proposes a secure cloud data access paradigm that uses QKD and attribute-based encryption (ABE) to address these issues. The study uses ABE to encrypt user information and ensure its safety during transmission and storage. Moreover, the quantum key is used to access cloud-based information. In addition, the quantum channel ensures the safe transfer of keys between nodes. The proposed model is simulated using MATLAB. The results are compared to the current state of the art regarding various performance parameters like encryption and decryption time, key generation time, etc. The simulation results show that the suggested model is superior to the current state of the art.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Chaudhary S, Suthar F, Joshi NK. Comparative study between cryptographic and hybrid techniques for implementation of security in cloud computing. Perform Manag Integr Syst Appl Softw Eng. 2020. https://doi.org/10.1007/978-981-13-8253-6_12.

    Article  Google Scholar 

  2. Amaithi Rajan A. Systematic survey: secure and privacy-preserving big data analytics in cloud. J Comput Inf Syst. 2023. https://doi.org/10.1080/08874417.2023.2176946.

    Article  Google Scholar 

  3. Parast FK, Sindhav C, Nikam S, Yekta HI, Kent KB, Hakak S. Cloud computing security: a survey of service-based models. Comput Secur. 2022;114: 102580. https://doi.org/10.1016/j.cose.2021.102580.

    Article  Google Scholar 

  4. Rastogi G, Sushil R. Cloud computing implementation: key issues and solutions. In: 2nd international conference on computing for sustainable global development (INDIACom). 2015. pp. 320–24. https://doi.org/10.13140/RG.2.1.1835.2161.

  5. Sun PJ. Security and privacy protection in cloud computing: discussions and challenges. J Netw Comput Appl. 2020. https://doi.org/10.1016/j.jnca.2020.102642.

    Article  Google Scholar 

  6. Verma G. Secure VM migration in cloud: multi-criteria perspective with improved optimization model. Wirel Pers Commun. 2022. https://doi.org/10.1007/s11277-021-09319-w.

    Article  Google Scholar 

  7. Rastogi G, Sushil R. Cloud computing security and homomorphic encryption. IUP J Comput Sci. 2015;9(3):48–58.

    Google Scholar 

  8. Guo L, Zheng X, Ding C, Mu D, Li Z. Cloud service recommendation: state of the art and research challenges. In: 2015 15th IEEE/ACM international symposium on cluster, cloud and grid computing. 2015. pp. 761–64. https://doi.org/10.1109/CCGrid.2015.144.

  9. Verma G, Adhikari S. Cloud computing security issues: a stakeholder’s perspective. SN Comput Sci. 2020;1(6):1–8. https://doi.org/10.1007/s42979-020-00353-2.

    Article  Google Scholar 

  10. Verma G, Kanrar S. A novel model to enhance the data security in cloud environment. Multiagent Grid Syst. 2022;18(1):45–63. https://doi.org/10.3233/MGS-220361.

    Article  Google Scholar 

  11. Verma G, Kanrar S. Secure digital documents sharing using blockchain and attribute-based cryptosystem. Multiagent Grid Syst. 2022;18(3–4):365–79. https://doi.org/10.3233/MGS-221361.

    Article  Google Scholar 

  12. Verma G. Secure client-side deduplication scheme for cloud with dual trusted execution environment. IETE J Res. 2022. https://doi.org/10.3233/MGS-221361.

    Article  Google Scholar 

  13. Li J, Wei J, Liu W, Hu X. PMDP: a framework for preserving multiparty data privacy in cloud computing. Secur Commun Netw. 2017. https://doi.org/10.1155/2017/6097253.

    Article  Google Scholar 

  14. Kumar A, Garhwal S. State-of-the-art survey of quantum cryptography. Arch Comput Methods Eng. 2021;28:3831–68. https://doi.org/10.1007/s11831-021-09561-2.

    Article  MathSciNet  Google Scholar 

  15. Verma G, Kumar A. Novel quantum key distribution and attribute-based encryption for cloud data security. Concurr Comput Pract Exp. 2023. https://doi.org/10.1002/cpe.7700.

    Article  Google Scholar 

  16. Murugan G. An efficient algorithm on quantum computing with quantum key distribution for secure communication. Int J Commun. 2020;5:5–12.

    Google Scholar 

  17. Ukwuoma HC, Arome G, Thompson A, Alese BK. Post-quantum cryptography-driven security framework for cloud computing. Open Comput Sci. 2022;12(1):142–53. https://doi.org/10.1515/comp-2022-0235.

    Article  Google Scholar 

  18. Fragkos G, Minwalla C, Plusquellic J, Tsiropoulou EE. Artificially intelligent electronic money. IEEE Consum Electron Mag. 2020;10(4):81–9. https://doi.org/10.1109/MCE.2020.3024512.

    Article  Google Scholar 

  19. Sharma G, Kalra S. Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer Netw Appl. 2018;11:220–34. https://doi.org/10.1007/s12083-016-0528-2.

    Article  Google Scholar 

  20. Zhu H, Wang C, Wang X. Quantum fully homomorphic encryption scheme for cloud privacy data based on quantum circuit. Int J Theor Phys. 2021;60:2961–75. https://doi.org/10.1007/s10773-021-04879-w.

    Article  MathSciNet  MATH  Google Scholar 

  21. Zhang X, Zhao J, Xu C, Wang H, Zhang Y. DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans Serv Comput. 2019. https://doi.org/10.1109/tsc.2019.2942297.

    Article  Google Scholar 

  22. Namasudra S. An improved attribute-based encryption technique towards the data security in cloud computing. Concurr Comput Pract Exp. 2019;31(3): e4364. https://doi.org/10.1002/cpe.4364.

    Article  Google Scholar 

  23. Aluvalu R, Chennam KK, Uma Maheswari V, Jabbar MA. A novel and secure approach for quantum key distribution in a cloud computing environment. In: Intelligent computing and networking: Proceedings of IC-ICN 2020. 2021. pp. 271–83. https://doi.org/10.1007/978-981-15-7421-4_25.

  24. Sundar K, Sasikumar S, Jayakumar C. Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud. Quantum Inf Process. 2022;21(3):115. https://doi.org/10.1007/s11128-022-03452-6.

    Article  MathSciNet  MATH  Google Scholar 

  25. Sasikumar S, Sundar K, Jayakumar C, Obaidat MS, Stephan T, Hsiao KF. Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment. Simul Model Pract Theory. 2022;121: 102651. https://doi.org/10.1016/j.simpat.2022.102651.

    Article  Google Scholar 

  26. Kumari S, Singh M, Singh R, Tewari H. Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices: a comprehensive survey. Softw Pract Exp. 2022;52(10):2047–76. https://doi.org/10.1002/spe.3121.

    Article  Google Scholar 

  27. He H, Zheng LH, Li P, Deng L, Huang L, Chen X. An efficient attribute-based hierarchical data access control scheme in cloud computing. HCIS. 2020;10(1):1–9. https://doi.org/10.1186/s13673-020-00255-5.

    Article  Google Scholar 

  28. Thangapandiyan M, Rubesh Anand PM, Sakthidasan Sankaran K. Quantum key distribution and cryptography mechanisms for cloud data security. In: International conference on communication and signal processing, April 3–5. 2018. https://doi.org/10.1109/ICCSP.2018.8524298.

  29. Azzaoui A, Sharma P, Park JH. Blockchain-based delegated quantum cloud architecture for medical big data security. J Netw Comput Appl. 2021;198:103304. https://doi.org/10.1016/j.jnca.2021.103304. (Cover date: February 2022).

    Article  Google Scholar 

  30. Abidin S, Swami A, Hussain N. Quantum cryptography technique: a way to improve security challenges in mobile cloud computing (MCC). Mater Today Proc. 2021;51(Part 1):508–14. https://doi.org/10.1016/j.matpr.2021.05.593. (Cover date: 2022).

    Article  Google Scholar 

  31. Gong C, Du J, Dong Z, et al. Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing. Quantum Inf Process. 2020;19:105. https://doi.org/10.1007/s11128-020-2603-0.

    Article  Google Scholar 

  32. Fatima S, Ahmad S. Quantum key distribution approach for secure authentication of cloud servers. Int J Cloud Appl Comput. 2021;11(3):19–32. https://doi.org/10.4018/IJCAC.2021070102.

    Article  Google Scholar 

  33. Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J Parallel Distrib Comput. 2020;135:1–20. https://doi.org/10.1016/j.jpdc.2019.08.014.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Verma.

Ethics declarations

Conflict of Interest

We hereby declare that this manuscript is an original work and is not under consideration for publication in any other journal. All authors have approved the submission of the manuscript to the respective journals.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Verma, G. Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection. SN COMPUT. SCI. 4, 803 (2023). https://doi.org/10.1007/s42979-023-02285-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02285-z

Keywords

Navigation