Skip to main content
Log in

Revolutionizing Cloud Security: Leveraging Quantum Computing and Key Distribution for Enhanced Protection

  • Article
  • Published:
The Review of Socionetwork Strategies Aims and scope Submit manuscript

Abstract

This paper proposes an effective quantum computing method that integrates secure cloud access and quantum key distribution (QKD) to ensure secure access to cloud resources. The proposed method employs a quantum circuit to implement a secure cloud access protocol that utilizes QKD to distribute a secret key between the cloud user and the service provider. The secret key encrypts all parties’ access requests, response messages, and data. The security of the proposed method is analyzed against various types of attacks, including intercept-resend, man-in-the-middle, and eavesdropping. The simulation results indicate that the proposed method offers significant protection against such attacks. It can potentially provide a secure cloud access platform for various applications, including sensitive data storage, healthcare data management, and other applications that require a high level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Pandey, G. P. (2019). Implementation of DNA cryptography in cloud computing and using Huffman algorithm, socket programming and a new approach to secure cloud data socket programming and new approach to secure cloud data. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3501494

    Article  Google Scholar 

  2. Rastogi G, Sushil R.: Cloud computing implementation: key issues and solutions. In 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom): 320–324, (2015 Mar 11), IEEE. https://ieeexplore.ieee.org/abstract/document/7100266

  3. Rastogi, G., & Sushil, R. (2015). Cloud computing security and homomorphic encryption. IUP Journal of Computer Sciences., 9(3), 48–58.

    Google Scholar 

  4. AmaithiRajan, A. (2023). Systematic survey secure and privacy-preserving big data analytics in cloud. Journal of Computer Information Systems. https://doi.org/10.1080/08874417.2023.2176946

    Article  Google Scholar 

  5. Verma, G., & Kanrar, S. (2022). A novel model to enhance the data security in the cloud environment. Multiagent and Grid Systems., 18(1), 45–63.

    Article  Google Scholar 

  6. Ukwuoma, H. C., Arome, G., Thompson, A., & Alese, B. K. (2022). Post-quantum cryptography-driven security framework for cloud computing. Open Computer Science., 12(1), 142–153. https://doi.org/10.1515/comp-2022-0235/html

    Article  Google Scholar 

  7. Murugan, G.: (2020) An efficient algorithm on quantum computing with quantum key distribution for secure communication. International Journal of Communications.. Link: https://www.iaras.org/iaras/home/caijoc/an-efficient-algorithm-on-quantum-computing-with-quantum-key-distribution-for-secure-communication

  8. Kumari, S., Singh, M., Singh, R., & Tewari, H. (2022). Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices a comprehensive survey. Software Practice and Experience., 52(10), 2047–2076.

    Article  Google Scholar 

  9. Sharma, G., & Kalra, S. (2018). Identity-based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer Networking and applications., 11, 220–234. https://doi.org/10.1007/s12083-016-0528-2

    Article  Google Scholar 

  10. Fatima, S., & Ahmad, S. (2021). Quantum key distribution approach for secure authentication of cloud servers. International Journal of Cloud Applications and Computing (IJCAC), 11(3), 19–32. https://doi.org/10.4018/IJCAC.2021070102

    Article  Google Scholar 

  11. Verma, G., & Kumar, A. (2023). Novel quantum key distribution and attribute-based encryption for cloud data security. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.7700

    Article  Google Scholar 

  12. Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2020). Accountable privacy preserving attribute-based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing., 135, 1–20.

    Article  Google Scholar 

  13. Zhu, H., Wang, C., & Wang, X. (2021). Quantum fully homomorphic encryption scheme for cloud privacy data based on quantum circuit. International Journal of Theoretical Physics., 60, 2961–2975. https://doi.org/10.1007/s10773-021-04879-w

    Article  Google Scholar 

  14. Chapuran, T. E., Toliver, P., Peters, N. A., Jackel, J., Goodman, M. S., Runser, R. J., McNown, S. R., Dallmann, N., Hughes, R. J., McCabe, K. P., & Nordholt, J. E. (2009). Optical networking for quantum key distribution and quantum communications. New Journal of Physics., 11(10), 105001. https://doi.org/10.1088/1367-2630/11/10/105001/meta

    Article  Google Scholar 

  15. Yi, H. (2021). A post-quantum secure communication system for cloud manufacturing safety. Journal of Intelligent Manufacturing., 32(3), 679–688. https://doi.org/10.1007/s10845-020-01682-y

    Article  Google Scholar 

  16. Semwal, P. and Sharma, M.K.: Comparative study of different cryptographic algorithms for data security in cloud computing. In: 2017 3rd International Conference on Advances in Computing, Communication & Automation (2017, September), IEEE. https://ieeexplore.ieee.org/abstract/document/8344738

  17. Namasudra, S. (2019). An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Experience., 31(3), e4364. https://doi.org/10.1002/cpe.4364

    Article  Google Scholar 

  18. Verma, G., & Adhikari, S. (2020). Cloud computing security issues: a stakeholder’s perspective. SN Computer Science., 1(6), 1–8. https://doi.org/10.1007/s42979-020-00353-2

    Article  Google Scholar 

  19. Sasikumar, S., Sundar, K., Jayakumar, C., Obaidat, M. S., Stephan, T., & Hsiao, K. F. (2022). Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in the cloud environment. Simulation Modelling Practice and Theory., 121, 102651.

    Article  Google Scholar 

  20. Kumar, A., & Garhwal, S. (2021). State-of-the-art survey of quantum cryptography. Archives of Computational Methods in Engineering., 28, 3831–3868. https://doi.org/10.1007/s11831-021-09561-2

    Article  Google Scholar 

  21. Backe, A. and Lindén, H. (2015) Cloud computing security: a systematic literature review. https://www.diva-portal.org/smash/record.jsf?pid=diva2%3A825307&dswid=6532

  22. Chaudhary, S., Suthar, F., & Joshi, N. K. (2020). Comparative study between cryptographic and hybrid techniques for implementation of security in cloud computing. Performance Management of Integrated Systems and its Applications in Software Engineering. https://doi.org/10.1007/978-981-13-8253-6_12

    Article  Google Scholar 

  23. Parast, F. K., Sindhav, C., Nikam, S., Yekta, H. I., Kent, K. B., & Hakak, S. (2022). Cloud computing security: a survey of service-based models. Computers Security., 114, 102580.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Verma.

Ethics declarations

Conflict of interest

We hereby declare that this manuscript is an original work and is not under consideration for publication in any other journal. All authors have approved the submission of the manuscript to the journal mentioned above.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Verma, G. Revolutionizing Cloud Security: Leveraging Quantum Computing and Key Distribution for Enhanced Protection. Rev Socionetwork Strat 17, 131–143 (2023). https://doi.org/10.1007/s12626-023-00140-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12626-023-00140-4

Keywords

Navigation