Abstract
Data encryption is growing fast and has become famous when they merge the basic schemes into difficult schemes. Various data encryption techniques introduce the distinct methods like big data, networks, and web. The important hindrance forms for accessing are to give security and competency to reflex data encryption methods. The manuscript recommends estimating data encryption framework that merges with quantum cryptography and adds a fine-grained control access policy to our proposed method where the authorization valid for every single entry reaches our aim of optimizing the performance on sharing secret key for data encryption or data decryption. Finally, our proposed method gives secure data sharing with heterogeneous cloud service providers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
L. Zhou, V. Varadharajan, M. Hitchens, Cryptographic role based access control for secure cloud data storage systems. Inf. Forensics Sec. IEEE Trans. 10(11), 2381–2395 (2015)
F. Chen, T. Xiang, Y. Yang, S.S.M. Chow, Secure cloud storage meets with secure network coding, in IEEE INFOCOM (2014), pp. 673–681
D. He, S. Zeadally, L. Wu, Certificate less public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 1–10 (2015)
W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
J. Shen, H. Tan, S. Moh, I. Chung, J. Wang, An efficient rfid authentication protocol providing strong privacy and security. J. Internet Technol. 17(3), 2 (2016)
L. Law, A. Menezes, M. Qu, J. Solinas, S. Vanstone, An efficient protocol for authenticated key agreement. Des. Codes Crypt. 28(2), 119–134 (2010)
R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
J. Shen, T. Zhou, X. Chen, J. Li, W. Susilo, Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Sec. 13(4), 912–925 (2018)
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
Y.-M. Tseng, An efficient two-party identity-based key exchange protocol. Informatica 18(1), 125–136 (2007)
P.W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, in Proceedings of the 35th Annual Symposium on Foundations of Computer Science (SFCS ’94) (IEEE, 1994), pp. 124–134
J. Shen, T. Zhou, F. Wei, X. Sun, Y. Xiang, Privacy preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE IoT J. 1–1
M. Amara, A. Siad, Elliptic curve cryptography and its applications, in International Workshop on Systems, Signal Processing and their Applications, WOSSPA (Tipaza, 2011), pp. 247–250. https://doi.org/10.1109/WOSSPA.2011.5931464
K.K. Chennam, L. Muddana, R.K. Aluvalu, Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud, in 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (IEEE, 2017), pp. 2030–2033
M.A. Jabbar, B.L. Deekshatulu, P. Chandra, Classification of heart disease using artificial neural network and feature subset selection. Global J. Comput. Sci. Technol. Neural Artif. Intel. 13(3), 4–8 (2013)
M.A. Jabbar, B.L. Deekshatulu, P. Chandra, Intelligent heart disease prediction system using random forest and evolutionary approach. J. Netw. Innov. Comput. 4, 174–184 (2016)
Acknowledgements
The author would like to thank the team members who helped to do the research and write this manuscript. Lastly, the author would like to thank the Vardhaman College of Engineering for giving this opportunity to publish our manuscript.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chennam, K.K., Aluvalu, R., Uma Maheswari, V. (2021). Data Encryption on Cloud Database Using Quantum Computing for Key Distribution. In: Swain, D., Pattnaik, P.K., Athawale, T. (eds) Machine Learning and Information Processing. Advances in Intelligent Systems and Computing, vol 1311. Springer, Singapore. https://doi.org/10.1007/978-981-33-4859-2_30
Download citation
DOI: https://doi.org/10.1007/978-981-33-4859-2_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4858-5
Online ISBN: 978-981-33-4859-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)