Skip to main content

Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service

  • Chapter
  • First Online:
New Approaches in Intelligent Control

Abstract

Cloud computing environment is a new approach to the intelligent control of network communication and knowledge-based systems. It drastically guarantees scalability, on-demand, and pay-as-you-go services through virtualization environments. In a cloud environment, resources are provided as services to clients over the internet in the public cloud and over the intranet in the private cloud upon request. Resources’ coordination in the cloud enables clients to reach their resources anywhere and anytime. Guaranteeing the security in cloud environment plays an important role, as clients often store important files on remote trust cloud data center. However, clients are wondering about the integrity and the availability of their data in the cloud environment. So, many security issues, which pertinent to client data garbling and communication intrusion caused by attackers, are attitudinized in the host, network and data levels. In order to address these issues, this chapter introduces a new intelligent quantum cloud environment (IQCE), that entails both Intelligent Quantum Cryptography-as-a-Service (IQCaaS) and Quantum Advanced Encryption Standard (QAES). This intelligent environment poses more secured data transmission by provisioning secret key among cloud’s instances and machines. It is implemented using System Center Manager (SCM) 2012-R2, which in turn, installed and configured based on bare-metal Hyper-V hypervisor. In addition, IQCaaS solves the key generation, the key distribution and the key management problems that emerged through the online negotiation between the communication parties in the cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nelson, G., Charles, M., Fernando, R., Marco, S., Teresa, C., Mats, N., Makan, P.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud. Comput. Adv. Syst. Appl. 1(11), 34–51 (2014)

    Google Scholar 

  2. Sunita, M., Seema, S.: Distributed Computing, 2nd edn. Oxford University Press, New York (2013)

    Google Scholar 

  3. Chander, K., Yogesh, S.: Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 67–78 (2013)

    Google Scholar 

  4. Mohammad, A., John, B., Ingo, T.: An analysis of the cloud computing security problem. In: APSE 2010 Proceeding—Cloud Workshop, Sydney, Australia, pp. 56–64 (2010)

    Google Scholar 

  5. Faiza, F.: Management of symmetric cryptographic keys in a cloud-based environment. In: A 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 90–98 (2012)

    Google Scholar 

  6. Mather, T., Kumaraswamy, S.: Cloud Security, and Privacy; An Enterprise Perspective on Risks and Compliance, 1st edn. O’Reilly Media, Sebastopol (2013)

    Google Scholar 

  7. CSA: Security a-a-services guidance for critical areas in cloud computing. Category 8, 1–21 (2012)

    Google Scholar 

  8. Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Cryptographic cloud computing environment as a more trusted communication environment. Int. J. Grid. High. Perform. Comput. (IJGHPC) 6(2), 45–60 (2014)

    Google Scholar 

  9. Sekar, A., Radhika, S., Anand, K.: Secure communication using 512 bit key. Eur. J. Sci. Res. 52(1), 61–65, 90–104 (2012)

    Google Scholar 

  10. Doelitzscher, F., Reich, C., Kahl, M., Clarke, N.: An autonomous agent-based incident detection system for cloud computing. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS. pp. 197–204 (2011)

    Google Scholar 

  11. Lejiang, G., XiangPing, C., Chao, G., Wang, D.P.: The intelligence security control platform based on cloud and trusted computing technology. In: International Conference on Electrical and Computer Engineering, Advances in Biomedical Engineering, vol. 11, pp. 221–229 (2012)

    Google Scholar 

  12. Wang, Q., Cong, X., Min, S.: Protecting privacy by multi-dimensional K-anonymity. J. Softw. 7(8), 87–90 (2012)

    Google Scholar 

  13. Hossein, R., Elankovan, S., Zulkarnain, A., Abdullah, M.: Encryption as a service (EaaS) as a solution for cryptography in cloud. In: 4th International Conference on Electrical Engineering and Informatics, ICEEI’13, vol. 11, pp. 1202–1210 (2013)

    Google Scholar 

  14. Esh, N., Mohit, P., Aman, B., Prem, H.: To enhance the data security of cloud in cloud computing using RSA algorithm. Int. J. Softw. Eng. 1(1), 56–64 (2012)

    Google Scholar 

  15. Soren, B., Sven, B., Hugo, I.: Client–controlled cryptography-as-a-service in the cloud. In: Proceedings of 11th International Conference, ACNS 2013, vol. 7954, pp. 74–82. Springer (2013)

    Google Scholar 

  16. Mandeep, K., Manish, G.: Implementing various encryption algorithms to enhance the data security of cloud in cloud computing. Int. J. Comput. Sci. Inf. Technol. 2(10), 156–204 (2012)

    Google Scholar 

  17. Dabrowski, C., Mills, K.: VM leakage and orphan control in open source cloud. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS, pp. 554–559 (2011)

    Google Scholar 

  18. Emmanuel, S., Navdeep, A., Prashant, T., Bhanu, P.: Cloud computing: data storage security analysis and its challenges. Int. J. Comput. Appl. 70(24), 98–105 (2013). ISSN 0975-8887

    Google Scholar 

  19. William, S.: Cryptography and Network Security, a Library of Congress Cataloging, 5th edn. Prentice Hall (2012). ISBN 13; 978-0-13609704-4

    Google Scholar 

  20. Winkler, J.: Securing the Cloud: Cloud Computer Security Techniques and Tactics, a Library of Congress Cataloging. Elsevier (2011). ISBN 13; 978-1-59749-592-9

    Google Scholar 

  21. Padmapriya, A., Subhas, P.: Cloud computing: security challenges and encryption practices. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 23–31 (2013)

    Google Scholar 

  22. Manpreet, R., Rajbir, V.: Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int. J. Comput. Appl. 70(18) (2013)

    Google Scholar 

  23. Jensen, M., Schwenk, J., Hauschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE ICCC, Bangalore, pp. 109–116 (2009)

    Google Scholar 

  24. Gawain, B., Waugh, R., Patil, S.: Enhancement of data security in cloud computing environment. Int. J. Internet Comput. 1(3), 123–132 (2012)

    Google Scholar 

  25. Farhad, A., Seyed, S., Athula, G.: Cloud computing: security and reliability issues. Commun. IBIMA 1(655710) (2013)

    Google Scholar 

  26. Eman, M., Hatem, S., Sherif, E.: Enhanced data security model for cloud computing. In: 8th International Conference on Informatics and Systems (INFO2012), Egypt, pp. 12–17 (2012)

    Google Scholar 

  27. Sanjo, S., Jasmeet, S.: Implementing cloud data security by encryption using Rijndael. Global J. Comput. Sci. Technol. Cloud Distrib. 13(4), 56–64 (2013)

    Google Scholar 

  28. Syam, P., Subramanian, R., Thamizh, D.: Ensuring data security in cloud computing using sobol sequence. In: Proceeding of 1st International Conference on Parallel, Distributed and Grid Computing (PDGC) (2010). IEEE 978-1-4244-7674-9/10

    Google Scholar 

  29. Wesam, D., Ibrahim, T., Christoph, M.: Infrastructure as a service security: challenges and solution. In: The Proceeding of 7th International Conference on Informatics and Systems (INFOS), Egypt, pp. 89–95 (2010)

    Google Scholar 

  30. Arif, S., Olariu, S., Wang, J., Yan, G., Yang, W., Khalil, I.: Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Trans. Parallel Distrib. Syst. 3, 167–177 (2011)

    Google Scholar 

  31. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 98–105 (2010)

    Google Scholar 

  32. Klems, K., Lenk, K., Nimis, J., Sandholm, T., Tai, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: IEEE Xplore, pp. 23–31 (2009)

    Google Scholar 

  33. Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: A comparative study of modern encryption algorithms based on cloud computing environment. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, pp. 536–541 (2013)

    Google Scholar 

  34. Kraska, F.: Building database applications in the cloud, Swiss federal institute of technology (2010)

    Google Scholar 

  35. Global Net optex Incorporated (2009) Demystifying the cloud, important opportunities and crucial choices, http://www.gni.com, pp. 4–14

  36. Gongjun, Y., Ding, W., Stephan, O., Michele, C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 67–73 (2013)

    Google Scholar 

  37. Patil, D., Akshay, R.: Data security over cloud emerging trends in computer science and information technology. In: Proceeding Published in International Journal of Computer Applications, pp. 123–147 (2012)

    Google Scholar 

  38. Itani, W., Kayassi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International Conference on Energy Aware Computing (ICEAC10), Egypt, pp. 234–241 (2012)

    Google Scholar 

  39. Solange, G., Mohammed, A.: Applying QKD to reach unconditional security in communications, European research project SECOQC, www.secoqc.net (2014)

  40. Yau, Stephen S., Ho, G.An.: Confidentiality protection in cloud computing systems. Int. J. Softw. Inform. 4(4), 351–363 (2010)

    Google Scholar 

  41. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy (SP ’07), pp. 321–334 (2011)

    Google Scholar 

  42. Cutillo, A., Molva, R., Strufe, T.: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. (2012)

    Google Scholar 

  43. Trugenberger, C., Diamantini, C.: Quantum associative pattern retrieval. Stud. Comput. Intell. (SCI) 121, 103–113 (2008)

    MATH  Google Scholar 

  44. Christain, K., Mario, P.: Applied Quantum Cryptography, Lecture Notes in Physics, vol. 797. Springer, Berlin (2010). doi:10.1007/978-3-642-04831-9

    Google Scholar 

  45. Ammar, O., Khaled, E., Muneer, A., Eman, A.: Quantum key distribution by using RSA. In: Proceedings of 3rd International Conference on Innovative Computing Technology (INTECH), pp. 123–128 (2013)

    Google Scholar 

  46. Jasim, O.K., Anas, A.: The goals of parity bits in quantum key distribution system. Int. J. Comput. Appl. 56(18), 5–9 (2012)

    Google Scholar 

  47. Dani, G.: An experimental implementation of oblivious transfer in the noisy storage model. Nat. Commun. J. 5(3418), 56–64 (2014)

    Google Scholar 

  48. Rawal, V., Dhamija, A., Sharma, S.: Revealing new concepts in cryptography & clouds. Int. J. Sci. Technol. Res. 1(7), 23–33 (2012)

    Google Scholar 

  49. Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Quantum key distribution: simulation and characterizations. In: International Conference on Communication, Management and Information Technology (ICCMIT 2015), Procedia Computer Science, pp. 78–88, Prague (2015)

    Google Scholar 

  50. Matthew, P., Caleb, H., Lamas, L., Christian, K.: Daylight Operation of a Free Space, Entanglement-Based Quantum Key Distribution System. National University of Singapore, Centre for Quantum Technologies, Singapore (2008)

    Google Scholar 

  51. Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Statistical analysis of random bits generation of quantum key distribution. In: 3rd IEEE-International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), pp. 45–52 (2014)

    Google Scholar 

  52. Matthew, G.: Statistical tests of randomness on QKD through a free-space channel coupled to daylight noise. J. Lightwave Technol. 3(23), 56–68 (2013)

    Google Scholar 

  53. Aidan, F., Hans, V., Patrick, L., Damian, F.: (2012) Microsoft Private Cloud Computing. Wiley, ISBN: 978-1-118-25147-8

    Google Scholar 

  54. Sharif, M.S.: Quantum cryptography: a new generation of information technology security system. In: 6th International Conference on Information Technology: New Generations, pp. 1644–1648 (2009)

    Google Scholar 

  55. Woolley, R., Fletcher, D.: The hybrid cloud: bringing cloud-based IT services to state government (2009)

    Google Scholar 

  56. Raheel, A., Stuart, B., Elizabeth, C., Kavitha, G., James, E.: Quantum simultaneous recurrent networks for content addressable memory. Stud. Comput. Intell. (SCI) 121, 57–74 (2008)

    MATH  Google Scholar 

  57. Center for Quantum Technology, http://www.quantumlah.org/research/topic/qcrypto. Accessed 1 Sept 2014

  58. Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Advanced encryption standard development based quantum key distribution. In: 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), UK, pp. 343–354 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omer K. Jasim Mohammad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Jasim Mohammad, O.K., El-Horbaty, ES.M., Salem, AB.M. (2016). Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service. In: Nakamatsu, K., Kountchev, R. (eds) New Approaches in Intelligent Control. Intelligent Systems Reference Library, vol 107. Springer, Cham. https://doi.org/10.1007/978-3-319-32168-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32168-4_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32166-0

  • Online ISBN: 978-3-319-32168-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics