Abstract
Cloud computing environment is a new approach to the intelligent control of network communication and knowledge-based systems. It drastically guarantees scalability, on-demand, and pay-as-you-go services through virtualization environments. In a cloud environment, resources are provided as services to clients over the internet in the public cloud and over the intranet in the private cloud upon request. Resources’ coordination in the cloud enables clients to reach their resources anywhere and anytime. Guaranteeing the security in cloud environment plays an important role, as clients often store important files on remote trust cloud data center. However, clients are wondering about the integrity and the availability of their data in the cloud environment. So, many security issues, which pertinent to client data garbling and communication intrusion caused by attackers, are attitudinized in the host, network and data levels. In order to address these issues, this chapter introduces a new intelligent quantum cloud environment (IQCE), that entails both Intelligent Quantum Cryptography-as-a-Service (IQCaaS) and Quantum Advanced Encryption Standard (QAES). This intelligent environment poses more secured data transmission by provisioning secret key among cloud’s instances and machines. It is implemented using System Center Manager (SCM) 2012-R2, which in turn, installed and configured based on bare-metal Hyper-V hypervisor. In addition, IQCaaS solves the key generation, the key distribution and the key management problems that emerged through the online negotiation between the communication parties in the cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nelson, G., Charles, M., Fernando, R., Marco, S., Teresa, C., Mats, N., Makan, P.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud. Comput. Adv. Syst. Appl. 1(11), 34–51 (2014)
Sunita, M., Seema, S.: Distributed Computing, 2nd edn. Oxford University Press, New York (2013)
Chander, K., Yogesh, S.: Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 67–78 (2013)
Mohammad, A., John, B., Ingo, T.: An analysis of the cloud computing security problem. In: APSE 2010 Proceeding—Cloud Workshop, Sydney, Australia, pp. 56–64 (2010)
Faiza, F.: Management of symmetric cryptographic keys in a cloud-based environment. In: A 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 90–98 (2012)
Mather, T., Kumaraswamy, S.: Cloud Security, and Privacy; An Enterprise Perspective on Risks and Compliance, 1st edn. O’Reilly Media, Sebastopol (2013)
CSA: Security a-a-services guidance for critical areas in cloud computing. Category 8, 1–21 (2012)
Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Cryptographic cloud computing environment as a more trusted communication environment. Int. J. Grid. High. Perform. Comput. (IJGHPC) 6(2), 45–60 (2014)
Sekar, A., Radhika, S., Anand, K.: Secure communication using 512 bit key. Eur. J. Sci. Res. 52(1), 61–65, 90–104 (2012)
Doelitzscher, F., Reich, C., Kahl, M., Clarke, N.: An autonomous agent-based incident detection system for cloud computing. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS. pp. 197–204 (2011)
Lejiang, G., XiangPing, C., Chao, G., Wang, D.P.: The intelligence security control platform based on cloud and trusted computing technology. In: International Conference on Electrical and Computer Engineering, Advances in Biomedical Engineering, vol. 11, pp. 221–229 (2012)
Wang, Q., Cong, X., Min, S.: Protecting privacy by multi-dimensional K-anonymity. J. Softw. 7(8), 87–90 (2012)
Hossein, R., Elankovan, S., Zulkarnain, A., Abdullah, M.: Encryption as a service (EaaS) as a solution for cryptography in cloud. In: 4th International Conference on Electrical Engineering and Informatics, ICEEI’13, vol. 11, pp. 1202–1210 (2013)
Esh, N., Mohit, P., Aman, B., Prem, H.: To enhance the data security of cloud in cloud computing using RSA algorithm. Int. J. Softw. Eng. 1(1), 56–64 (2012)
Soren, B., Sven, B., Hugo, I.: Client–controlled cryptography-as-a-service in the cloud. In: Proceedings of 11th International Conference, ACNS 2013, vol. 7954, pp. 74–82. Springer (2013)
Mandeep, K., Manish, G.: Implementing various encryption algorithms to enhance the data security of cloud in cloud computing. Int. J. Comput. Sci. Inf. Technol. 2(10), 156–204 (2012)
Dabrowski, C., Mills, K.: VM leakage and orphan control in open source cloud. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS, pp. 554–559 (2011)
Emmanuel, S., Navdeep, A., Prashant, T., Bhanu, P.: Cloud computing: data storage security analysis and its challenges. Int. J. Comput. Appl. 70(24), 98–105 (2013). ISSN 0975-8887
William, S.: Cryptography and Network Security, a Library of Congress Cataloging, 5th edn. Prentice Hall (2012). ISBN 13; 978-0-13609704-4
Winkler, J.: Securing the Cloud: Cloud Computer Security Techniques and Tactics, a Library of Congress Cataloging. Elsevier (2011). ISBN 13; 978-1-59749-592-9
Padmapriya, A., Subhas, P.: Cloud computing: security challenges and encryption practices. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 23–31 (2013)
Manpreet, R., Rajbir, V.: Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int. J. Comput. Appl. 70(18) (2013)
Jensen, M., Schwenk, J., Hauschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE ICCC, Bangalore, pp. 109–116 (2009)
Gawain, B., Waugh, R., Patil, S.: Enhancement of data security in cloud computing environment. Int. J. Internet Comput. 1(3), 123–132 (2012)
Farhad, A., Seyed, S., Athula, G.: Cloud computing: security and reliability issues. Commun. IBIMA 1(655710) (2013)
Eman, M., Hatem, S., Sherif, E.: Enhanced data security model for cloud computing. In: 8th International Conference on Informatics and Systems (INFO2012), Egypt, pp. 12–17 (2012)
Sanjo, S., Jasmeet, S.: Implementing cloud data security by encryption using Rijndael. Global J. Comput. Sci. Technol. Cloud Distrib. 13(4), 56–64 (2013)
Syam, P., Subramanian, R., Thamizh, D.: Ensuring data security in cloud computing using sobol sequence. In: Proceeding of 1st International Conference on Parallel, Distributed and Grid Computing (PDGC) (2010). IEEE 978-1-4244-7674-9/10
Wesam, D., Ibrahim, T., Christoph, M.: Infrastructure as a service security: challenges and solution. In: The Proceeding of 7th International Conference on Informatics and Systems (INFOS), Egypt, pp. 89–95 (2010)
Arif, S., Olariu, S., Wang, J., Yan, G., Yang, W., Khalil, I.: Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Trans. Parallel Distrib. Syst. 3, 167–177 (2011)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 98–105 (2010)
Klems, K., Lenk, K., Nimis, J., Sandholm, T., Tai, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: IEEE Xplore, pp. 23–31 (2009)
Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: A comparative study of modern encryption algorithms based on cloud computing environment. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, pp. 536–541 (2013)
Kraska, F.: Building database applications in the cloud, Swiss federal institute of technology (2010)
Global Net optex Incorporated (2009) Demystifying the cloud, important opportunities and crucial choices, http://www.gni.com, pp. 4–14
Gongjun, Y., Ding, W., Stephan, O., Michele, C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 67–73 (2013)
Patil, D., Akshay, R.: Data security over cloud emerging trends in computer science and information technology. In: Proceeding Published in International Journal of Computer Applications, pp. 123–147 (2012)
Itani, W., Kayassi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International Conference on Energy Aware Computing (ICEAC10), Egypt, pp. 234–241 (2012)
Solange, G., Mohammed, A.: Applying QKD to reach unconditional security in communications, European research project SECOQC, www.secoqc.net (2014)
Yau, Stephen S., Ho, G.An.: Confidentiality protection in cloud computing systems. Int. J. Softw. Inform. 4(4), 351–363 (2010)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy (SP ’07), pp. 321–334 (2011)
Cutillo, A., Molva, R., Strufe, T.: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. (2012)
Trugenberger, C., Diamantini, C.: Quantum associative pattern retrieval. Stud. Comput. Intell. (SCI) 121, 103–113 (2008)
Christain, K., Mario, P.: Applied Quantum Cryptography, Lecture Notes in Physics, vol. 797. Springer, Berlin (2010). doi:10.1007/978-3-642-04831-9
Ammar, O., Khaled, E., Muneer, A., Eman, A.: Quantum key distribution by using RSA. In: Proceedings of 3rd International Conference on Innovative Computing Technology (INTECH), pp. 123–128 (2013)
Jasim, O.K., Anas, A.: The goals of parity bits in quantum key distribution system. Int. J. Comput. Appl. 56(18), 5–9 (2012)
Dani, G.: An experimental implementation of oblivious transfer in the noisy storage model. Nat. Commun. J. 5(3418), 56–64 (2014)
Rawal, V., Dhamija, A., Sharma, S.: Revealing new concepts in cryptography & clouds. Int. J. Sci. Technol. Res. 1(7), 23–33 (2012)
Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Quantum key distribution: simulation and characterizations. In: International Conference on Communication, Management and Information Technology (ICCMIT 2015), Procedia Computer Science, pp. 78–88, Prague (2015)
Matthew, P., Caleb, H., Lamas, L., Christian, K.: Daylight Operation of a Free Space, Entanglement-Based Quantum Key Distribution System. National University of Singapore, Centre for Quantum Technologies, Singapore (2008)
Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Statistical analysis of random bits generation of quantum key distribution. In: 3rd IEEE-International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), pp. 45–52 (2014)
Matthew, G.: Statistical tests of randomness on QKD through a free-space channel coupled to daylight noise. J. Lightwave Technol. 3(23), 56–68 (2013)
Aidan, F., Hans, V., Patrick, L., Damian, F.: (2012) Microsoft Private Cloud Computing. Wiley, ISBN: 978-1-118-25147-8
Sharif, M.S.: Quantum cryptography: a new generation of information technology security system. In: 6th International Conference on Information Technology: New Generations, pp. 1644–1648 (2009)
Woolley, R., Fletcher, D.: The hybrid cloud: bringing cloud-based IT services to state government (2009)
Raheel, A., Stuart, B., Elizabeth, C., Kavitha, G., James, E.: Quantum simultaneous recurrent networks for content addressable memory. Stud. Comput. Intell. (SCI) 121, 57–74 (2008)
Center for Quantum Technology, http://www.quantumlah.org/research/topic/qcrypto. Accessed 1 Sept 2014
Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Advanced encryption standard development based quantum key distribution. In: 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), UK, pp. 343–354 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Jasim Mohammad, O.K., El-Horbaty, ES.M., Salem, AB.M. (2016). Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service. In: Nakamatsu, K., Kountchev, R. (eds) New Approaches in Intelligent Control. Intelligent Systems Reference Library, vol 107. Springer, Cham. https://doi.org/10.1007/978-3-319-32168-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-32168-4_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32166-0
Online ISBN: 978-3-319-32168-4
eBook Packages: EngineeringEngineering (R0)