Abstract
This paper proposes an effective quantum computing method that integrates secure cloud access and quantum key distribution (QKD) to ensure secure access to cloud resources. The proposed method employs a quantum circuit to implement a secure cloud access protocol that utilizes QKD to distribute a secret key between the cloud user and the service provider. The secret key encrypts all parties’ access requests, response messages, and data. The security of the proposed method is analyzed against various types of attacks, including intercept-resend, man-in-the-middle, and eavesdropping. The simulation results indicate that the proposed method offers significant protection against such attacks. It can potentially provide a secure cloud access platform for various applications, including sensitive data storage, healthcare data management, and other applications that require a high level of security.





Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Pandey, G. P. (2019). Implementation of DNA cryptography in cloud computing and using Huffman algorithm, socket programming and a new approach to secure cloud data socket programming and new approach to secure cloud data. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3501494
Rastogi G, Sushil R.: Cloud computing implementation: key issues and solutions. In 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom): 320–324, (2015 Mar 11), IEEE. https://ieeexplore.ieee.org/abstract/document/7100266
Rastogi, G., & Sushil, R. (2015). Cloud computing security and homomorphic encryption. IUP Journal of Computer Sciences., 9(3), 48–58.
AmaithiRajan, A. (2023). Systematic survey secure and privacy-preserving big data analytics in cloud. Journal of Computer Information Systems. https://doi.org/10.1080/08874417.2023.2176946
Verma, G., & Kanrar, S. (2022). A novel model to enhance the data security in the cloud environment. Multiagent and Grid Systems., 18(1), 45–63.
Ukwuoma, H. C., Arome, G., Thompson, A., & Alese, B. K. (2022). Post-quantum cryptography-driven security framework for cloud computing. Open Computer Science., 12(1), 142–153. https://doi.org/10.1515/comp-2022-0235/html
Murugan, G.: (2020) An efficient algorithm on quantum computing with quantum key distribution for secure communication. International Journal of Communications.. Link: https://www.iaras.org/iaras/home/caijoc/an-efficient-algorithm-on-quantum-computing-with-quantum-key-distribution-for-secure-communication
Kumari, S., Singh, M., Singh, R., & Tewari, H. (2022). Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices a comprehensive survey. Software Practice and Experience., 52(10), 2047–2076.
Sharma, G., & Kalra, S. (2018). Identity-based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer Networking and applications., 11, 220–234. https://doi.org/10.1007/s12083-016-0528-2
Fatima, S., & Ahmad, S. (2021). Quantum key distribution approach for secure authentication of cloud servers. International Journal of Cloud Applications and Computing (IJCAC), 11(3), 19–32. https://doi.org/10.4018/IJCAC.2021070102
Verma, G., & Kumar, A. (2023). Novel quantum key distribution and attribute-based encryption for cloud data security. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.7700
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2020). Accountable privacy preserving attribute-based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing., 135, 1–20.
Zhu, H., Wang, C., & Wang, X. (2021). Quantum fully homomorphic encryption scheme for cloud privacy data based on quantum circuit. International Journal of Theoretical Physics., 60, 2961–2975. https://doi.org/10.1007/s10773-021-04879-w
Chapuran, T. E., Toliver, P., Peters, N. A., Jackel, J., Goodman, M. S., Runser, R. J., McNown, S. R., Dallmann, N., Hughes, R. J., McCabe, K. P., & Nordholt, J. E. (2009). Optical networking for quantum key distribution and quantum communications. New Journal of Physics., 11(10), 105001. https://doi.org/10.1088/1367-2630/11/10/105001/meta
Yi, H. (2021). A post-quantum secure communication system for cloud manufacturing safety. Journal of Intelligent Manufacturing., 32(3), 679–688. https://doi.org/10.1007/s10845-020-01682-y
Semwal, P. and Sharma, M.K.: Comparative study of different cryptographic algorithms for data security in cloud computing. In: 2017 3rd International Conference on Advances in Computing, Communication & Automation (2017, September), IEEE. https://ieeexplore.ieee.org/abstract/document/8344738
Namasudra, S. (2019). An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Experience., 31(3), e4364. https://doi.org/10.1002/cpe.4364
Verma, G., & Adhikari, S. (2020). Cloud computing security issues: a stakeholder’s perspective. SN Computer Science., 1(6), 1–8. https://doi.org/10.1007/s42979-020-00353-2
Sasikumar, S., Sundar, K., Jayakumar, C., Obaidat, M. S., Stephan, T., & Hsiao, K. F. (2022). Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in the cloud environment. Simulation Modelling Practice and Theory., 121, 102651.
Kumar, A., & Garhwal, S. (2021). State-of-the-art survey of quantum cryptography. Archives of Computational Methods in Engineering., 28, 3831–3868. https://doi.org/10.1007/s11831-021-09561-2
Backe, A. and Lindén, H. (2015) Cloud computing security: a systematic literature review. https://www.diva-portal.org/smash/record.jsf?pid=diva2%3A825307&dswid=6532
Chaudhary, S., Suthar, F., & Joshi, N. K. (2020). Comparative study between cryptographic and hybrid techniques for implementation of security in cloud computing. Performance Management of Integrated Systems and its Applications in Software Engineering. https://doi.org/10.1007/978-981-13-8253-6_12
Parast, F. K., Sindhav, C., Nikam, S., Yekta, H. I., Kent, K. B., & Hakak, S. (2022). Cloud computing security: a survey of service-based models. Computers Security., 114, 102580.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We hereby declare that this manuscript is an original work and is not under consideration for publication in any other journal. All authors have approved the submission of the manuscript to the journal mentioned above.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, A., Verma, G. Revolutionizing Cloud Security: Leveraging Quantum Computing and Key Distribution for Enhanced Protection. Rev Socionetwork Strat 17, 131–143 (2023). https://doi.org/10.1007/s12626-023-00140-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12626-023-00140-4