Abstract
In today's advanced and technologically advanced world, cloud computing has emerged as a popular platform for managing and maintaining data, information, and services worldwide. Therefore, it is essential to deal with security concerns and develop sufficient procedures to protect the confidentiality and integrity of data. This study proposes a secure cloud data access paradigm that uses QKD and attribute-based encryption (ABE) to address these issues. The study uses ABE to encrypt user information and ensure its safety during transmission and storage. Moreover, the quantum key is used to access cloud-based information. In addition, the quantum channel ensures the safe transfer of keys between nodes. The proposed model is simulated using MATLAB. The results are compared to the current state of the art regarding various performance parameters like encryption and decryption time, key generation time, etc. The simulation results show that the suggested model is superior to the current state of the art.







Similar content being viewed by others
References
Chaudhary S, Suthar F, Joshi NK. Comparative study between cryptographic and hybrid techniques for implementation of security in cloud computing. Perform Manag Integr Syst Appl Softw Eng. 2020. https://doi.org/10.1007/978-981-13-8253-6_12.
Amaithi Rajan A. Systematic survey: secure and privacy-preserving big data analytics in cloud. J Comput Inf Syst. 2023. https://doi.org/10.1080/08874417.2023.2176946.
Parast FK, Sindhav C, Nikam S, Yekta HI, Kent KB, Hakak S. Cloud computing security: a survey of service-based models. Comput Secur. 2022;114: 102580. https://doi.org/10.1016/j.cose.2021.102580.
Rastogi G, Sushil R. Cloud computing implementation: key issues and solutions. In: 2nd international conference on computing for sustainable global development (INDIACom). 2015. pp. 320–24. https://doi.org/10.13140/RG.2.1.1835.2161.
Sun PJ. Security and privacy protection in cloud computing: discussions and challenges. J Netw Comput Appl. 2020. https://doi.org/10.1016/j.jnca.2020.102642.
Verma G. Secure VM migration in cloud: multi-criteria perspective with improved optimization model. Wirel Pers Commun. 2022. https://doi.org/10.1007/s11277-021-09319-w.
Rastogi G, Sushil R. Cloud computing security and homomorphic encryption. IUP J Comput Sci. 2015;9(3):48–58.
Guo L, Zheng X, Ding C, Mu D, Li Z. Cloud service recommendation: state of the art and research challenges. In: 2015 15th IEEE/ACM international symposium on cluster, cloud and grid computing. 2015. pp. 761–64. https://doi.org/10.1109/CCGrid.2015.144.
Verma G, Adhikari S. Cloud computing security issues: a stakeholder’s perspective. SN Comput Sci. 2020;1(6):1–8. https://doi.org/10.1007/s42979-020-00353-2.
Verma G, Kanrar S. A novel model to enhance the data security in cloud environment. Multiagent Grid Syst. 2022;18(1):45–63. https://doi.org/10.3233/MGS-220361.
Verma G, Kanrar S. Secure digital documents sharing using blockchain and attribute-based cryptosystem. Multiagent Grid Syst. 2022;18(3–4):365–79. https://doi.org/10.3233/MGS-221361.
Verma G. Secure client-side deduplication scheme for cloud with dual trusted execution environment. IETE J Res. 2022. https://doi.org/10.3233/MGS-221361.
Li J, Wei J, Liu W, Hu X. PMDP: a framework for preserving multiparty data privacy in cloud computing. Secur Commun Netw. 2017. https://doi.org/10.1155/2017/6097253.
Kumar A, Garhwal S. State-of-the-art survey of quantum cryptography. Arch Comput Methods Eng. 2021;28:3831–68. https://doi.org/10.1007/s11831-021-09561-2.
Verma G, Kumar A. Novel quantum key distribution and attribute-based encryption for cloud data security. Concurr Comput Pract Exp. 2023. https://doi.org/10.1002/cpe.7700.
Murugan G. An efficient algorithm on quantum computing with quantum key distribution for secure communication. Int J Commun. 2020;5:5–12.
Ukwuoma HC, Arome G, Thompson A, Alese BK. Post-quantum cryptography-driven security framework for cloud computing. Open Comput Sci. 2022;12(1):142–53. https://doi.org/10.1515/comp-2022-0235.
Fragkos G, Minwalla C, Plusquellic J, Tsiropoulou EE. Artificially intelligent electronic money. IEEE Consum Electron Mag. 2020;10(4):81–9. https://doi.org/10.1109/MCE.2020.3024512.
Sharma G, Kalra S. Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer Netw Appl. 2018;11:220–34. https://doi.org/10.1007/s12083-016-0528-2.
Zhu H, Wang C, Wang X. Quantum fully homomorphic encryption scheme for cloud privacy data based on quantum circuit. Int J Theor Phys. 2021;60:2961–75. https://doi.org/10.1007/s10773-021-04879-w.
Zhang X, Zhao J, Xu C, Wang H, Zhang Y. DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans Serv Comput. 2019. https://doi.org/10.1109/tsc.2019.2942297.
Namasudra S. An improved attribute-based encryption technique towards the data security in cloud computing. Concurr Comput Pract Exp. 2019;31(3): e4364. https://doi.org/10.1002/cpe.4364.
Aluvalu R, Chennam KK, Uma Maheswari V, Jabbar MA. A novel and secure approach for quantum key distribution in a cloud computing environment. In: Intelligent computing and networking: Proceedings of IC-ICN 2020. 2021. pp. 271–83. https://doi.org/10.1007/978-981-15-7421-4_25.
Sundar K, Sasikumar S, Jayakumar C. Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud. Quantum Inf Process. 2022;21(3):115. https://doi.org/10.1007/s11128-022-03452-6.
Sasikumar S, Sundar K, Jayakumar C, Obaidat MS, Stephan T, Hsiao KF. Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment. Simul Model Pract Theory. 2022;121: 102651. https://doi.org/10.1016/j.simpat.2022.102651.
Kumari S, Singh M, Singh R, Tewari H. Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices: a comprehensive survey. Softw Pract Exp. 2022;52(10):2047–76. https://doi.org/10.1002/spe.3121.
He H, Zheng LH, Li P, Deng L, Huang L, Chen X. An efficient attribute-based hierarchical data access control scheme in cloud computing. HCIS. 2020;10(1):1–9. https://doi.org/10.1186/s13673-020-00255-5.
Thangapandiyan M, Rubesh Anand PM, Sakthidasan Sankaran K. Quantum key distribution and cryptography mechanisms for cloud data security. In: International conference on communication and signal processing, April 3–5. 2018. https://doi.org/10.1109/ICCSP.2018.8524298.
Azzaoui A, Sharma P, Park JH. Blockchain-based delegated quantum cloud architecture for medical big data security. J Netw Comput Appl. 2021;198:103304. https://doi.org/10.1016/j.jnca.2021.103304. (Cover date: February 2022).
Abidin S, Swami A, Hussain N. Quantum cryptography technique: a way to improve security challenges in mobile cloud computing (MCC). Mater Today Proc. 2021;51(Part 1):508–14. https://doi.org/10.1016/j.matpr.2021.05.593. (Cover date: 2022).
Gong C, Du J, Dong Z, et al. Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing. Quantum Inf Process. 2020;19:105. https://doi.org/10.1007/s11128-020-2603-0.
Fatima S, Ahmad S. Quantum key distribution approach for secure authentication of cloud servers. Int J Cloud Appl Comput. 2021;11(3):19–32. https://doi.org/10.4018/IJCAC.2021070102.
Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J Parallel Distrib Comput. 2020;135:1–20. https://doi.org/10.1016/j.jpdc.2019.08.014.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
We hereby declare that this manuscript is an original work and is not under consideration for publication in any other journal. All authors have approved the submission of the manuscript to the respective journals.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, A., Verma, G. Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection. SN COMPUT. SCI. 4, 803 (2023). https://doi.org/10.1007/s42979-023-02285-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02285-z