Skip to main content
Log in

Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

In today’s scenario of computing paradigm, the cloud framework has become a significant solution on peak of virtualization for the utilization of computing models. However, the model has the latent to influence users and organizations; there are several security issues over shared data. In existing models for cloud data security, several considerations are made. Still, there is a requirement for ensuring cloud storage security with Third Party Auditing and distributed accountability. For that, this paper develops a new model called Enhanced Cloud Security Model using Quantum Key Distribution Protocol (ECSM-QKDP), for providing cloud storage security and manage with data dynamics, quantum key cryptography is incorporated. Moreover, this work considers the scenario of communication between three entities such as, Cloud Server, Data Owner and Legitimate User (LU), in which the quantum keys are shared in two steps. In the first step, BB84 QKDP is used and in the second process, Secure Authentication Protocol is framed based on distance bounding and secure keys, which are generated here using Hierarchical Attribute-Set based Encryption. By utilizing the model, the secured keys are transmitted through trusted channel to the LU. The results show that the proposed model provides effective results than existing models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Authors do not have the authorization to share the data publicly.

References

  1. Scott, A.: The limits of quantum computers. In: Proceedings of the second international conference on computer science: theory and applications, CSR’07. pp. 4–4. Springer-Verlag, Berlin, Heidelberg (2007). https://doi.org/10.1186/s13635-016-0051-2

  2. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing, University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, (2009)

  3. Wang, C., Wang, Q., Ren, K.: Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 2(2), 220–232 (2012)

    Article  Google Scholar 

  4. Barz, S., Kashefi, E., Broadbent, A., Fitzsimons, J.F., Zeilinger, A., Walther, P.: Demonstration of blind quantum computing. Science 335(6066), 303–308 (2012). https://doi.org/10.1186/s13677-015-0037-5

    Article  MathSciNet  MATH  ADS  Google Scholar 

  5. Bensch, S.: Cloud networks for sustainable ubiquitous services. Int. J. Comput. Sci. Eng. 10(4), 336–346 (2015)

    Google Scholar 

  6. Gorantla, M.C., Boyd, C., Nieto, J.M.G.: Attribute-based authenticated key exchange. In: Information Security and Privacy, pp. 300–317, Springer, Berlin, Heidelberg (2010)

  7. Arkko, J., Nikander, P.: Limitations of IPsec policy mechanisms. IEEE, pp. 1–11 (2010)

  8. Oracle: Transport-layer security. http://docs.oracle.com/cd/E19798-01/821-1841/bnbxc/index.html. Accessed 22 Dec 2013

  9. Mink, A., Frankel, S., Perlner, R.: Quantum key distribution (QKD) and commodity security protocols: introduction and integration. Int. J. Netw. Secur. Appl. 1(2), 1–12 (2009)

    Google Scholar 

  10. Mosca, M., Stebila, D., Ustaoglu, B.: Quantum key distribution in the classical authenticated key exchange framework. IEEE, pp. 1–17 (2012)

  11. Yang, L., Wu, L.-A.: Two-point attack on the two non-orthogonal states QKD protocol over a fiber optic channel. In: Proc. SPIE 5631, Quantum Optics and Applications in Computing and Communications II, (2005). https://doi.org/10.1117/12.574313

  12. Shukla, C., Banerjee, A., Pathak, A., Radhakrishna, S.: Secure quantum communication with orthogonal states. Int. J. Quantum Inf. (2014). https://doi.org/10.1142/S0219749916400219

    Article  Google Scholar 

  13. Shih, H., Lee, K., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quant. Electron. 15, 1602–1606 (2009)

    Article  ADS  Google Scholar 

  14. Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE 10(10), 1–6 (2010)

    Google Scholar 

  15. Cotler, J.S., Shor, P.W.: A New relativistic orthogonal states quantum key distribution protocol. Arxiv, pp. 1–6 (2013)

  16. Chuan, W., Wan-Ying, W., Qing, A., Gui-Lu, L.: Deterministic quantum key distribution with pulsed homodyne detection. Chin. Phys. Soc. IOP Publ. Ltd. 53(1), 67–70 (2010)

    MATH  Google Scholar 

  17. Zeng, G.,Wang, X.: Quantum key distribution with authentication. In: National Key Lab. pp. 1–15 (2013)

  18. Lim, C.C.W., Portmann, C., Tomamichel, M., Renner, R., Gisin, N.: Device-independent quantum key distribution with local bell test. Am. Phys. Soc. 3, 1–11 (2013)

    Google Scholar 

  19. Dianati, M., All ́aume, R.: Transport Layer protocols for the secoqc quantum key distribution (QKD) network. IEEE, pp. 1–8

  20. Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)

    Article  ADS  Google Scholar 

  21. Moritoh, Y., Imai, Y., Inomo, H., Shiraki, W.: A cloud service on distributed multiple servers for cooperative learning and emergency communication. Commun. Comput. Inf. Sci. 188, 377–390 (2011)

    Google Scholar 

  22. Lin, H.-Y., Wen-GueyTzeng: A Secure erasure code-based cloud storage system with secure data forwarding. IEEE 23(6), 995–1003 (2012)

    Google Scholar 

  23. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F., (eds.) ACM conference on computer and communications security, ACM, pp. 598–609 (2007)

  24. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE 22(5), 847–859 (2011)

    Google Scholar 

  25. Sundareswaran, S., Squicciarini, A., Lin, D.: Ensuring distributed accountability for data sharing in the cloud. IEEE 9(4), 556–568 (2012)

    Google Scholar 

  26. Premarathne, U.: Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Comput. 3(4), 58–64 (2016)

    Article  Google Scholar 

  27. Esposito, C., Castiglione, A., Tudorica, C.A., Pop, F.: Security and privacy for cloud-based data management in the health network service chain: a micro-service approach. IEEE Commun. Mag. 55(9), 102–108 (2017)

    Article  Google Scholar 

  28. Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Trans. Dependable Secure Comput. 16, 996–1010 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sundar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sundar, K., Sasikumar, S. & Jayakumar, C. Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud. Quantum Inf Process 21, 115 (2022). https://doi.org/10.1007/s11128-022-03452-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-022-03452-6

Keywords

Navigation