Abstract
In today’s scenario of computing paradigm, the cloud framework has become a significant solution on peak of virtualization for the utilization of computing models. However, the model has the latent to influence users and organizations; there are several security issues over shared data. In existing models for cloud data security, several considerations are made. Still, there is a requirement for ensuring cloud storage security with Third Party Auditing and distributed accountability. For that, this paper develops a new model called Enhanced Cloud Security Model using Quantum Key Distribution Protocol (ECSM-QKDP), for providing cloud storage security and manage with data dynamics, quantum key cryptography is incorporated. Moreover, this work considers the scenario of communication between three entities such as, Cloud Server, Data Owner and Legitimate User (LU), in which the quantum keys are shared in two steps. In the first step, BB84 QKDP is used and in the second process, Secure Authentication Protocol is framed based on distance bounding and secure keys, which are generated here using Hierarchical Attribute-Set based Encryption. By utilizing the model, the secured keys are transmitted through trusted channel to the LU. The results show that the proposed model provides effective results than existing models.
Similar content being viewed by others
Data availability
Authors do not have the authorization to share the data publicly.
References
Scott, A.: The limits of quantum computers. In: Proceedings of the second international conference on computer science: theory and applications, CSR’07. pp. 4–4. Springer-Verlag, Berlin, Heidelberg (2007). https://doi.org/10.1186/s13635-016-0051-2
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing, University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, (2009)
Wang, C., Wang, Q., Ren, K.: Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 2(2), 220–232 (2012)
Barz, S., Kashefi, E., Broadbent, A., Fitzsimons, J.F., Zeilinger, A., Walther, P.: Demonstration of blind quantum computing. Science 335(6066), 303–308 (2012). https://doi.org/10.1186/s13677-015-0037-5
Bensch, S.: Cloud networks for sustainable ubiquitous services. Int. J. Comput. Sci. Eng. 10(4), 336–346 (2015)
Gorantla, M.C., Boyd, C., Nieto, J.M.G.: Attribute-based authenticated key exchange. In: Information Security and Privacy, pp. 300–317, Springer, Berlin, Heidelberg (2010)
Arkko, J., Nikander, P.: Limitations of IPsec policy mechanisms. IEEE, pp. 1–11 (2010)
Oracle: Transport-layer security. http://docs.oracle.com/cd/E19798-01/821-1841/bnbxc/index.html. Accessed 22 Dec 2013
Mink, A., Frankel, S., Perlner, R.: Quantum key distribution (QKD) and commodity security protocols: introduction and integration. Int. J. Netw. Secur. Appl. 1(2), 1–12 (2009)
Mosca, M., Stebila, D., Ustaoglu, B.: Quantum key distribution in the classical authenticated key exchange framework. IEEE, pp. 1–17 (2012)
Yang, L., Wu, L.-A.: Two-point attack on the two non-orthogonal states QKD protocol over a fiber optic channel. In: Proc. SPIE 5631, Quantum Optics and Applications in Computing and Communications II, (2005). https://doi.org/10.1117/12.574313
Shukla, C., Banerjee, A., Pathak, A., Radhakrishna, S.: Secure quantum communication with orthogonal states. Int. J. Quantum Inf. (2014). https://doi.org/10.1142/S0219749916400219
Shih, H., Lee, K., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quant. Electron. 15, 1602–1606 (2009)
Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE 10(10), 1–6 (2010)
Cotler, J.S., Shor, P.W.: A New relativistic orthogonal states quantum key distribution protocol. Arxiv, pp. 1–6 (2013)
Chuan, W., Wan-Ying, W., Qing, A., Gui-Lu, L.: Deterministic quantum key distribution with pulsed homodyne detection. Chin. Phys. Soc. IOP Publ. Ltd. 53(1), 67–70 (2010)
Zeng, G.,Wang, X.: Quantum key distribution with authentication. In: National Key Lab. pp. 1–15 (2013)
Lim, C.C.W., Portmann, C., Tomamichel, M., Renner, R., Gisin, N.: Device-independent quantum key distribution with local bell test. Am. Phys. Soc. 3, 1–11 (2013)
Dianati, M., All ́aume, R.: Transport Layer protocols for the secoqc quantum key distribution (QKD) network. IEEE, pp. 1–8
Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)
Moritoh, Y., Imai, Y., Inomo, H., Shiraki, W.: A cloud service on distributed multiple servers for cooperative learning and emergency communication. Commun. Comput. Inf. Sci. 188, 377–390 (2011)
Lin, H.-Y., Wen-GueyTzeng: A Secure erasure code-based cloud storage system with secure data forwarding. IEEE 23(6), 995–1003 (2012)
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F., (eds.) ACM conference on computer and communications security, ACM, pp. 598–609 (2007)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE 22(5), 847–859 (2011)
Sundareswaran, S., Squicciarini, A., Lin, D.: Ensuring distributed accountability for data sharing in the cloud. IEEE 9(4), 556–568 (2012)
Premarathne, U.: Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Comput. 3(4), 58–64 (2016)
Esposito, C., Castiglione, A., Tudorica, C.A., Pop, F.: Security and privacy for cloud-based data management in the health network service chain: a micro-service approach. IEEE Commun. Mag. 55(9), 102–108 (2017)
Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Trans. Dependable Secure Comput. 16, 996–1010 (2017)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sundar, K., Sasikumar, S. & Jayakumar, C. Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud. Quantum Inf Process 21, 115 (2022). https://doi.org/10.1007/s11128-022-03452-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-022-03452-6