Reference Hub6
Cryptographic Cloud Computing Environment as a More Trusted Communication Environment

Cryptographic Cloud Computing Environment as a More Trusted Communication Environment

Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem
Copyright: © 2014 |Volume: 6 |Issue: 2 |Pages: 14
ISSN: 1938-0259|EISSN: 1938-0267|EISBN13: 9781466654440|DOI: 10.4018/ijghpc.2014040103
Cite Article Cite Article

MLA

Jasim, Omer K., et al. "Cryptographic Cloud Computing Environment as a More Trusted Communication Environment." IJGHPC vol.6, no.2 2014: pp.38-51. http://doi.org/10.4018/ijghpc.2014040103

APA

Jasim, O. K., Abbas, S., El-Horbaty, E. M., & Salem, A. M. (2014). Cryptographic Cloud Computing Environment as a More Trusted Communication Environment. International Journal of Grid and High Performance Computing (IJGHPC), 6(2), 38-51. http://doi.org/10.4018/ijghpc.2014040103

Chicago

Jasim, Omer K., et al. "Cryptographic Cloud Computing Environment as a More Trusted Communication Environment," International Journal of Grid and High Performance Computing (IJGHPC) 6, no.2: 38-51. http://doi.org/10.4018/ijghpc.2014040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud Communication Environment is an internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources and services that belong to different organizations. In order to develop cloud computing applications, security and trust to share data through distributed resources must be assured. This paper offers a study of the different mechanisms used in open cloud environments such as keys generation and management, and encryption/decryption algorithms. In addition, the paper proposes a new cryptographic environment, annotated as “CCCE” that deploys the combination between quantum key distribution mechanisms (QKD) and advanced encryption standard (AES), and demonstrates how quantum mechanics can be applied to improve computation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.