CFP last date
20 December 2024
Reseach Article

Big Data Security Issues and Quantum Cryptography for Cloud Computing

by Vijey Thayananthan, Aiiad Albeshri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 34
Year of Publication: 2018
Authors: Vijey Thayananthan, Aiiad Albeshri
10.5120/ijca2018916876

Vijey Thayananthan, Aiiad Albeshri . Big Data Security Issues and Quantum Cryptography for Cloud Computing. International Journal of Computer Applications. 180, 34 ( Apr 2018), 22-28. DOI=10.5120/ijca2018916876

@article{ 10.5120/ijca2018916876,
author = { Vijey Thayananthan, Aiiad Albeshri },
title = { Big Data Security Issues and Quantum Cryptography for Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2018 },
volume = { 180 },
number = { 34 },
month = { Apr },
year = { 2018 },
issn = { 0975-8887 },
pages = { 22-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number34/29267-2018916876/ },
doi = { 10.5120/ijca2018916876 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:02:39.477069+05:30
%A Vijey Thayananthan
%A Aiiad Albeshri
%T Big Data Security Issues and Quantum Cryptography for Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 34
%P 22-28
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Enhancement of security in cloud computing is challengeable when big data such as medical and government confidential information involves in a cloud environment. The managing key for individual user participated in the mobile cloud will be the problem when big data is handled without efficient security key management. Especially, mobile cloud nodes where users handle their data can be anywhere else in the cloud environment. So, managing keys for random users and finding correct locations of users’ nodes and their identities are interesting areas for the research. To solve this problem related to key management, cloud services need efficient key management that employs quantum cryptography using Grover’s algorithm. Moreover, in this research, we introduce effective authentication technique in order to improve the level of security (with minimum complexity) In this paper, theoretical model, Grover’s algorithm and quantum cryptography with the PairHand protocol are considered as methodologies. As summarized results, security levels of users and services providers are considered to verify the services used in a cloud environment. In spite of same quantum properties characterize the light, data security issues are still not matured with the light technology. Hiding the big data in the light through this research methodology will be the conclusion of the future security.

References
  1. H. A. Elbaz, M. H. Abd-elaziz, & T. Nazmy, “Trusting Identity Based Authentication on Hybrid Cloud Computing,” In Cloud Computing, Springer International Publishing, pp. 179-188, 2014.
  2. M. Maurera,∗, I. Brandica, R. Sakellariou, “Adaptive resource configuration for Cloud infrastructure management,” Future Generation Computer Systems 29 472–487, 2013.
  3. N. Couch and B. Robins, “Big Data for Defence and Security,” report, Royal United Services Institute (RUSI), pp. 2 -36, 2013.
  4. D. He, M. Ma, Y. Zhang, C. Chen and J. Bu, “A Strong User Authentication Scheme with Smart Cards for Wireless Communications,” Computer Comm., vol. 34, no. 3, pp. 367-374, 2011.
  5. D. He, J. Bu, S. Chan and C. Chen, “Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks,” IEEE Transactions on Computers, VOL. 62, NO. 3, MARCH 2013.
  6. M. S. Farash, M. A. Attari, R. E. Atani, & M. A. Jami, “New efficient authenticated multiple-key exchange protocol from bilinear pairings,” Computers & Electrical Engineering, 39(2), 530-541, 2013.
  7. M. S. Farash, & M. A. Attari, “An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems,” Information Technology And Control, 43(2), 143-150, 2014.
  8. V. Thayananthan and A. Albeshri, “Big data security issues based on quantum cryptography and privacy with authentication for mobile data center,” 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15) Elsevier, India, Volume 50, Pages 149–156 2015.
  9. Y. Li, L. Du, G. Zhao, & J. Guo, “A lightweight identity-based authentication protocol,” In Signal Processing, Communication and Computing (ICSPCC), 2013 IEEE International Conference on IEEE, pp. 1-4, August 2013.
  10. P. Mehrotra, L. H. Pryor, F. R. Bailey and M. Cotnoir, “Supporting “Big Data” Analysis and Analytics at the NASA Advanced Supercomputing (NAS) Facility,” NAS Technical Report: NAS-2014.
  11. K. Lauther and A. Mityagin. Security Analysis of KEA Authenticated Key Exchange Protocol. PKC 2006, volume 3958 of Lecture Notes in Computer Science, pages 378-394. Springer-Verlag, 2006.
  12. B. Grobauer, T. Walloschek, and E. Stöcker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010.
  13. S. Subashini, and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J Network Comput Appl. 2010, doi:10.1016/j.jnca.2010.07.006.
  14. S. Ramgovind, M. M. Eloff, E. Smith. “The Management of Security in Cloud Computing,” In PROC 2010 IEEE International Conference on Cloud Computing 2010.
  15. J. Cao, H. Li, M. Ma, et al. “A Simple and Robust Handover Authentication between HeNB and eNB in LTE Networks,” Journal Computer Networks: The International Journal of Computer and Telecommunications Networking, 56, pp. 2119-2131, 2012.
  16. W. Stallings , "Cryptography and Network Security: Principles and Practice," Prentice Hall; 5 edition, January 24, 2010.
  17. S. A. Goorden, M. Horstmann, A. P. Mosk, B. Škori, and P. W. H. Pinkse, "Quantum-Secure Authentication Of A Physical Unclonable Key," Optica, Vol. 1, No. 6, December 2014.
  18. V. Thayananthan, A. Alzahrani and M. S. Qureshi, “Efficient techniques of key management and quantum cryptography in RFID networks," Security and Communication Networks, USA, 2014.
  19. V. Thayananthan and A. Alzahrani, “Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks,” IJCA Special Issue on “Network Security and Cryptograph. (NSC 2011), International Journal of Computer Applications (IJCA), USA, pp. 45-49, 2011.
  20. R. K. Balachandra, P. V. Ramakrishna and A. Rakshit. “Cloud Security Issues,” In PROC ‘09 IEEE International Conference on Services Computing, pp. 517-520, 2009.
  21. P. R. Bryant, R. H. Katz & E. Lazowska, “Big-Data Computing: Creating revolutionary breakthroughs in commerce, science and society,” Washington, DC: Computing Community Consortium, 2008.
  22. John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman, “Introduction to Automata Theory Languages and Computation”. Ch-1, 27-29, 3rd Edition Cornell University, Stanford University, California, USA, 2001.
  23. J. Holub and S. ˇStekr. On parallel implementations of deterministic finite automata. In Implementation and Application of Automata, CIAA ’09, pages 54–64, 2009.
  24. V Thayananthan, A. Alrehily and R. Fallatah, “Automata Design with Time Complexity for Intelligent Vending Machine based on Visual Automata Simulator,” IEEE 17th International Conference on Computer Modelling and Simulation, UK, University of Cambridge, pages 159-164, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Big data security PairHand protocol Key Management Quantum cryptography Cloud services