CFP last date
20 January 2025
Reseach Article

Securing Cloud Computing Environment using Quantum Key Distribution

by Akhilesh Yadav, Manish, Rani Tiwari, Rishabh Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 41
Year of Publication: 2018
Authors: Akhilesh Yadav, Manish, Rani Tiwari, Rishabh Jain
10.5120/ijca2018917112

Akhilesh Yadav, Manish, Rani Tiwari, Rishabh Jain . Securing Cloud Computing Environment using Quantum Key Distribution. International Journal of Computer Applications. 180, 41 ( May 2018), 43-45. DOI=10.5120/ijca2018917112

@article{ 10.5120/ijca2018917112,
author = { Akhilesh Yadav, Manish, Rani Tiwari, Rishabh Jain },
title = { Securing Cloud Computing Environment using Quantum Key Distribution },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 180 },
number = { 41 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 43-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number41/29407-2018917112/ },
doi = { 10.5120/ijca2018917112 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:03:20.774153+05:30
%A Akhilesh Yadav
%A Manish
%A Rani Tiwari
%A Rishabh Jain
%T Securing Cloud Computing Environment using Quantum Key Distribution
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 41
%P 43-45
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, Information Technology group is undergone significant shift in computing and protecting business value by using well-built, workable and authentic replacement of Cloud Computing. Cloud Computing is a contemporary computational architecture that provides another type of model. Cloud Computing provides substantial measure of computing, storage services, Data classification, IT assets and data management and cyber security. An unauthorized user may be accessed this data through virtual machines. This uncertainty creates a big problem. Cloud Computing is used in both public and private sector due to its accessibility, availability, and cost effectiveness. However, security of data transfer between client and server is still a big problem. Many scientists and researchers have brought up another cryptographic subject in Quantum Computing which is called Quantum Key Distribution (QKD). The first QKD protocol is BB84 that was presented by Charles Bennett and Gilles Brassard in 1984 [4]. This paper proposes as a service of Advanced Quantum Cryptography in Cloud Computing. This paper discusses the security issues of cloud computing and the role of cryptography technique in Cloud computing to enrich the Information Security [13].

References
  1. Prof. Suraj R. Pardeshi, Prof. Kailash D. Kharat, Prof. Vikul J. Pawar, Department of Computer Science and Engineering Government College of Engineering Aurangabad, Maharashtra, India, “Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques” IEEE International Conference on cloud computing, 2016.
  2. Jashanpreet Pal Kaur, Rajbhupinder kaur, Yadavindra College of Engineering, Talwandi Sabo, Bathinda Punjab, “Security Issues and Use of Cryptography in Cloud Computing" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 7, July 2014, ISSN: 2277 128X.
  3. Wang, L., Tao, J., & Kunze, M. (2008). “Scientific cloud computing: Early definition and experience”. Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Austin, TX, 825–830.
  4. Nelson Gonzalez, Charles Miers, Fernando Redígolo, Tereza Carvalho, Marcos Simplicio, “An quantitative analysis of current security concerns and solutions for cloud computing” Springer 2012.
  5. Er. Sharanjit Singh, Er. Rasneer kaur (IJETCAS) ISSN (Print): 2279-0047 , ISSN (Online): 2279- 0055.
  6. Reservoir Project [URL]. http://www-03.ibm.com/ press/ us/ en/ pressrelease/23448.wss/, access on June 2008.
  7. Amazon Elastic Compute Cloud [URL]. http://aws.amazon.com/ ec2, access on Nov. 2007.
  8. IBM Blue Cloud project [URL]. http://www-3.ibm.com/pressrelease/us/en/ pressrelease/22613.wss/, access on June 2008.
  9. Wang, H., Sheng, B. and Li, Q. (2006) ‘Elliptic curve cryptography based access control in sensor networks’, Int. J. Security and Networks,Vol. 1, Nos. 3/4, pp.127–137.
  10. Ms Bhavana Sharma, B.P.I.T., Rohini, Delhi-“Security Architecture Of Cloud Computing Based On Elliptic Curve Cryptography (Ecc)”- Special Issue: Proceedings of 2nd International Conference on Emerging Trends in Engineering and Management, ICETEM 2013.
  11. Wikipedia, the free encyclopedia of Cloud Computing.
  12. Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi, ”Data Security in Cloud Computing with Elliptic Curve Cryptography””- International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012.
  13. http://www.inforisktoday.in/5-essential-characteristics-cloudcomputinga-4189
  14. Akashdeep Bhardwaja, GVB Subrahmanyamb, Vinay Avasthic, Hanumat Sastry, “Security Algorithms for Cloud Computing” - International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science 85 ( 2016 ) 535 – 542.
  15. Shweta Sharma, Bharat Bhushan, Shalini Sharma - ”Improvising Information Security in Cloud Computing Environment”- International Journal of Computer Applications (0975 – 8887) Volume 86 – No 16, January 2014.
  16. Neha Roy, Rishabh Jain, “Virtual Machine Scheduling on Clouds Using DVFS” - International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X, Volume 5, Issue 5, May 2015.
  17. Pooja Ahlawat, Poonam, Rishabh Jain, “An Improvement to Life of Wireless Sensor Network Using Leach Design a Cluster Head”- IJCSMS (International Journal of Computer Science & Management Studies) ISSN(Online) : 2231-5268,Volume 15, Issue 06, June 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Quantum Key Distribution Information Security Cryptography BB84.