Cloud Data Security through BB84 Protocol and Genetic Algorithm

被引:3
|
作者
Kumar, Jaydip [1 ]
Saxena, Vipin [1 ]
机构
[1] BabasahebBhimraoAmbedkar Univ, Dept Comp Sci, Lucknow, Uttar Pradesh, India
关键词
Attribute based Encryption; BB84 Protocol Cloud; Data Security; Geneticncryption/Decryption; Quantum Key Distribution; QUANTUM KEY DISTRIBUTION; ACCESS-CONTROL; AUTHENTICATION; CRYPTOGRAPHY;
D O I
10.21123/bsj.2022.7281
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization's information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user's data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
引用
收藏
页码:1445 / 1453
页数:9
相关论文
共 50 条
  • [1] Security of Entanglement Based Version of BB84 protocol for Quantum Cryptography
    Sharma, Anand
    Ojha, Vibha
    Lenka, S. K.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 615 - 619
  • [2] Simple proof of security of the BB84 quantum key distribution protocol
    Shor, PW
    Preskill, J
    PHYSICAL REVIEW LETTERS, 2000, 85 (02) : 441 - 444
  • [3] Simple analysis of security of the BB84 quantum key distribution protocol
    Hong-Yi Su
    Quantum Information Processing, 2020, 19
  • [4] Simple analysis of security of the BB84 quantum key distribution protocol
    Su, Hong-Yi
    QUANTUM INFORMATION PROCESSING, 2020, 19 (06)
  • [5] Security of hybrid BB84 with heterodyne detection
    Sidhu, Jasminder S.
    Maggi, Rocco
    Pascazio, Saverio
    Lupo, Cosmo
    QUANTUM SCIENCE AND TECHNOLOGY, 2025, 10 (02):
  • [6] How decoherence affects the security of BB84 quantum key distribution protocol
    Okula, Robert
    Mironowicz, Piotr
    QUANTUM INFORMATION PROCESSING, 2025, 24 (02)
  • [7] Semi device independence of the BB84 protocol
    Woodhead, Erik
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [8] Scheme of the arrangement for attack on the protocol BB84
    Khokhlov, D. L.
    OPTIK, 2016, 127 (18): : 7083 - 7087
  • [9] Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
    Reutov, Aleksei
    Tayduganov, Andrey
    Mayboroda, Vladimir
    Fat'yanov, Oleg
    ENTROPY, 2023, 25 (11)
  • [10] Security analysis of BB84 protocol in the collective-rotation noise channel
    Li Jian
    Chen Yan-Hua
    Pan Ze-Shi
    Sun Feng-Qi
    Li Na
    Li Lei-Lei
    ACTA PHYSICA SINICA, 2016, 65 (03)