Cloud Data Security through BB84 Protocol and Genetic Algorithm

被引:3
|
作者
Kumar, Jaydip [1 ]
Saxena, Vipin [1 ]
机构
[1] BabasahebBhimraoAmbedkar Univ, Dept Comp Sci, Lucknow, Uttar Pradesh, India
关键词
Attribute based Encryption; BB84 Protocol Cloud; Data Security; Geneticncryption/Decryption; Quantum Key Distribution; QUANTUM KEY DISTRIBUTION; ACCESS-CONTROL; AUTHENTICATION; CRYPTOGRAPHY;
D O I
10.21123/bsj.2022.7281
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization's information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user's data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
引用
收藏
页码:1445 / 1453
页数:9
相关论文
共 50 条
  • [31] Simulation of BB84 and proposed protocol for quantum key distribution
    Kalra, Manish
    Poonia, Ramesh C.
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2018, 21 (04): : 661 - 666
  • [32] On the Breidbart eavesdropping problem of the extended BB84 QKD protocol
    Yang, L
    Wu, LA
    Liu, SH
    ACTA PHYSICA SINICA, 2002, 51 (05) : 961 - 965
  • [33] Eevesdropping of practical QKD system based on BB84 protocol
    Liu, Jingfeng
    Liang, Ruisheng
    Tang, Zhilie
    Wei, Zhengjun
    Chen, Zhixin
    Liao, Changjun
    Liu, Songhao
    Guangzi Xuebao/Acta Photonica Sinica, 2004, 33 (11):
  • [34] On the Breidbart eavesdropping problem of the extended BB84 QKD protocol
    Yang, Li
    Wu, Ling-An
    Liu, Song-Hao
    Wuli Xuebao/Acta Physica Sinica, 2002, 51 (05):
  • [35] Secure direct communication using deterministic BB84 protocol
    Hwang, Tzonelih
    Li, Chuan-Ming
    Lee, Narn-Yih
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2008, 19 (04): : 625 - 635
  • [36] Noise tolerance of the BB84 protocol with random privacy amplification
    Watanabe, Shun
    Matsumoto, Ryutaroh
    Uyematsu, Tomohiko
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2006, 4 (06) : 935 - 946
  • [37] Noise tolerance of the BB84 protocol with random privacy amplification
    Watanabe, S
    Matsumoto, R
    Uyematsu, T
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1013 - 1017
  • [38] Shor and Preskill's and Mayers's security proof for the BB84 quantum key distribution protocol
    D. Mayers
    The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics, 2002, 18 : 161 - 170
  • [39] Design a New Protocol and Compare with BB84 Protocol for Quantum Key Distribution
    Kalra, Manish
    Poonia, Ramesh C.
    SOFT COMPUTING FOR PROBLEM SOLVING, 2019, 817 : 969 - 978
  • [40] Shor and Preskill's and Mayers's security proof for the BB84 quantum key distribution protocol
    Mayers, D
    EUROPEAN PHYSICAL JOURNAL D, 2002, 18 (02): : 161 - 170