Cloud Data Security through BB84 Protocol and Genetic Algorithm

被引:3
|
作者
Kumar, Jaydip [1 ]
Saxena, Vipin [1 ]
机构
[1] BabasahebBhimraoAmbedkar Univ, Dept Comp Sci, Lucknow, Uttar Pradesh, India
关键词
Attribute based Encryption; BB84 Protocol Cloud; Data Security; Geneticncryption/Decryption; Quantum Key Distribution; QUANTUM KEY DISTRIBUTION; ACCESS-CONTROL; AUTHENTICATION; CRYPTOGRAPHY;
D O I
10.21123/bsj.2022.7281
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization's information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user's data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
引用
收藏
页码:1445 / 1453
页数:9
相关论文
共 50 条
  • [41] Optimizing the decoy-state BB84 QKD protocol parameters
    Attema, Thomas
    Bosman, Joost W.
    Neumann, Niels M. P.
    QUANTUM INFORMATION PROCESSING, 2021, 20 (04)
  • [42] Simulation of BB84 Quantum Key Exchange Protocol and Attack Analysis
    Adiyaman, Ilker Burak
    Sogukpinar, Ibrahim
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 203 - 207
  • [43] Narrow basis angle doubles secret key in the BB84 protocol
    Matsumoto, Ryutaroh
    Watanabe, Shun
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2010, 43 (14)
  • [44] Randomness determines practical security of BB84 quantum key distribution
    Hong-Wei Li
    Zhen-Qiang Yin
    Shuang Wang
    Yong-Jun Qian
    Wei Chen
    Guang-Can Guo
    Zheng-Fu Han
    Scientific Reports, 5
  • [45] An improved scheme that the random matrix transformation used for BB84 protocol
    Cui Shu-Min
    Ma Li-Hua
    Shi Lei
    Xu Zhi-Yan
    Hong Hua
    Chen Xiao-Ping
    INTERNATIONAL CONFERENCE ON PHOTONICS AND OPTICAL ENGINEERING (ICPOE 2014), 2015, 9449
  • [46] Quantum key distribution secure threshold based on BB84 protocol
    Zhao Nan
    Pei Chang-Xing
    Liu Dan
    Quan Dong-Xiao
    Sun Xiao-Nan
    ACTA PHYSICA SINICA, 2011, 60 (09)
  • [47] Man-in-the-middle Attack on BB84 Protocol and its Defence
    Wang Yong
    Wang Huadeng
    Li Zhaohong
    Huang Jinxiang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434
  • [48] Security of biased BB84 quantum key distribution with finite resource
    赵良圆
    李宏伟
    银振强
    陈巍
    尤娟
    韩正甫
    Chinese Physics B, 2014, 23 (10) : 28 - 35
  • [49] Optimizing the decoy-state BB84 QKD protocol parameters
    Thomas Attema
    Joost W. Bosman
    Niels M. P. Neumann
    Quantum Information Processing, 2021, 20
  • [50] The FPGA Implementation of Quantum Key Distribution Based on BB84 protocol
    Li, Huifang
    Zhang, Minghui
    Wang, Kaibin
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1571 - 1574