Cloud Data Security through BB84 Protocol and Genetic Algorithm

Authors

  • Jaydip Kumar Department of Computer Science, BabasahebBhimraoAmbedkar University, Lucknow, India. https://orcid.org/0000-0001-9350-8775
  • Vipin Saxena Department of Computer Science, BabasahebBhimraoAmbedkar University, Lucknow, India.

DOI:

https://doi.org/10.21123/bsj.2022.7281

Keywords:

Attribute based Encryption, BB84 Protocol Cloud, Data Security, Geneticncryption/Decryption, Quantum Key Distribution

Abstract

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.

References

Zhang H, Ji Z, Wang H, Wu W. Survey on quantum information security. China Comm. 2019 Oct; 16(10): 1-36.

Zhou L, Wang Q, Sun X, Kulicki P, Castiglione A. Quantum technique for access control in cloud computing II: Encryption and key distribution. J NetwComput Appl. 2018 Feb 1; 103: 178-84.

Sharma G, Kalra S. Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer PeerNetw Appl. 2018 Mar; 11(2): 220-34.

Han J, Liu Y, Sun X, Song L. Enhancing data and privacy security in mobile cloud computing through quantum cryptography. In 2016 7th IEEE I Conf on Soft Eng and Service Sci (ICSESS) 2016 Aug 26: 398-401. IEEE.

Mustafa I, Khan IU, Aslam S, Sajid A, Mohsin SM, Awais M, et al. A lightweight post-quantum lattice-based RSA for secure communications. IEEE Access. 2020 May 19; 8: 99273-85.

Li J, Zhao Y, Yang Y, Lin Y. Verifiable Quantum Cloud Computation Scheme Based on Blind Computation. IEEE Access. 2020 Mar 19; 8: 56921-6.

Winick A, Lütkenhaus N, Coles PJ. Reliable numerical key rates for quantum key distribution. Quantum. 2018 Jul 26; 2:77.

Murali G, Prasad RS. CloudQKDP: Quantum key distribution protocol for cloud computing. In2016 I Conf on InfComm and Emb Sys. 2016 Feb 25: 1-6. IEEE.

Fatima S, Ahmad S. Quantum key distribution approach for secure authentication of cloud servers. Int J Cloud App Comp. 2021 Jul 1; 11(3): 19-32.

Olanrewaju RF, Islam T, Khalifa OO, Anwar F, Pampori BR. Cryptography as a service (CaaS): quantum cryptography for secure cloud computing. Indian J Sci Technol. 2017 Feb; 10(7): 1-6.

Qiu L, Sun X, Xu J. Categorical quantum cryptography for access control in cloud computing. Soft comput. 2018 Oct; 22(19): 6363-70.

Matthews RA. The use of genetic algorithms in cryptanalysis. Cryptologia. 1993 Apr 1; 17(2): 187-201.

Sugumar R, Leelavathy L. Ensure Data Security and Privacy using DNA Symmetric Encryption Method in Cloud. J InfComput Sci. 2020; 10(3): 676-689.

Wang B, Song W, Lou W, Hou YT. Privacy-preserving pattern matching over encrypted genetic data in cloud computing.IEEEIntConfIntell. ComputCommun. 2017 May 1: 1-9. Doi:10.1109/INFOCOM.2017.8057178

Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Rev Mod Phys. 2002 Mar 8; 74(1): 145.

Li J, Li N, Zhang Y, Wen S, Du W, Chen W, et al. A survey on quantum cryptography. Chinese J Electron. 2018 Mar; 27(2): 223-8.

Wang L, Alexander CA. Quantum science and quantum technology: Progress and challenges. Am. J. Electr. Electron. Eng. 2020 Mar 27; 8(2): 43-50.

Broadbent A, Schaffner C. Quantum cryptography beyond quantum key distribution. Des Codes Cryptogr. 2016 Jan; 78(1): 351-82.

Javurek M, Turčaník M, Matej B. Model of Encryption System with Genetic Algorithm. In 2019 Communication and Information Technologies (KIT) 2019 Oct 9 : 1-5.

Yadav M, Breja M. Secure DNA and Morse code based Profile access control models for Cloud Computing Environment. ProcediaComput Sci. 2020 Jan 1; 167: 2590-8.

Wu Y, Wei Z, Deng RH. Attribute-based access to scalable media in cloud-assisted content sharing networks. IEEE Trans Multimedia. 2013 Jan 10; 15(4): 778-88.

Maji H, Prabhakaran M, Rosulek M. Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. Cryptol. 2008: 1-23: https://eprint.iacr.org/2008/328

Kumar J, Saxena V. Hybridization of Cryptography for Security of Cloud Data.Int J Future Gener. Commun. Netw. 2020; 13(4): 4007-14.

Kumar J, Saxena V. Asymmetric encryption scheme to protect cloud data using paillier-cryptosystem.Int J ApplEvolComput. 2021 Apr 1; 12(2): 50-8.

Kumar S, Kumar N. Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment. Baghdad Sci J.2021 Jun 20; 18(2 (Suppl.)): 1020.

Abed MM, Younis MF. Developing load balancing for IoT-cloud computing based on advanced firefly and weighted round robin algorithms. Baghdad Sci J. 2019; 16(1):130-139.

Tahir M, Sardaraz M, Mehmood Z, Muhammad S. CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Cluster Comput. 2021 Jun; 24(2): 739-52.

Downloads

Published

2022-12-05

How to Cite

1.
Cloud Data Security through BB84 Protocol and Genetic Algorithm. Baghdad Sci.J [Internet]. 2022 Dec. 5 [cited 2024 Apr. 26];19(6(Suppl.):1445. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7281

Similar Articles

You may also start an advanced similarity search for this article.