Secure key management in cloud environment using quantum cryptography

Cloud Computing innovation is exceptionally valuable in present everyday life, it utilizes the web and the focal remote servers to give and keep up information and in addition applications. Such applications thusly can be utilized by the end clients by means of the cloud correspondences with no establishment. Besides, the end clients' information records can be gotten to and controlled from some other PC utilizing the web administrations. In spite of the adaptability of information and application getting to and use that Cloud Computing conditions, there are numerous inquiries as yet coming up on the best way to pick up a confided in condition that shield information and applications in mists from programmers and interlopers. This paper reviews the "keys age" instrument and encryption/decoding calculations utilized in Cloud Computing conditions, We proposed new security mechanisms for Cloud Computing condition that considers the Quantum Key Allocation (QKA) and overcomes different security holes however much as could reasonably be expected.. RÉSUMÉ. L'innovation de l’informatique en nuage est exceptionnellement précieuse dans la vie quotidienne actuelle, elle utilise l’internet et les serveurs distants focaux pour donner et maintenir des informations et en plus des applications. De telles applications peuvent ainsi être utilisées par les clients finaux au moyen de correspondances dans le nuage sans établissement. En outre, les enregistrements d'informations des clients finaux peuvent être obtenus et contrôlés à partir d'autres ordinateurs personnels utilisant les administrations de l’internet. Malgré l’adaptabilité des informations et des applications d’utiliser les conditions de l’informatique en nuage, de nombreuses demandes de renseignements restent à venir sur la meilleure facon de détecter une situation confiante dans la protection des informations et des applications entre les programmeurs et les intrus. Cet article examine l'instrument "Keys Age " et les calculs de cryptage/décodage utilisés dans les conditions de l’informatique en nuage, nous avons proposé de nouveaux mécanismes de sécurité pour la condition Cloud Computing qui considère distribution de clé quantique (QKA) et surmonte différents trous de sécurité, mais autant que l'on pouvait raisonnablement s'y attendre.

[1]  Suresh Pabboju,et al.  Data security in cloud computing and outsourced databases , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[2]  Ahmed Youssef,et al.  Operations of electric vehicle traction system , 2018, Mathematical Modelling of Engineering Problems.

[3]  T. Subha,et al.  Enhancing data storage security in Cloud using Certificateless public auditing , 2017, 2017 2nd International Conference on Computing and Communications Technologies (ICCCT).

[4]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[5]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[6]  Scott M. Baker,et al.  Server virtualization , 2005 .

[7]  S. Jayashri,et al.  Efficient privacy preserving integrity checking model for cloud data storage security , 2017, 2016 Eighth International Conference on Advanced Computing (ICoAC).

[8]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[9]  O. KuyoroS.,et al.  Cloud computing security issues and challenges , 2011 .

[10]  Seema Verma,et al.  A comprehensive evaluation of cryptographic algorithms in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[11]  Yanheng Liu,et al.  Enhancing data and privacy security in mobile cloud computing through quantum cryptography , 2016, 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS).