Identity based secure authentication scheme based on quantum key distribution for cloud computing

Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of utmost significance as the number of hackers who seek to intrigue into legitimate user’s account to obtain sensitive information is increasing. Identity based authentication operates to corroborate the identity of the user so that only the legitimate user gets access to the service. This paper proposes a quantum identity based authentication and key agreement scheme for cloud server architecture. Quantum cryptography based on the laws of quantum physics is a vital technology for securing privacy and confidentiality in the field of network security. A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme. The security analysis of the proposed protocol proves that it is robust against all security attacks. To confirm applicability of quantum key distribution in cloud computing, a practical long-distance entanglement-based QKD experiment has been proposed. This experiment confirms successful generation of shifted keys over distance of 100 km of optical fiber with a key rate of 4.11 bit/s and an error rate of 9.21 %.

[1]  Yuh-Min Tseng,et al.  RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE , 2014, Informatica.

[2]  Nahid Shahmehri,et al.  Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[3]  Shi-Jinn Horng,et al.  Quantum direct communication with mutual authentication , 2009, Quantum Inf. Comput..

[4]  Xin Jia,et al.  A Quantum Protocol for (t,n)-Threshold Identity Authentication Based on Greenberger-Horne-Zeilinger States , 2013 .

[5]  Takashi Mihara,et al.  Quantum identification schemes with entanglements , 2002 .

[6]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[7]  Yi-you Nie,et al.  Quantum Secure Direct Communication Based on Four-Qubit Cluster States , 2013 .

[8]  Chen Yuan,et al.  Quantum Authentication Scheme Based on Entanglement Swapping , 2016 .

[9]  Gan Gao,et al.  Quantum Secure Direct Communication by Swapping Entanglements of 3×3-Dimensional Bell States , 2011 .

[10]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[11]  Ping Zhou,et al.  Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state , 2005, quant-ph/0511223.

[12]  Helen D. Karatza,et al.  Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values , 2011, J. Syst. Softw..

[13]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[14]  Dongyang Long,et al.  Quantum Secure Direct Communication with Two-Photon Four-Qubit Cluster States , 2012, International Journal of Theoretical Physics.

[15]  Xiang-Yang Li,et al.  Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption , 2015, IEEE Trans. Inf. Forensics Secur..

[16]  Kyo Inoue,et al.  Generation of 1.5-μm band time-bin entanglement using spontaneous fiber four-wave mixing and planar light-wave circuit interferometers , 2005 .

[17]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[18]  Yuh-Min Tseng,et al.  Efficient Revocable ID-Based Encryption with a Public Channel , 2012, Comput. J..

[19]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[20]  C. D. Jaidhar Enhanced mutual authentication scheme for cloud architecture , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[21]  Wei Jiang,et al.  High-Capacity Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom , 2012, International Journal of Theoretical Physics.

[22]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[23]  Shraddha M. Gurav,et al.  Graphical Password Authentication: Cloud Securing Scheme , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.

[24]  H. Takesue,et al.  Frequency and Polarization Characteristics of Correlated Photon-Pair Generation Using a Silicon Wire Waveguide , 2010, IEEE Journal of Selected Topics in Quantum Electronics.

[25]  Fuguo Deng,et al.  Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement , 2005, quant-ph/0501129.

[26]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[27]  H. Takesue,et al.  Entanglement generation using silicon wire waveguide , 2008, 2008 5th IEEE International Conference on Group IV Photonics.

[28]  T. Tsuchizawa,et al.  Low loss mode size converter from 0.3 /spl mu/m square Si wire waveguides to singlemode fibres , 2002 .

[29]  Hwayean Lee,et al.  Quantum direct communication with authentication , 2005, quant-ph/0512051.

[30]  Athanasios V. Vasilakos,et al.  A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing , 2012, IEEE Transactions on Network and Service Management.

[31]  Liu Dan,et al.  A New Quantum Secure Direct Communication Scheme with Authentication , 2010 .

[32]  Zhan-jun Zhang Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.

[33]  Matthew N. O. Sadiku,et al.  Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.

[34]  Genshe Chen,et al.  Information fusion in a cloud computing era: A systems-level perspective , 2014, IEEE Aerospace and Electronic Systems Magazine.

[35]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[36]  Hai Jin,et al.  A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.

[37]  Haider Abbas,et al.  Cloud Computing Risk Assessment: A Systematic Literature Review , 2014 .

[38]  Mosayeb Naseri AN EFFICIENT PROTOCOL FOR QUANTUM SECURE DIALOGUE WITH AUTHENTICATION BY USING SINGLE PHOTONS , 2011 .

[39]  Jörg Rothe,et al.  Some facets of complexity theory and cryptography: A five-lecture tutorial , 2001, CSUR.

[40]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[41]  Yuh-Min Tseng,et al.  Provably secure revocable ID-based signature in the standard model , 2013, Secur. Commun. Networks.

[42]  H. Takesue,et al.  Observation of 1.5 μm band entanglement using single photon detectors based on sinusoidally gated InGaAs/InP avalanche photodiodes , 2009 .

[43]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems a Cloud Based Health Insurance Plan Recommendation System: a User Centered Approach , 2022 .

[44]  John C. Henderson,et al.  Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing , 2010, MIS Q. Executive.

[45]  Jeffrey Soar,et al.  Challenges and Issues Within Cloud Computing Technology , 2014, CLOUD 2014.

[46]  Hyotaek Lim,et al.  A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.