Detailed Quantum Cryptographic Service and Data Security in Cloud Computing

This paper presents a holistic security solution for cloud computing environment by proposed a new secured cloud framework, which known as cryptographic cloud computing environment (CCCE) [14, 15]. CCCE entails both a trusted cloud-user and an innovative quantum cryptographic service (QCaaS). QCaaS is a new security service that responsible to solve the key generation, key distribution and key management problems, which emerged through the negotiation between the communications parties (cloud-user and cloud provider). Such service includes a proposed symmetric quantum encryption algorithm that is explained in previous work, usually called quantum advanced encryption standard (QAES). QAES build by the integration between a quantum key distribution (QKD) and an enhanced version of AES using two different modes, On-line and Off-line mode. Additionally, CCCE implemented using the system center manager 2012-SPI, which in turn, installed and configured based bare-metal Hyper-V, it poses more secured data transmission channels by provisioning secret key among cloud’s instances. Finally, CCCE reveals a higher secure data transmission comparing to other cloud security systems especially in key generation, key management, defeating almost type of attacks, and the impact rate of the proposed solution on the performance of cloud resources.

[1]  Xiaofeng Liao,et al.  A secure and efficient outsourceable group key transfer protocol in cloud computing , 2014, SCC '14.

[2]  Yi Mu,et al.  Privacy enhanced data outsourcing in the cloud , 2012, J. Netw. Comput. Appl..

[3]  Mark Manulis,et al.  Key management in distributed online social networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[4]  Chongcheng Chen,et al.  Parallel and Distributed Spatial Outlier Mining in Grid: Algorithm, Design and Application , 2015, Journal of Grid Computing.

[5]  Abdel-Badeeh M. Salem,et al.  A comparative study between modern encryption algorithms based on cloud computing environment , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[6]  Abdel-Badeeh M. Salem,et al.  Securing Cloud Computing Environment using a New Trend of Cryptography , 2015, 2015 International Conference on Cloud Computing (ICCC).

[7]  Ali Chehab,et al.  Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.

[8]  Abdullah Mohd Zin,et al.  Encryption as a Service (EaaS) as a Solution for Cryptography in Cloud , 2013 .

[9]  Stephen S. Yau,et al.  Confidentiality Protection in Cloud Computing Systems , 2010, Int. J. Softw. Informatics.

[10]  Jian Liu,et al.  Researches on Grid Security Authentication Algorithm in Cloud Computing , 2011, J. Networks.

[11]  Laurence T. Yang,et al.  Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[12]  Abdel-Badeeh M. Salem,et al.  Cryptographic Cloud Computing Environment as a More Trusted Communication Environment , 2014, Int. J. Grid High Perform. Comput..