Development of Cloud Computing Security Algorithms using Quantum Cryptography Criteria
Omer Abd-Al Kareem Jasim Mohammad;
Abstract
Cloud computing is an emerging trend of distributed computing technology that is very
useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, cloud users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protects data and applications in the clouds from hackers and intruders. Consequently, a set of critical security issues, such as privacy, confidentiality, integrity, availability, traceability, and reliability must be provided. Therefore, the improvement of cloud computing technology is reinforced by the improvement of the various modern encryption algorithms and key management mechanism. This dissertation presented the CCCE, which entails both QAES and QCaaS aiming to provide more flexibility and secure communication environment, improve the performance of the encryption/decryption process, support more secure data transmission process using less computational time, and solve the problem of key management.
8.1.2 Cloud Computing Cryptographic Algorithm Since the currently Quantum Cloud environment depends on the QAES algorithm and the cryptographic service, it protects users’ data from hacking as much as possible. QAES algorithm is constructed by the combination between the enhanced version of AES and the QKD system. The selection of AES algorithm, and developed it, comes after performing a comparative analysis between two categories (symmetric and asymmetric) of algorithms using various input file sizes, as shown in Chapter 3. This analysis performed on experimental cloud environment. Accordingly, we conducted that the AES encryption algorithm enjoys certain SUMMARY, CONCLUSIONS, AND FUTURE WORKS
Chapter 8
CHAPTER 8
Summary, CONCLUSIONs, AND FUTURE WORKS
118
advantages when compared to the others, especially with respect to the speedup of the
encryption process. Moreover, the AES algorithm has proven effective ability against the
hacking attack. However, it suffers from the key distribution problem and vulnerable to
quantum attack intrusion. Accordingly, In Chapter 5, a new symmetric quantum encryption
algorithm has been introduced, implemented and discussed. The study shows that the QAES
development and design do not contradict the security of the AES algorithm, since all the
mathematical criteria remain unchanged. The experimental results and the analysis show that
the QAES produces more complicated un-breakable keys, hard to be predicted by attackers
than the keys generated by the AES. Moreover, the speed of encryption of the QAES is tiny
higher (0.11 milliseconds) than using the AES without computation time of key generated.
The strength of the QAES lies in its ability of generating a high ratio of independence between
DQS-Boxes. This ratio aids in achieving a more secured environment against most types of
cryptanalysis attacks. This proposed algorithm prepared as an installer package that is
installed and configured on the innovative cryptographic service (QCaaS).
8.1.3 Key Management in Quantum Cloud Environment
Data encryption before flying to the cloud is a common and simple way to protect data
privacy. Although the encryption algorithms are public, information encrypted under these
algorithms is secure because the key used to encrypt the data remains secret. As a result, key
management is a critical element in cloud computing. The key management concept in cloud
environment means the ability of correctly assign, secure, monitor, and distributed key among
useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, cloud users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protects data and applications in the clouds from hackers and intruders. Consequently, a set of critical security issues, such as privacy, confidentiality, integrity, availability, traceability, and reliability must be provided. Therefore, the improvement of cloud computing technology is reinforced by the improvement of the various modern encryption algorithms and key management mechanism. This dissertation presented the CCCE, which entails both QAES and QCaaS aiming to provide more flexibility and secure communication environment, improve the performance of the encryption/decryption process, support more secure data transmission process using less computational time, and solve the problem of key management.
8.1.2 Cloud Computing Cryptographic Algorithm Since the currently Quantum Cloud environment depends on the QAES algorithm and the cryptographic service, it protects users’ data from hacking as much as possible. QAES algorithm is constructed by the combination between the enhanced version of AES and the QKD system. The selection of AES algorithm, and developed it, comes after performing a comparative analysis between two categories (symmetric and asymmetric) of algorithms using various input file sizes, as shown in Chapter 3. This analysis performed on experimental cloud environment. Accordingly, we conducted that the AES encryption algorithm enjoys certain SUMMARY, CONCLUSIONS, AND FUTURE WORKS
Chapter 8
CHAPTER 8
Summary, CONCLUSIONs, AND FUTURE WORKS
118
advantages when compared to the others, especially with respect to the speedup of the
encryption process. Moreover, the AES algorithm has proven effective ability against the
hacking attack. However, it suffers from the key distribution problem and vulnerable to
quantum attack intrusion. Accordingly, In Chapter 5, a new symmetric quantum encryption
algorithm has been introduced, implemented and discussed. The study shows that the QAES
development and design do not contradict the security of the AES algorithm, since all the
mathematical criteria remain unchanged. The experimental results and the analysis show that
the QAES produces more complicated un-breakable keys, hard to be predicted by attackers
than the keys generated by the AES. Moreover, the speed of encryption of the QAES is tiny
higher (0.11 milliseconds) than using the AES without computation time of key generated.
The strength of the QAES lies in its ability of generating a high ratio of independence between
DQS-Boxes. This ratio aids in achieving a more secured environment against most types of
cryptanalysis attacks. This proposed algorithm prepared as an installer package that is
installed and configured on the innovative cryptographic service (QCaaS).
8.1.3 Key Management in Quantum Cloud Environment
Data encryption before flying to the cloud is a common and simple way to protect data
privacy. Although the encryption algorithms are public, information encrypted under these
algorithms is secure because the key used to encrypt the data remains secret. As a result, key
management is a critical element in cloud computing. The key management concept in cloud
environment means the ability of correctly assign, secure, monitor, and distributed key among
Other data
| Title | Development of Cloud Computing Security Algorithms using Quantum Cryptography Criteria | Other Titles | تطوير خوارزميات اْمن الحوسبة السحابيةاعتمادا على معايير التشفير الكمي | Authors | Omer Abd-Al Kareem Jasim Mohammad | Issue Date | 2016 |
Attached Files
| File | Size | Format | |
|---|---|---|---|
| G11612.pdf | 1.07 MB | Adobe PDF | View/Open |
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.