Cloud Data Security through BB84 Protocol and Genetic Algorithm

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authen...

Full description

Bibliographic Details
Main Authors: Jaydip Kumar, Vipin Saxena
Format: Article
Language:Arabic
Published: College of Science for Women, University of Baghdad 2022-12-01
Series:Baghdad Science Journal
Subjects:
Online Access:https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7281
_version_ 1811184839309656064
author Jaydip Kumar
Vipin Saxena
author_facet Jaydip Kumar
Vipin Saxena
author_sort Jaydip Kumar
collection DOAJ
description In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
first_indexed 2024-04-11T13:20:17Z
format Article
id doaj.art-85ef903833564badb20b7446e8664cbb
institution Directory Open Access Journal
issn 2078-8665
2411-7986
language Arabic
last_indexed 2024-04-11T13:20:17Z
publishDate 2022-12-01
publisher College of Science for Women, University of Baghdad
record_format Article
series Baghdad Science Journal
spelling doaj.art-85ef903833564badb20b7446e8664cbb2022-12-22T04:22:15ZaraCollege of Science for Women, University of BaghdadBaghdad Science Journal2078-86652411-79862022-12-01196(Suppl.)10.21123/bsj.2022.7281Cloud Data Security through BB84 Protocol and Genetic AlgorithmJaydip Kumar0Vipin Saxena1Department of Computer Science, BabasahebBhimraoAmbedkar University, Lucknow, India.Department of Computer Science, BabasahebBhimraoAmbedkar University, Lucknow, India. In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs. https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7281Attribute based Encryption, BB84 Protocol Cloud, Data Security, Geneticncryption/Decryption, Quantum Key Distribution
spellingShingle Jaydip Kumar
Vipin Saxena
Cloud Data Security through BB84 Protocol and Genetic Algorithm
Baghdad Science Journal
Attribute based Encryption, BB84 Protocol Cloud, Data Security, Geneticncryption/Decryption, Quantum Key Distribution
title Cloud Data Security through BB84 Protocol and Genetic Algorithm
title_full Cloud Data Security through BB84 Protocol and Genetic Algorithm
title_fullStr Cloud Data Security through BB84 Protocol and Genetic Algorithm
title_full_unstemmed Cloud Data Security through BB84 Protocol and Genetic Algorithm
title_short Cloud Data Security through BB84 Protocol and Genetic Algorithm
title_sort cloud data security through bb84 protocol and genetic algorithm
topic Attribute based Encryption, BB84 Protocol Cloud, Data Security, Geneticncryption/Decryption, Quantum Key Distribution
url https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7281
work_keys_str_mv AT jaydipkumar clouddatasecuritythroughbb84protocolandgeneticalgorithm
AT vipinsaxena clouddatasecuritythroughbb84protocolandgeneticalgorithm