Cloud computing security threat with quantum key distribution defense model

Cloud computing offer the cost-effective and flexibility to the user. However, the security threat is a main concern for user to place their data in the cloud. Data that stored and shares through cloud have to be confidential and restricted. Information leakage, men in the middle attack are the two...

Full description

Bibliographic Details
Main Authors: Khalid, Roszelinda, Ahmad Zukarnain, Zuriati
Format: Conference or Workshop Item
Language:English
Published: Society of Digital Information and Wireless Communications (SDIWC) 2015
Online Access:http://psasir.upm.edu.my/id/eprint/59048/1/38-5.pdf
_version_ 1796977027106996224
author Khalid, Roszelinda
Ahmad Zukarnain, Zuriati
author_facet Khalid, Roszelinda
Ahmad Zukarnain, Zuriati
author_sort Khalid, Roszelinda
collection UPM
description Cloud computing offer the cost-effective and flexibility to the user. However, the security threat is a main concern for user to place their data in the cloud. Data that stored and shares through cloud have to be confidential and restricted. Information leakage, men in the middle attack are the two main issues that make information stored in the cloud insecure. Widely authentication method used is the classical approach like Public Key Infrastructure (PKI). This approach is workable in order to provide a secure environment within the cloud clients. The existing of Certificate Authority that act as controller they can verify the legal user. However, in certain circumstances, this approach cannot solve the issue such as stealing the identity. In this paper we are proposing a model that use quantum mechanical theory. This theory is supporting the no cloning theory. It used the power of light and a single photon to provide an authentication key. Throughout this paper, we also do a literature on various security threats, and authentication method in cloud. Then, we are introducing a quantum defense model as a solution of the listed threats. We proposed new cloud authentication architecture for cloud computing environment. A new cloud authentication environment that implements quantum mechanics is proven that can gain more trust with less time of computation in cloud communications.
first_indexed 2024-03-06T09:34:11Z
format Conference or Workshop Item
id upm.eprints-59048
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T09:34:11Z
publishDate 2015
publisher Society of Digital Information and Wireless Communications (SDIWC)
record_format dspace
spelling upm.eprints-590482018-02-21T06:30:53Z http://psasir.upm.edu.my/id/eprint/59048/ Cloud computing security threat with quantum key distribution defense model Khalid, Roszelinda Ahmad Zukarnain, Zuriati Cloud computing offer the cost-effective and flexibility to the user. However, the security threat is a main concern for user to place their data in the cloud. Data that stored and shares through cloud have to be confidential and restricted. Information leakage, men in the middle attack are the two main issues that make information stored in the cloud insecure. Widely authentication method used is the classical approach like Public Key Infrastructure (PKI). This approach is workable in order to provide a secure environment within the cloud clients. The existing of Certificate Authority that act as controller they can verify the legal user. However, in certain circumstances, this approach cannot solve the issue such as stealing the identity. In this paper we are proposing a model that use quantum mechanical theory. This theory is supporting the no cloning theory. It used the power of light and a single photon to provide an authentication key. Throughout this paper, we also do a literature on various security threats, and authentication method in cloud. Then, we are introducing a quantum defense model as a solution of the listed threats. We proposed new cloud authentication architecture for cloud computing environment. A new cloud authentication environment that implements quantum mechanics is proven that can gain more trust with less time of computation in cloud communications. Society of Digital Information and Wireless Communications (SDIWC) 2015 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/59048/1/38-5.pdf Khalid, Roszelinda and Ahmad Zukarnain, Zuriati (2015) Cloud computing security threat with quantum key distribution defense model. In: Third International Conference on Green Computing, Technology and Innovation (ICGCTI2015), 8-10 Dec. 2015, Universiti Putra Malaysia. (pp. 49-54).
spellingShingle Khalid, Roszelinda
Ahmad Zukarnain, Zuriati
Cloud computing security threat with quantum key distribution defense model
title Cloud computing security threat with quantum key distribution defense model
title_full Cloud computing security threat with quantum key distribution defense model
title_fullStr Cloud computing security threat with quantum key distribution defense model
title_full_unstemmed Cloud computing security threat with quantum key distribution defense model
title_short Cloud computing security threat with quantum key distribution defense model
title_sort cloud computing security threat with quantum key distribution defense model
url http://psasir.upm.edu.my/id/eprint/59048/1/38-5.pdf
work_keys_str_mv AT khalidroszelinda cloudcomputingsecuritythreatwithquantumkeydistributiondefensemodel
AT ahmadzukarnainzuriati cloudcomputingsecuritythreatwithquantumkeydistributiondefensemodel