Cloud computing security threat with quantum key distribution defense model
Cloud computing offer the cost-effective and flexibility to the user. However, the security threat is a main concern for user to place their data in the cloud. Data that stored and shares through cloud have to be confidential and restricted. Information leakage, men in the middle attack are the two...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Society of Digital Information and Wireless Communications (SDIWC)
2015
|
Online Access: | http://psasir.upm.edu.my/id/eprint/59048/1/38-5.pdf |
_version_ | 1796977027106996224 |
---|---|
author | Khalid, Roszelinda Ahmad Zukarnain, Zuriati |
author_facet | Khalid, Roszelinda Ahmad Zukarnain, Zuriati |
author_sort | Khalid, Roszelinda |
collection | UPM |
description | Cloud computing offer the cost-effective and flexibility to the user. However, the security threat is a main concern for user to place their data in the cloud. Data that stored and shares through cloud have to be confidential and restricted. Information leakage, men in the middle attack are the two main issues that make information stored in the cloud insecure. Widely authentication method used is the classical approach like Public Key Infrastructure (PKI). This approach is workable in order to provide a secure environment within the cloud clients. The existing of Certificate Authority that act as controller they can verify the legal user. However, in certain circumstances, this approach cannot solve the issue such as stealing the identity. In this paper we are proposing a model that use quantum mechanical theory. This theory is supporting the no cloning theory. It used the power of light and a single photon to provide an authentication key. Throughout this paper, we also do a literature on various security threats, and authentication method in cloud. Then, we are introducing a quantum defense model as a solution of the listed threats. We proposed new cloud authentication architecture for cloud computing environment. A new cloud authentication environment that implements quantum mechanics is proven that can gain more trust with less time of computation in cloud communications. |
first_indexed | 2024-03-06T09:34:11Z |
format | Conference or Workshop Item |
id | upm.eprints-59048 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-03-06T09:34:11Z |
publishDate | 2015 |
publisher | Society of Digital Information and Wireless Communications (SDIWC) |
record_format | dspace |
spelling | upm.eprints-590482018-02-21T06:30:53Z http://psasir.upm.edu.my/id/eprint/59048/ Cloud computing security threat with quantum key distribution defense model Khalid, Roszelinda Ahmad Zukarnain, Zuriati Cloud computing offer the cost-effective and flexibility to the user. However, the security threat is a main concern for user to place their data in the cloud. Data that stored and shares through cloud have to be confidential and restricted. Information leakage, men in the middle attack are the two main issues that make information stored in the cloud insecure. Widely authentication method used is the classical approach like Public Key Infrastructure (PKI). This approach is workable in order to provide a secure environment within the cloud clients. The existing of Certificate Authority that act as controller they can verify the legal user. However, in certain circumstances, this approach cannot solve the issue such as stealing the identity. In this paper we are proposing a model that use quantum mechanical theory. This theory is supporting the no cloning theory. It used the power of light and a single photon to provide an authentication key. Throughout this paper, we also do a literature on various security threats, and authentication method in cloud. Then, we are introducing a quantum defense model as a solution of the listed threats. We proposed new cloud authentication architecture for cloud computing environment. A new cloud authentication environment that implements quantum mechanics is proven that can gain more trust with less time of computation in cloud communications. Society of Digital Information and Wireless Communications (SDIWC) 2015 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/59048/1/38-5.pdf Khalid, Roszelinda and Ahmad Zukarnain, Zuriati (2015) Cloud computing security threat with quantum key distribution defense model. In: Third International Conference on Green Computing, Technology and Innovation (ICGCTI2015), 8-10 Dec. 2015, Universiti Putra Malaysia. (pp. 49-54). |
spellingShingle | Khalid, Roszelinda Ahmad Zukarnain, Zuriati Cloud computing security threat with quantum key distribution defense model |
title | Cloud computing security threat with quantum key distribution defense model |
title_full | Cloud computing security threat with quantum key distribution defense model |
title_fullStr | Cloud computing security threat with quantum key distribution defense model |
title_full_unstemmed | Cloud computing security threat with quantum key distribution defense model |
title_short | Cloud computing security threat with quantum key distribution defense model |
title_sort | cloud computing security threat with quantum key distribution defense model |
url | http://psasir.upm.edu.my/id/eprint/59048/1/38-5.pdf |
work_keys_str_mv | AT khalidroszelinda cloudcomputingsecuritythreatwithquantumkeydistributiondefensemodel AT ahmadzukarnainzuriati cloudcomputingsecuritythreatwithquantumkeydistributiondefensemodel |