An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment
DOI:
https://doi.org/10.26438/ijcse/v8i1.5356Keywords:
Quantum Computing, Cryptography, cloud computing, Anonymity in cloudAbstract
Cryptography is widely used technique to provide security in large networks like cloud environments. Classical cryptography and quantum cryptography are two widely used techniques. Classical cryptography uses simple mathematical methods to provide security. So it is more vulnerable to several attacks such as eaves dropping, man-in-the-middle attack etc. But in classical cryptography digital signatures are used to provide best authentication. Quantum cryptography uses quantum mechanical properties to provide security. It uses photons and polarization but it requires more communication rounds. So by combing classical and quantum cryptography to show a new combination. Here we can use implicit user authentication, explicit mutual authentication and we can digital signatures to provide best authentication. The main objectives of this article are design and develop an enhanced anonymity control scheme based on quantum cryptographic techniques. EANCTRL- an enhanced anonymity control scheme based on Quantum key distribution is presented in this article.
References
[1] P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu “Optimal Blowfish Algorithm based Technique for Data Security in Cloud” Int. J. Business Intelligence and Data Mining, ISSN online 1743-8195, ISSN print 1743-8187, Vol. 11, No. 2, Pp.171–189.DOI: 10.1504/IJBIDM.2016.10001484. (Inder Science) (UGC Approved). Journal No: 1648, 2016.
[2] P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu “Tripartite partite key assignment scheme for security of cloud data classes” Journal of Theoretical and Applied Information Technology, Vol.95. No 13, ISSN: 1992-8645, E-ISSN: 1817-3195, Pg.No:3116-3126. (Scopus& UGC), Journal No: 23566, 15th July 2017.
[3]Tzonelih Hwang, Kuo-Chang Lee, and Chuan-Ming Li, "Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols," IEEE Transactions on Dependable and Secure Computing,pp. 71-80, Vol. 4, No. 1, March 2007
[4] C.H.Bennett, "Quantum Cryptography Using any Two symmetrical States, "Physical Rev. Letters, vol.68,no. 3121, 1992.
[5] N.Asokhan, V.Niemi, and K. Nyberg, ""Man-in-the-Middle in Tunneled Authentication Protocals," Proc. Int`l Workshop Security Protocols, 2003.
[6] Aysajan Abidin, "Shortcomings of Authentication in Quantum Cryptography and Strongly Universal Hash Functions," Linköping considers in science and innovation, 2010
[7] Tasleem et al., "Cross breed Approach: Combining Classical Cryptography and QKD for Password Authentication," International Journal of Computer Science and Communication Networks, Vol. 2, No. 4, pp. 512-515
[8] Dr.G.Ananda Rao et al., "Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography," Indian Journal of Computer Science and Engineering, pp.143-145, Vol. 2, No. 2, May 2011
[9] T.S.Thangavel and A. Krishnan, "Coordinated Quantum and Classical Key Scheme for Two Servers Password Authentication," Journal of Computer Science, Vol. 6, No. 12, pp. 1396-1405, 2010
[10] M. Bellare and P. Rogaway, "Provably Secure Session Key Distribution: The Three Party Case," Proc. 27th ACM Symposium Theory of Computing, pp. 57-66, 1995.
[11] Mr. P. Dileep Kumar Reddy, “Handover Key Management for Re-Authentication in Cloud Technology for Accessing Data Classes”, International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor:6.887, Volume 5 Issue IX, (UGC Approved)Journal No: 45842, Pg no 1951 to 1953, Doi. 10.22214/IJRASET, September 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
