An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment

Authors

  • V Sreenija Reddy Dept. of Computer Science & Engineering, S. V College of Engineering, Tirupati, India
  • Revathi A Dept. of Computer Science & Engineering, S. V College of Engineering, Tirupati, India
  • kumar PN Dept. of Computer Science & Engineering, S. V College of Engineering, Tirupati, India

DOI:

https://doi.org/10.26438/ijcse/v8i1.5356

Keywords:

Quantum Computing, Cryptography, cloud computing, Anonymity in cloud

Abstract

Cryptography is widely used technique to provide security in large networks like cloud environments. Classical cryptography and quantum cryptography are two widely used techniques. Classical cryptography uses simple mathematical methods to provide security. So it is more vulnerable to several attacks such as eaves dropping, man-in-the-middle attack etc. But in classical cryptography digital signatures are used to provide best authentication. Quantum cryptography uses quantum mechanical properties to provide security. It uses photons and polarization but it requires more communication rounds. So by combing classical and quantum cryptography to show a new combination. Here we can use implicit user authentication, explicit mutual authentication and we can digital signatures to provide best authentication. The main objectives of this article are design and develop an enhanced anonymity control scheme based on quantum cryptographic techniques. EANCTRL- an enhanced anonymity control scheme based on Quantum key distribution is presented in this article.

References

[1] P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu “Optimal Blowfish Algorithm based Technique for Data Security in Cloud” Int. J. Business Intelligence and Data Mining, ISSN online 1743-8195, ISSN print 1743-8187, Vol. 11, No. 2, Pp.171–189.DOI: 10.1504/IJBIDM.2016.10001484. (Inder Science) (UGC Approved). Journal No: 1648, 2016.

[2] P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu “Tripartite partite key assignment scheme for security of cloud data classes” Journal of Theoretical and Applied Information Technology, Vol.95. No 13, ISSN: 1992-8645, E-ISSN: 1817-3195, Pg.No:3116-3126. (Scopus& UGC), Journal No: 23566, 15th July 2017.

[3]Tzonelih Hwang, Kuo-Chang Lee, and Chuan-Ming Li, "Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols," IEEE Transactions on Dependable and Secure Computing,pp. 71-80, Vol. 4, No. 1, March 2007

[4] C.H.Bennett, "Quantum Cryptography Using any Two symmetrical States, "Physical Rev. Letters, vol.68,no. 3121, 1992.

[5] N.Asokhan, V.Niemi, and K. Nyberg, ""Man-in-the-Middle in Tunneled Authentication Protocals," Proc. Int`l Workshop Security Protocols, 2003.

[6] Aysajan Abidin, "Shortcomings of Authentication in Quantum Cryptography and Strongly Universal Hash Functions," Linköping considers in science and innovation, 2010

[7] Tasleem et al., "Cross breed Approach: Combining Classical Cryptography and QKD for Password Authentication," International Journal of Computer Science and Communication Networks, Vol. 2, No. 4, pp. 512-515

[8] Dr.G.Ananda Rao et al., "Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography," Indian Journal of Computer Science and Engineering, pp.143-145, Vol. 2, No. 2, May 2011

[9] T.S.Thangavel and A. Krishnan, "Coordinated Quantum and Classical Key Scheme for Two Servers Password Authentication," Journal of Computer Science, Vol. 6, No. 12, pp. 1396-1405, 2010

[10] M. Bellare and P. Rogaway, "Provably Secure Session Key Distribution: The Three Party Case," Proc. 27th ACM Symposium Theory of Computing, pp. 57-66, 1995.

[11] Mr. P. Dileep Kumar Reddy, “Handover Key Management for Re-Authentication in Cloud Technology for Accessing Data Classes”, International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor:6.887, Volume 5 Issue IX, (UGC Approved)Journal No: 45842, Pg no 1951 to 1953, Doi. 10.22214/IJRASET, September 2017.

Downloads

Published

2020-01-31
CITATION
DOI: 10.26438/ijcse/v8i1.5356
Published: 2020-01-31

How to Cite

[1]
V. S. Reddy, R. A, and P. N. kumar, “An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment”, Int. J. Comp. Sci. Eng., vol. 8, no. 1, pp. 53–56, Jan. 2020.

Issue

Section

Research Article