Effective Quantum Key Distribution Using Modified Key Sifting Scheme for Cloud Storage Security

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Cloud storage has gained extensive attention due to its low cost, global scalability, and improved agility. Data privacy is an important issue in cloud storage because breaches of personal information or business secrets are occurred by malicious hackers or unauthorized cloud operators. To address this issue, a Modified Key Sifting Scheme (MKSS) is proposed for developing an effective Quantum Key Distribution (QKD) with Two-Way Identity Authentication (TWIA) to provide security in the cloud storage. The Tree Parity Machine (TPM) is used for proposing a MKSS which used to minimize the key distribution time based on the synchronization. This MKSS-QKDTWIA considers four different objects such as data user, data owner, server and data storage in a communication scenario. The performance of the MKSS-QKDTWIA is analyzed by means of key computation time, processing time, encryption & decryption time, and memory utilization. Existing research such as Modified Random Fibonacci Cryptographic (MRFC), Software Stack-QKD (SS-QKD) and Enhanced Cloud Security Model based on QKD Protocol (ECSMQKDP) are used to evaluate the performance of MKSS-QKDTWIA. The key computation time of MKSS-QKDTWIA for 50 attribute sets in each key is 16.7s which is less when compared to the MRFC, SS-QKD and ECSM-QKDP

Cite

CITATION STYLE

APA

Hole, V. P., Mulla, N., & Hole, P. B. (2023). Effective Quantum Key Distribution Using Modified Key Sifting Scheme for Cloud Storage Security. International Journal of Intelligent Engineering and Systems, 16(2), 536–545. https://doi.org/10.22266/ijies2023.0430.44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free