Open Access   Article Go Back

An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment

V. Sreenija Reddy1 , Revathi A.2 , Phani Kumar N.3

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-1 , Page no. 53-56, Jan-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i1.5356

Online published on Jan 31, 2020

Copyright © V. Sreenija Reddy, Revathi A., Phani Kumar N. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. Sreenija Reddy, Revathi A., Phani Kumar N., “An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.53-56, 2020.

MLA Style Citation: V. Sreenija Reddy, Revathi A., Phani Kumar N. "An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment." International Journal of Computer Sciences and Engineering 8.1 (2020): 53-56.

APA Style Citation: V. Sreenija Reddy, Revathi A., Phani Kumar N., (2020). An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment. International Journal of Computer Sciences and Engineering, 8(1), 53-56.

BibTex Style Citation:
@article{Reddy_2020,
author = {V. Sreenija Reddy, Revathi A., Phani Kumar N.},
title = {An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2020},
volume = {8},
Issue = {1},
month = {1},
year = {2020},
issn = {2347-2693},
pages = {53-56},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4995},
doi = {https://doi.org/10.26438/ijcse/v8i1.5356}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i1.5356}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4995
TI - An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - V. Sreenija Reddy, Revathi A., Phani Kumar N.
PY - 2020
DA - 2020/01/31
PB - IJCSE, Indore, INDIA
SP - 53-56
IS - 1
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
474 419 downloads 168 downloads
  
  
           

Abstract

Cryptography is widely used technique to provide security in large networks like cloud environments. Classical cryptography and quantum cryptography are two widely used techniques. Classical cryptography uses simple mathematical methods to provide security. So it is more vulnerable to several attacks such as eaves dropping, man-in-the-middle attack etc. But in classical cryptography digital signatures are used to provide best authentication. Quantum cryptography uses quantum mechanical properties to provide security. It uses photons and polarization but it requires more communication rounds. So by combing classical and quantum cryptography to show a new combination. Here we can use implicit user authentication, explicit mutual authentication and we can digital signatures to provide best authentication. The main objectives of this article are design and develop an enhanced anonymity control scheme based on quantum cryptographic techniques. EANCTRL- an enhanced anonymity control scheme based on Quantum key distribution is presented in this article.

Key-Words / Index Term

Quantum Computing, Cryptography, cloud computing, Anonymity in cloud

References

[1] P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu “Optimal Blowfish Algorithm based Technique for Data Security in Cloud” Int. J. Business Intelligence and Data Mining, ISSN online 1743-8195, ISSN print 1743-8187, Vol. 11, No. 2, Pp.171–189.DOI: 10.1504/IJBIDM.2016.10001484. (Inder Science) (UGC Approved). Journal No: 1648, 2016.
[2] P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu “Tripartite partite key assignment scheme for security of cloud data classes” Journal of Theoretical and Applied Information Technology, Vol.95. No 13, ISSN: 1992-8645, E-ISSN: 1817-3195, Pg.No:3116-3126. (Scopus& UGC), Journal No: 23566, 15th July 2017.
[3]Tzonelih Hwang, Kuo-Chang Lee, and Chuan-Ming Li, "Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols," IEEE Transactions on Dependable and Secure Computing,pp. 71-80, Vol. 4, No. 1, March 2007
[4] C.H.Bennett, "Quantum Cryptography Using any Two symmetrical States, "Physical Rev. Letters, vol.68,no. 3121, 1992.
[5] N.Asokhan, V.Niemi, and K. Nyberg, ""Man-in-the-Middle in Tunneled Authentication Protocals," Proc. Int`l Workshop Security Protocols, 2003.
[6] Aysajan Abidin, "Shortcomings of Authentication in Quantum Cryptography and Strongly Universal Hash Functions," Linköping considers in science and innovation, 2010
[7] Tasleem et al., "Cross breed Approach: Combining Classical Cryptography and QKD for Password Authentication," International Journal of Computer Science and Communication Networks, Vol. 2, No. 4, pp. 512-515
[8] Dr.G.Ananda Rao et al., "Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography," Indian Journal of Computer Science and Engineering, pp.143-145, Vol. 2, No. 2, May 2011
[9] T.S.Thangavel and A. Krishnan, "Coordinated Quantum and Classical Key Scheme for Two Servers Password Authentication," Journal of Computer Science, Vol. 6, No. 12, pp. 1396-1405, 2010
[10] M. Bellare and P. Rogaway, "Provably Secure Session Key Distribution: The Three Party Case," Proc. 27th ACM Symposium Theory of Computing, pp. 57-66, 1995.
[11] Mr. P. Dileep Kumar Reddy, “Handover Key Management for Re-Authentication in Cloud Technology for Accessing Data Classes”, International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor:6.887, Volume 5 Issue IX, (UGC Approved)Journal No: 45842, Pg no 1951 to 1953, Doi. 10.22214/IJRASET, September 2017.