Identity based secure authentication scheme based on quantum key distribution for cloud computing

被引:21
|
作者
Sharma, Geeta [1 ]
Kalra, Sheetal [1 ]
机构
[1] Guru Nanak Dev Univ, Reg Campus, Jalandhar, Punjab, India
关键词
Authentication; Cloud computing; EPR pair; Quantum authentication; Quantum key distribution; ID-BASED ENCRYPTION; DIRECT COMMUNICATION;
D O I
10.1007/s12083-016-0528-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of utmost significance as the number of hackers who seek to intrigue into legitimate user's account to obtain sensitive information is increasing. Identity based authentication operates to corroborate the identity of the user so that only the legitimate user gets access to the service. This paper proposes a quantum identity based authentication and key agreement scheme for cloud server architecture. Quantum cryptography based on the laws of quantum physics is a vital technology for securing privacy and confidentiality in the field of network security. A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme. The security analysis of the proposed protocol proves that it is robust against all security attacks. To confirm applicability of quantum key distribution in cloud computing, a practical long-distance entanglement-based QKD experiment has been proposed. This experiment confirms successful generation of shifted keys over distance of 100 km of optical fiber with a key rate of 4.11 bit/s and an error rate of 9.21 %.
引用
收藏
页码:220 / 234
页数:15
相关论文
共 50 条
  • [31] A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Lai, Chin-Feng
    Ren, Yongjun
    Sun, Xingming
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 833 - 842
  • [32] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [33] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [34] Secure Authentication and Group Key Distribution Scheme for WBANs Based on Smartphone ECG Sensor
    Tan, Haowen
    Chung, Ilyong
    [J]. IEEE ACCESS, 2019, 7 : 151459 - 151474
  • [35] A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
    Zhu, Wenlong
    Chen, Xuexiao
    Jiang, Linmei
    [J]. Alexandria Engineering Journal, 2024, 101 : 52 - 61
  • [36] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [37] Image based Authentication with Secure Key Exchange Mechanism in Cloud
    Tomar, Anurag Singh
    Tak, Gaurav Kumar
    Chaudhary, Ruchi
    [J]. 2014 INTERNATIONAL CONFERENCE ON MEDICAL IMAGING, M-HEALTH & EMERGING COMMUNICATION SYSTEMS (MEDCOM), 2015, : 428 - 431
  • [38] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    [J]. The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [39] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1693 - 1713
  • [40] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,