Skip to main content
Top

2016 | OriginalPaper | Chapter

8. Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service

Authors : Omer K. Jasim Mohammad, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem

Published in: New Approaches in Intelligent Control

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing environment is a new approach to the intelligent control of network communication and knowledge-based systems. It drastically guarantees scalability, on-demand, and pay-as-you-go services through virtualization environments. In a cloud environment, resources are provided as services to clients over the internet in the public cloud and over the intranet in the private cloud upon request. Resources’ coordination in the cloud enables clients to reach their resources anywhere and anytime. Guaranteeing the security in cloud environment plays an important role, as clients often store important files on remote trust cloud data center. However, clients are wondering about the integrity and the availability of their data in the cloud environment. So, many security issues, which pertinent to client data garbling and communication intrusion caused by attackers, are attitudinized in the host, network and data levels. In order to address these issues, this chapter introduces a new intelligent quantum cloud environment (IQCE), that entails both Intelligent Quantum Cryptography-as-a-Service (IQCaaS) and Quantum Advanced Encryption Standard (QAES). This intelligent environment poses more secured data transmission by provisioning secret key among cloud’s instances and machines. It is implemented using System Center Manager (SCM) 2012-R2, which in turn, installed and configured based on bare-metal Hyper-V hypervisor. In addition, IQCaaS solves the key generation, the key distribution and the key management problems that emerged through the online negotiation between the communication parties in the cloud environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Nelson, G., Charles, M., Fernando, R., Marco, S., Teresa, C., Mats, N., Makan, P.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud. Comput. Adv. Syst. Appl. 1(11), 34–51 (2014) Nelson, G., Charles, M., Fernando, R., Marco, S., Teresa, C., Mats, N., Makan, P.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud. Comput. Adv. Syst. Appl. 1(11), 34–51 (2014)
2.
go back to reference Sunita, M., Seema, S.: Distributed Computing, 2nd edn. Oxford University Press, New York (2013) Sunita, M., Seema, S.: Distributed Computing, 2nd edn. Oxford University Press, New York (2013)
3.
go back to reference Chander, K., Yogesh, S.: Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 67–78 (2013) Chander, K., Yogesh, S.: Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 67–78 (2013)
4.
go back to reference Mohammad, A., John, B., Ingo, T.: An analysis of the cloud computing security problem. In: APSE 2010 Proceeding—Cloud Workshop, Sydney, Australia, pp. 56–64 (2010) Mohammad, A., John, B., Ingo, T.: An analysis of the cloud computing security problem. In: APSE 2010 Proceeding—Cloud Workshop, Sydney, Australia, pp. 56–64 (2010)
5.
go back to reference Faiza, F.: Management of symmetric cryptographic keys in a cloud-based environment. In: A 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 90–98 (2012) Faiza, F.: Management of symmetric cryptographic keys in a cloud-based environment. In: A 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 90–98 (2012)
6.
go back to reference Mather, T., Kumaraswamy, S.: Cloud Security, and Privacy; An Enterprise Perspective on Risks and Compliance, 1st edn. O’Reilly Media, Sebastopol (2013) Mather, T., Kumaraswamy, S.: Cloud Security, and Privacy; An Enterprise Perspective on Risks and Compliance, 1st edn. O’Reilly Media, Sebastopol (2013)
7.
go back to reference CSA: Security a-a-services guidance for critical areas in cloud computing. Category 8, 1–21 (2012) CSA: Security a-a-services guidance for critical areas in cloud computing. Category 8, 1–21 (2012)
8.
go back to reference Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Cryptographic cloud computing environment as a more trusted communication environment. Int. J. Grid. High. Perform. Comput. (IJGHPC) 6(2), 45–60 (2014) Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Cryptographic cloud computing environment as a more trusted communication environment. Int. J. Grid. High. Perform. Comput. (IJGHPC) 6(2), 45–60 (2014)
9.
go back to reference Sekar, A., Radhika, S., Anand, K.: Secure communication using 512 bit key. Eur. J. Sci. Res. 52(1), 61–65, 90–104 (2012) Sekar, A., Radhika, S., Anand, K.: Secure communication using 512 bit key. Eur. J. Sci. Res. 52(1), 61–65, 90–104 (2012)
10.
go back to reference Doelitzscher, F., Reich, C., Kahl, M., Clarke, N.: An autonomous agent-based incident detection system for cloud computing. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS. pp. 197–204 (2011) Doelitzscher, F., Reich, C., Kahl, M., Clarke, N.: An autonomous agent-based incident detection system for cloud computing. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS. pp. 197–204 (2011)
11.
go back to reference Lejiang, G., XiangPing, C., Chao, G., Wang, D.P.: The intelligence security control platform based on cloud and trusted computing technology. In: International Conference on Electrical and Computer Engineering, Advances in Biomedical Engineering, vol. 11, pp. 221–229 (2012) Lejiang, G., XiangPing, C., Chao, G., Wang, D.P.: The intelligence security control platform based on cloud and trusted computing technology. In: International Conference on Electrical and Computer Engineering, Advances in Biomedical Engineering, vol. 11, pp. 221–229 (2012)
12.
go back to reference Wang, Q., Cong, X., Min, S.: Protecting privacy by multi-dimensional K-anonymity. J. Softw. 7(8), 87–90 (2012) Wang, Q., Cong, X., Min, S.: Protecting privacy by multi-dimensional K-anonymity. J. Softw. 7(8), 87–90 (2012)
13.
go back to reference Hossein, R., Elankovan, S., Zulkarnain, A., Abdullah, M.: Encryption as a service (EaaS) as a solution for cryptography in cloud. In: 4th International Conference on Electrical Engineering and Informatics, ICEEI’13, vol. 11, pp. 1202–1210 (2013) Hossein, R., Elankovan, S., Zulkarnain, A., Abdullah, M.: Encryption as a service (EaaS) as a solution for cryptography in cloud. In: 4th International Conference on Electrical Engineering and Informatics, ICEEI’13, vol. 11, pp. 1202–1210 (2013)
14.
go back to reference Esh, N., Mohit, P., Aman, B., Prem, H.: To enhance the data security of cloud in cloud computing using RSA algorithm. Int. J. Softw. Eng. 1(1), 56–64 (2012) Esh, N., Mohit, P., Aman, B., Prem, H.: To enhance the data security of cloud in cloud computing using RSA algorithm. Int. J. Softw. Eng. 1(1), 56–64 (2012)
15.
go back to reference Soren, B., Sven, B., Hugo, I.: Client–controlled cryptography-as-a-service in the cloud. In: Proceedings of 11th International Conference, ACNS 2013, vol. 7954, pp. 74–82. Springer (2013) Soren, B., Sven, B., Hugo, I.: Client–controlled cryptography-as-a-service in the cloud. In: Proceedings of 11th International Conference, ACNS 2013, vol. 7954, pp. 74–82. Springer (2013)
16.
go back to reference Mandeep, K., Manish, G.: Implementing various encryption algorithms to enhance the data security of cloud in cloud computing. Int. J. Comput. Sci. Inf. Technol. 2(10), 156–204 (2012) Mandeep, K., Manish, G.: Implementing various encryption algorithms to enhance the data security of cloud in cloud computing. Int. J. Comput. Sci. Inf. Technol. 2(10), 156–204 (2012)
17.
go back to reference Dabrowski, C., Mills, K.: VM leakage and orphan control in open source cloud. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS, pp. 554–559 (2011) Dabrowski, C., Mills, K.: VM leakage and orphan control in open source cloud. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS, pp. 554–559 (2011)
18.
go back to reference Emmanuel, S., Navdeep, A., Prashant, T., Bhanu, P.: Cloud computing: data storage security analysis and its challenges. Int. J. Comput. Appl. 70(24), 98–105 (2013). ISSN 0975-8887 Emmanuel, S., Navdeep, A., Prashant, T., Bhanu, P.: Cloud computing: data storage security analysis and its challenges. Int. J. Comput. Appl. 70(24), 98–105 (2013). ISSN 0975-8887
19.
go back to reference William, S.: Cryptography and Network Security, a Library of Congress Cataloging, 5th edn. Prentice Hall (2012). ISBN 13; 978-0-13609704-4 William, S.: Cryptography and Network Security, a Library of Congress Cataloging, 5th edn. Prentice Hall (2012). ISBN 13; 978-0-13609704-4
20.
go back to reference Winkler, J.: Securing the Cloud: Cloud Computer Security Techniques and Tactics, a Library of Congress Cataloging. Elsevier (2011). ISBN 13; 978-1-59749-592-9 Winkler, J.: Securing the Cloud: Cloud Computer Security Techniques and Tactics, a Library of Congress Cataloging. Elsevier (2011). ISBN 13; 978-1-59749-592-9
21.
go back to reference Padmapriya, A., Subhas, P.: Cloud computing: security challenges and encryption practices. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 23–31 (2013) Padmapriya, A., Subhas, P.: Cloud computing: security challenges and encryption practices. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 23–31 (2013)
22.
go back to reference Manpreet, R., Rajbir, V.: Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int. J. Comput. Appl. 70(18) (2013) Manpreet, R., Rajbir, V.: Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int. J. Comput. Appl. 70(18) (2013)
23.
go back to reference Jensen, M., Schwenk, J., Hauschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE ICCC, Bangalore, pp. 109–116 (2009) Jensen, M., Schwenk, J., Hauschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE ICCC, Bangalore, pp. 109–116 (2009)
24.
go back to reference Gawain, B., Waugh, R., Patil, S.: Enhancement of data security in cloud computing environment. Int. J. Internet Comput. 1(3), 123–132 (2012) Gawain, B., Waugh, R., Patil, S.: Enhancement of data security in cloud computing environment. Int. J. Internet Comput. 1(3), 123–132 (2012)
25.
go back to reference Farhad, A., Seyed, S., Athula, G.: Cloud computing: security and reliability issues. Commun. IBIMA 1(655710) (2013) Farhad, A., Seyed, S., Athula, G.: Cloud computing: security and reliability issues. Commun. IBIMA 1(655710) (2013)
26.
go back to reference Eman, M., Hatem, S., Sherif, E.: Enhanced data security model for cloud computing. In: 8th International Conference on Informatics and Systems (INFO2012), Egypt, pp. 12–17 (2012) Eman, M., Hatem, S., Sherif, E.: Enhanced data security model for cloud computing. In: 8th International Conference on Informatics and Systems (INFO2012), Egypt, pp. 12–17 (2012)
27.
go back to reference Sanjo, S., Jasmeet, S.: Implementing cloud data security by encryption using Rijndael. Global J. Comput. Sci. Technol. Cloud Distrib. 13(4), 56–64 (2013) Sanjo, S., Jasmeet, S.: Implementing cloud data security by encryption using Rijndael. Global J. Comput. Sci. Technol. Cloud Distrib. 13(4), 56–64 (2013)
28.
go back to reference Syam, P., Subramanian, R., Thamizh, D.: Ensuring data security in cloud computing using sobol sequence. In: Proceeding of 1st International Conference on Parallel, Distributed and Grid Computing (PDGC) (2010). IEEE 978-1-4244-7674-9/10 Syam, P., Subramanian, R., Thamizh, D.: Ensuring data security in cloud computing using sobol sequence. In: Proceeding of 1st International Conference on Parallel, Distributed and Grid Computing (PDGC) (2010). IEEE 978-1-4244-7674-9/10
29.
go back to reference Wesam, D., Ibrahim, T., Christoph, M.: Infrastructure as a service security: challenges and solution. In: The Proceeding of 7th International Conference on Informatics and Systems (INFOS), Egypt, pp. 89–95 (2010) Wesam, D., Ibrahim, T., Christoph, M.: Infrastructure as a service security: challenges and solution. In: The Proceeding of 7th International Conference on Informatics and Systems (INFOS), Egypt, pp. 89–95 (2010)
30.
go back to reference Arif, S., Olariu, S., Wang, J., Yan, G., Yang, W., Khalil, I.: Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Trans. Parallel Distrib. Syst. 3, 167–177 (2011) Arif, S., Olariu, S., Wang, J., Yan, G., Yang, W., Khalil, I.: Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Trans. Parallel Distrib. Syst. 3, 167–177 (2011)
31.
go back to reference Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 98–105 (2010) Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 98–105 (2010)
32.
go back to reference Klems, K., Lenk, K., Nimis, J., Sandholm, T., Tai, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: IEEE Xplore, pp. 23–31 (2009) Klems, K., Lenk, K., Nimis, J., Sandholm, T., Tai, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: IEEE Xplore, pp. 23–31 (2009)
33.
go back to reference Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: A comparative study of modern encryption algorithms based on cloud computing environment. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, pp. 536–541 (2013) Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: A comparative study of modern encryption algorithms based on cloud computing environment. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, pp. 536–541 (2013)
34.
go back to reference Kraska, F.: Building database applications in the cloud, Swiss federal institute of technology (2010) Kraska, F.: Building database applications in the cloud, Swiss federal institute of technology (2010)
36.
go back to reference Gongjun, Y., Ding, W., Stephan, O., Michele, C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 67–73 (2013) Gongjun, Y., Ding, W., Stephan, O., Michele, C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 67–73 (2013)
37.
go back to reference Patil, D., Akshay, R.: Data security over cloud emerging trends in computer science and information technology. In: Proceeding Published in International Journal of Computer Applications, pp. 123–147 (2012) Patil, D., Akshay, R.: Data security over cloud emerging trends in computer science and information technology. In: Proceeding Published in International Journal of Computer Applications, pp. 123–147 (2012)
38.
go back to reference Itani, W., Kayassi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International Conference on Energy Aware Computing (ICEAC10), Egypt, pp. 234–241 (2012) Itani, W., Kayassi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International Conference on Energy Aware Computing (ICEAC10), Egypt, pp. 234–241 (2012)
39.
go back to reference Solange, G., Mohammed, A.: Applying QKD to reach unconditional security in communications, European research project SECOQC, www.secoqc.net (2014) Solange, G., Mohammed, A.: Applying QKD to reach unconditional security in communications, European research project SECOQC, www.​secoqc.​net (2014)
40.
go back to reference Yau, Stephen S., Ho, G.An.: Confidentiality protection in cloud computing systems. Int. J. Softw. Inform. 4(4), 351–363 (2010) Yau, Stephen S., Ho, G.An.: Confidentiality protection in cloud computing systems. Int. J. Softw. Inform. 4(4), 351–363 (2010)
41.
go back to reference Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy (SP ’07), pp. 321–334 (2011) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy (SP ’07), pp. 321–334 (2011)
42.
go back to reference Cutillo, A., Molva, R., Strufe, T.: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. (2012) Cutillo, A., Molva, R., Strufe, T.: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. (2012)
43.
go back to reference Trugenberger, C., Diamantini, C.: Quantum associative pattern retrieval. Stud. Comput. Intell. (SCI) 121, 103–113 (2008)MATH Trugenberger, C., Diamantini, C.: Quantum associative pattern retrieval. Stud. Comput. Intell. (SCI) 121, 103–113 (2008)MATH
45.
go back to reference Ammar, O., Khaled, E., Muneer, A., Eman, A.: Quantum key distribution by using RSA. In: Proceedings of 3rd International Conference on Innovative Computing Technology (INTECH), pp. 123–128 (2013) Ammar, O., Khaled, E., Muneer, A., Eman, A.: Quantum key distribution by using RSA. In: Proceedings of 3rd International Conference on Innovative Computing Technology (INTECH), pp. 123–128 (2013)
46.
go back to reference Jasim, O.K., Anas, A.: The goals of parity bits in quantum key distribution system. Int. J. Comput. Appl. 56(18), 5–9 (2012) Jasim, O.K., Anas, A.: The goals of parity bits in quantum key distribution system. Int. J. Comput. Appl. 56(18), 5–9 (2012)
47.
go back to reference Dani, G.: An experimental implementation of oblivious transfer in the noisy storage model. Nat. Commun. J. 5(3418), 56–64 (2014) Dani, G.: An experimental implementation of oblivious transfer in the noisy storage model. Nat. Commun. J. 5(3418), 56–64 (2014)
48.
go back to reference Rawal, V., Dhamija, A., Sharma, S.: Revealing new concepts in cryptography & clouds. Int. J. Sci. Technol. Res. 1(7), 23–33 (2012) Rawal, V., Dhamija, A., Sharma, S.: Revealing new concepts in cryptography & clouds. Int. J. Sci. Technol. Res. 1(7), 23–33 (2012)
49.
go back to reference Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Quantum key distribution: simulation and characterizations. In: International Conference on Communication, Management and Information Technology (ICCMIT 2015), Procedia Computer Science, pp. 78–88, Prague (2015) Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Quantum key distribution: simulation and characterizations. In: International Conference on Communication, Management and Information Technology (ICCMIT 2015), Procedia Computer Science, pp. 78–88, Prague (2015)
50.
go back to reference Matthew, P., Caleb, H., Lamas, L., Christian, K.: Daylight Operation of a Free Space, Entanglement-Based Quantum Key Distribution System. National University of Singapore, Centre for Quantum Technologies, Singapore (2008) Matthew, P., Caleb, H., Lamas, L., Christian, K.: Daylight Operation of a Free Space, Entanglement-Based Quantum Key Distribution System. National University of Singapore, Centre for Quantum Technologies, Singapore (2008)
51.
go back to reference Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Statistical analysis of random bits generation of quantum key distribution. In: 3rd IEEE-International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), pp. 45–52 (2014) Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Statistical analysis of random bits generation of quantum key distribution. In: 3rd IEEE-International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), pp. 45–52 (2014)
52.
go back to reference Matthew, G.: Statistical tests of randomness on QKD through a free-space channel coupled to daylight noise. J. Lightwave Technol. 3(23), 56–68 (2013) Matthew, G.: Statistical tests of randomness on QKD through a free-space channel coupled to daylight noise. J. Lightwave Technol. 3(23), 56–68 (2013)
53.
go back to reference Aidan, F., Hans, V., Patrick, L., Damian, F.: (2012) Microsoft Private Cloud Computing. Wiley, ISBN: 978-1-118-25147-8 Aidan, F., Hans, V., Patrick, L., Damian, F.: (2012) Microsoft Private Cloud Computing. Wiley, ISBN: 978-1-118-25147-8
54.
go back to reference Sharif, M.S.: Quantum cryptography: a new generation of information technology security system. In: 6th International Conference on Information Technology: New Generations, pp. 1644–1648 (2009) Sharif, M.S.: Quantum cryptography: a new generation of information technology security system. In: 6th International Conference on Information Technology: New Generations, pp. 1644–1648 (2009)
55.
go back to reference Woolley, R., Fletcher, D.: The hybrid cloud: bringing cloud-based IT services to state government (2009) Woolley, R., Fletcher, D.: The hybrid cloud: bringing cloud-based IT services to state government (2009)
56.
go back to reference Raheel, A., Stuart, B., Elizabeth, C., Kavitha, G., James, E.: Quantum simultaneous recurrent networks for content addressable memory. Stud. Comput. Intell. (SCI) 121, 57–74 (2008)MATH Raheel, A., Stuart, B., Elizabeth, C., Kavitha, G., James, E.: Quantum simultaneous recurrent networks for content addressable memory. Stud. Comput. Intell. (SCI) 121, 57–74 (2008)MATH
58.
go back to reference Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Advanced encryption standard development based quantum key distribution. In: 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), UK, pp. 343–354 (2014) Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Advanced encryption standard development based quantum key distribution. In: 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), UK, pp. 343–354 (2014)
Metadata
Title
Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service
Authors
Omer K. Jasim Mohammad
El-Sayed M. El-Horbaty
Abdel-Badeeh M. Salem
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-32168-4_8

Premium Partner