Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 2/2018

09.11.2016

Identity based secure authentication scheme based on quantum key distribution for cloud computing

verfasst von: Geeta Sharma, Sheetal Kalra

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of utmost significance as the number of hackers who seek to intrigue into legitimate user’s account to obtain sensitive information is increasing. Identity based authentication operates to corroborate the identity of the user so that only the legitimate user gets access to the service. This paper proposes a quantum identity based authentication and key agreement scheme for cloud server architecture. Quantum cryptography based on the laws of quantum physics is a vital technology for securing privacy and confidentiality in the field of network security. A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme. The security analysis of the proposed protocol proves that it is robust against all security attacks. To confirm applicability of quantum key distribution in cloud computing, a practical long-distance entanglement-based QKD experiment has been proposed. This experiment confirms successful generation of shifted keys over distance of 100 km of optical fiber with a key rate of 4.11 bit/s and an error rate of 9.21 %.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rothe J (2002) “some facets of complexity theory and cryptography”: A five-lecture tutorial. ACM Comput Surv 34(4):504–549CrossRef Rothe J (2002) “some facets of complexity theory and cryptography”: A five-lecture tutorial. ACM Comput Surv 34(4):504–549CrossRef
3.
Zurück zum Zitat Duan Q, Yan Y, Vasilakos AV (2012) A survey on service-oriented network virtualization toward convergence of networking and cloud computing. IEEE Trans Netw Serv Manag 9(4):373–392CrossRef Duan Q, Yan Y, Vasilakos AV (2012) A survey on service-oriented network virtualization toward convergence of networking and cloud computing. IEEE Trans Netw Serv Manag 9(4):373–392CrossRef
4.
Zurück zum Zitat Sadiku M, Musa S, Momoh O (2014) Cloud computing: Opportunities and challenges. IEEE Potentials 33(1):34–36CrossRef Sadiku M, Musa S, Momoh O (2014) Cloud computing: Opportunities and challenges. IEEE Potentials 33(1):34–36CrossRef
5.
Zurück zum Zitat Latif R, Abbas H, Assar S, Ali Q (2014) Cloud computing risk assessment: A systematic literature review, in: Future information technology. Springer, Berlin, pp. 285–295 Latif R, Abbas H, Assar S, Ali Q (2014) Cloud computing risk assessment: A systematic literature review, in: Future information technology. Springer, Berlin, pp. 285–295
6.
Zurück zum Zitat Martucci LA, Zuccato A, Smeets B, Habib SM, Johansson T, Shahmehri N (2012) Privacy, security and trust in cloud computing the perspective of the telecommunication industry. In: The 9th international conference on ubiquitous intelligence and computing and 9th international conference on autonomic and trusted computing pp. 627–32 Martucci LA, Zuccato A, Smeets B, Habib SM, Johansson T, Shahmehri N (2012) Privacy, security and trust in cloud computing the perspective of the telecommunication industry. In: The 9th international conference on ubiquitous intelligence and computing and 9th international conference on autonomic and trusted computing pp. 627–32
7.
Zurück zum Zitat Reed A, Rezek C, Simmonds P (2011) Security guidance for critical areas of focus in cloud computing v3.0, Cloud Security Alliance (CSA) Reed A, Rezek C, Simmonds P (2011) Security guidance for critical areas of focus in cloud computing v3.0, Cloud Security Alliance (CSA)
8.
Zurück zum Zitat Lyer B, Henderson J (2010) Preparing for the future: Understanding the seven capabilities of cloud computing. Manage Inf Syst Q Exec 9(2):117–131 Lyer B, Henderson J (2010) Preparing for the future: Understanding the seven capabilities of cloud computing. Manage Inf Syst Q Exec 9(2):117–131
9.
Zurück zum Zitat Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRef Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRef
10.
Zurück zum Zitat Ali O, Soar J (2014) Challenges and issues within cloud computing technology. In: The fifth international conference on cloud computing, GRIDs, and virtualization pp. 55–63 Ali O, Soar J (2014) Challenges and issues within cloud computing technology. In: The fifth international conference on cloud computing, GRIDs, and virtualization pp. 55–63
11.
Zurück zum Zitat Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: Proceedings of the IEEE international conference on computer science and electronics engineering pp. 156–159 Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: Proceedings of the IEEE international conference on computer science and electronics engineering pp. 156–159
12.
Zurück zum Zitat Verma A, Kaushal S (2011) Cloud computing security issues and challenges: A survey. In: Proceeding of Springer international conference on advances in computing and communication, pp. 445–54 Verma A, Kaushal S (2011) Cloud computing security issues and challenges: A survey. In: Proceeding of Springer international conference on advances in computing and communication, pp. 445–54
13.
Zurück zum Zitat Karaoglanoglou K, Karatza H (2011) Resource discovery in a grid system: Directing requests to trustworthy virtual organizations based on global trust values. J Syst Softw 84(3):465–478CrossRef Karaoglanoglou K, Karatza H (2011) Resource discovery in a grid system: Directing requests to trustworthy virtual organizations based on global trust values. J Syst Softw 84(3):465–478CrossRef
14.
Zurück zum Zitat Liu B, Blasch E, Chen Y, Aved AJ, Hadiks A, Shen D, Chen G (2014) Information fusion in a cloud computing era: A systems-level perspective. IEEE Aerosp Electron Syst Mag 29(10):16–24CrossRef Liu B, Blasch E, Chen Y, Aved AJ, Hadiks A, Shen D, Chen G (2014) Information fusion in a cloud computing era: A systems-level perspective. IEEE Aerosp Electron Syst Mag 29(10):16–24CrossRef
15.
Zurück zum Zitat Jansen WA (2011) Cloud hooks: Security and privacy issues in cloud computing, in: 44th Hawaii International Conference on System Sciences (HICSS), pp. 1–10 Jansen WA (2011) Cloud hooks: Security and privacy issues in cloud computing, in: 44th Hawaii International Conference on System Sciences (HICSS), pp. 1–10
16.
Zurück zum Zitat Carlin S, Curran K (2011) Cloud computing security. Int J Ambient Comput Intell 3(1):14–19CrossRef Carlin S, Curran K (2011) Cloud computing security. Int J Ambient Comput Intell 3(1):14–19CrossRef
17.
Zurück zum Zitat Jung T, Li X, Wan Z, Wan M (2014) Control cloud data access privilege and anonymity with fully anonymous attribute based encryption. IEEE Trans Inform Forensics Sec 10(1):190–199CrossRef Jung T, Li X, Wan Z, Wan M (2014) Control cloud data access privilege and anonymity with fully anonymous attribute based encryption. IEEE Trans Inform Forensics Sec 10(1):190–199CrossRef
18.
Zurück zum Zitat Subashini S, Kavitha V A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11 Subashini S, Kavitha V A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
19.
Zurück zum Zitat Tseng YM, Tsai T-T (2012) Efficient revocable ID-based encryption with a public channel. Comput J 55(4):475–486CrossRef Tseng YM, Tsai T-T (2012) Efficient revocable ID-based encryption with a public channel. Comput J 55(4):475–486CrossRef
20.
Zurück zum Zitat Tsai TT, Tseng Y-M, Wu T-Y (2014) RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE. Informatica 25(2):299–326MathSciNetCrossRefMATH Tsai TT, Tseng Y-M, Wu T-Y (2014) RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE. Informatica 25(2):299–326MathSciNetCrossRefMATH
21.
Zurück zum Zitat Tsai TT, Tseng Y-M, Wu T-Y (2013) Provably secure revocable ID-based signature in the standard model. Secur Commun Netw 6(10):1250–1260 Tsai TT, Tseng Y-M, Wu T-Y (2013) Provably secure revocable ID-based signature in the standard model. Secur Commun Netw 6(10):1250–1260
22.
Zurück zum Zitat Bennett CH, Brassard G (1984) Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers. Systems and Signal Processing, Bangalore, pp. 175–179 Bennett CH, Brassard G (1984) Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers. Systems and Signal Processing, Bangalore, pp. 175–179
23.
Zurück zum Zitat Li XH, Zhou P, Li CY, Zhou HY, Deng FG (2006) Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state. J Phys B 39:1975CrossRef Li XH, Zhou P, Li CY, Zhou HY, Deng FG (2006) Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state. J Phys B 39:1975CrossRef
24.
Zurück zum Zitat Deng FG, Li XH, Zhou HY (2008) Symmetric multiparty-controlled teleportation of an arbitrary two particle entanglement. Phys Lett A 372:19–57 Deng FG, Li XH, Zhou HY (2008) Symmetric multiparty-controlled teleportation of an arbitrary two particle entanglement. Phys Lett A 372:19–57
25.
Zurück zum Zitat Gao G, Fang M, Yang RM (2011) Quantum secure direct communication by swapping entanglements of 317 dimensional bell states. Int J Theor Phys 50:882–887CrossRefMATH Gao G, Fang M, Yang RM (2011) Quantum secure direct communication by swapping entanglements of 317 dimensional bell states. Int J Theor Phys 50:882–887CrossRefMATH
26.
Zurück zum Zitat Liu D, Chen JL, Jiang W (2012) High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int J Theor Phys 51:2923–2929CrossRefMATH Liu D, Chen JL, Jiang W (2012) High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int J Theor Phys 51:2923–2929CrossRefMATH
27.
Zurück zum Zitat Sun ZW, Du RG, Long DY (2012) Quantum secure direct communication with two-photon four-qubit cluster states. Int J Theor Phys 51:1946–1952CrossRefMATH Sun ZW, Du RG, Long DY (2012) Quantum secure direct communication with two-photon four-qubit cluster states. Int J Theor Phys 51:1946–1952CrossRefMATH
28.
Zurück zum Zitat Zhang QN, Li CC, Li YH, Nie YY (2013) Quantum secure direct communication based on four-qubit cluster states. Int J Theor Phys 52:22–27MathSciNetCrossRefMATH Zhang QN, Li CC, Li YH, Nie YY (2013) Quantum secure direct communication based on four-qubit cluster states. Int J Theor Phys 52:22–27MathSciNetCrossRefMATH
29.
Zurück zum Zitat Penghao N, Yuan C, Chong L (2015) Quantum authentication scheme based on entanglement swapping. Int J Theor Phys 55(1):302–312MathSciNetCrossRefMATH Penghao N, Yuan C, Chong L (2015) Quantum authentication scheme based on entanglement swapping. Int J Theor Phys 55(1):302–312MathSciNetCrossRefMATH
30.
Zurück zum Zitat Mihara T (2002) Quantum identification schemes with entanglements. Phys Rev A 65:05236–051-4CrossRef Mihara T (2002) Quantum identification schemes with entanglements. Phys Rev A 65:05236–051-4CrossRef
31.
Zurück zum Zitat Lee H, Lim J, Yang H (2006) Quantum direct communication with authentication. Phys Rev A 73:042305CrossRef Lee H, Lim J, Yang H (2006) Quantum direct communication with authentication. Phys Rev A 73:042305CrossRef
32.
Zurück zum Zitat Zhang ZJ, Liu J, Wang D, Shi SH (2007) Comment on quantum direct communication with authentication. Phys Rev A 75:026301CrossRef Zhang ZJ, Liu J, Wang D, Shi SH (2007) Comment on quantum direct communication with authentication. Phys Rev A 75:026301CrossRef
33.
Zurück zum Zitat Yen CA, Horng SJ, Goan HS, Kao TW, Chou YH (2009) Quantum direct communication with mutual authentication. Quantum Inf Comput 9:0376MathSciNetMATH Yen CA, Horng SJ, Goan HS, Kao TW, Chou YH (2009) Quantum direct communication with mutual authentication. Quantum Inf Comput 9:0376MathSciNetMATH
34.
Zurück zum Zitat Liu D, Pei C, Quan D, Zhao N (2010) A new quantum secure direct communication scheme with authentication. Chin Phys Lett 27:050306CrossRef Liu D, Pei C, Quan D, Zhao N (2010) A new quantum secure direct communication scheme with authentication. Chin Phys Lett 27:050306CrossRef
35.
Zurück zum Zitat Naseri M (2011) An efficient protocol for quantum secure dialogue with authentication by using single photons. Int J Quantum Inf 9:16–77MathSciNetCrossRefMATH Naseri M (2011) An efficient protocol for quantum secure dialogue with authentication by using single photons. Int J Quantum Inf 9:16–77MathSciNetCrossRefMATH
36.
Zurück zum Zitat Yang YG, Wang H-Y, Jia X, Zhang H (2012) A quantum protocol for (t,n)-thresholdidentity authentication based on Greenberger–Horne–Zeilinger states. Int J Theor Phys. doi:10.1007/s10773-012-1356-7 MATH Yang YG, Wang H-Y, Jia X, Zhang H (2012) A quantum protocol for (t,n)-thresholdidentity authentication based on Greenberger–Horne–Zeilinger states. Int J Theor Phys. doi:10.​1007/​s10773-012-1356-7 MATH
37.
Zurück zum Zitat Choudhury AJ, Kumar P, Sain M, Lim H, Jae-Lee H (2011) “A strong user authentication framework for cloud computing”, In Services Computing Conference (APSCC), 2011 I.E. Asia-Pacific, pp. 110–115 Choudhury AJ, Kumar P, Sain M, Lim H, Jae-Lee H (2011) “A strong user authentication framework for cloud computing”, In Services Computing Conference (APSCC), 2011 I.E. Asia-Pacific, pp. 110–115
38.
Zurück zum Zitat Gurav SM, Gawade LS, Rane PK and Khochare NR (2014) Graphical password authentication: Cloud securing scheme, In Electronic Systems, Signal Processing and Computing Technologies (ICESC), IEEE International Conference, pp. 479–483 Gurav SM, Gawade LS, Rane PK and Khochare NR (2014) Graphical password authentication: Cloud securing scheme, In Electronic Systems, Signal Processing and Computing Technologies (ICESC), IEEE International Conference, pp. 479–483
39.
Zurück zum Zitat Kalra S, Sood SK (2015) Secure authentication scheme for IoT and cloud servers. Pervasive Mob Comput 24:210–223CrossRef Kalra S, Sood SK (2015) Secure authentication scheme for IoT and cloud servers. Pervasive Mob Comput 24:210–223CrossRef
40.
Zurück zum Zitat Yassin AA, Jin H, Ibrahim A, Qiang W and Zou D (2012) A practical privacy-preserving password authentication scheme for cloud computing, In Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), IEEE 26th International, pp. 1210–1217 Yassin AA, Jin H, Ibrahim A, Qiang W and Zou D (2012) A practical privacy-preserving password authentication scheme for cloud computing, In Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), IEEE 26th International, pp. 1210–1217
41.
Zurück zum Zitat Jaidhar CD (2013) Enhanced mutual authentication scheme for cloud architecture, In Advance Computing Conference (IACC), IEEE 3rd International, IEEE, pp. 70–75 Jaidhar CD (2013) Enhanced mutual authentication scheme for cloud architecture, In Advance Computing Conference (IACC), IEEE 3rd International, IEEE, pp. 70–75
44.
Zurück zum Zitat Yang YG, Wang H-Y, Jia X, Zhang H (2012) A quantum protocol for (t,n)-thresholdidentity authentication based on Greenberger–Horne–Zeilinger states. Int J Theor Phys. doi:10.1007/s10773-012-1356-7 MATH Yang YG, Wang H-Y, Jia X, Zhang H (2012) A quantum protocol for (t,n)-thresholdidentity authentication based on Greenberger–Horne–Zeilinger states. Int J Theor Phys. doi:10.​1007/​s10773-012-1356-7 MATH
45.
Zurück zum Zitat Takesue H, Tokura Y, Fukuda H, Tsuchizawa T, Watanabe T, Yamada K, Itabashi S (2007) Entanglement generation using silicon wire waveguide. Appl Phys Lett 91:201108CrossRef Takesue H, Tokura Y, Fukuda H, Tsuchizawa T, Watanabe T, Yamada K, Itabashi S (2007) Entanglement generation using silicon wire waveguide. Appl Phys Lett 91:201108CrossRef
46.
Zurück zum Zitat Shoji T, Tsuchizawa T, Watanabe T, Yamada K, Morita H (2002) Low loss mode size converter from 0.3 μm square Si wire waveguides to singlemode fibres. Electron Lett 38:1669–1670CrossRef Shoji T, Tsuchizawa T, Watanabe T, Yamada K, Morita H (2002) Low loss mode size converter from 0.3 μm square Si wire waveguides to singlemode fibres. Electron Lett 38:1669–1670CrossRef
47.
Zurück zum Zitat Harada K, Takesue H, Fukuda H, Tsuchizawa T, Watanabe T, Yamada K, Tokura Y, Itabashi S (2010) Frequency and polarization characteristics of correlated photon-pair generation using a silicon wire waveguide. IEEE J Sel Top Quantum Electron 16:325–331CrossRef Harada K, Takesue H, Fukuda H, Tsuchizawa T, Watanabe T, Yamada K, Tokura Y, Itabashi S (2010) Frequency and polarization characteristics of correlated photon-pair generation using a silicon wire waveguide. IEEE J Sel Top Quantum Electron 16:325–331CrossRef
48.
Zurück zum Zitat Takesue H, Inoue K (2005) Generation of 1.5-μm band time-bin entanglement using spontaneous fiber four-wave mixing and planar lightwave circuit interferometers. Phys Rev A 72:041804CrossRef Takesue H, Inoue K (2005) Generation of 1.5-μm band time-bin entanglement using spontaneous fiber four-wave mixing and planar lightwave circuit interferometers. Phys Rev A 72:041804CrossRef
49.
Zurück zum Zitat Miquel B, Takesue H (2009) Observation of 1.5 μm band entanglement using single photon detectors based on sinusoidally gated InGaAs/InP avalanche photodiodes. N J Phys 11:045006CrossRef Miquel B, Takesue H (2009) Observation of 1.5 μm band entanglement using single photon detectors based on sinusoidally gated InGaAs/InP avalanche photodiodes. N J Phys 11:045006CrossRef
50.
Zurück zum Zitat Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441–444CrossRef Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441–444CrossRef
Metadaten
Titel
Identity based secure authentication scheme based on quantum key distribution for cloud computing
verfasst von
Geeta Sharma
Sheetal Kalra
Publikationsdatum
09.11.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0528-2

Weitere Artikel der Ausgabe 2/2018

Peer-to-Peer Networking and Applications 2/2018 Zur Ausgabe