A Framework for Security Management in Cloud Based on Quantum Cryptography

  • Priya RainaEmail author
  • Sakshi Kaushal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 904)


Cloud Computing (CC) and Quantum Computing, both have been interesting areas of research, individually. However, integrating the two can come with mutual benefits for both the fields. Cloud platforms can offer Quantum Computing as a service, but more importantly, they are capable of offering the flexibility, inherent in architecture, to accommodate new developments in Quantum Computing. On the other hand, Quantum Computing in general and Quantum Cryptography (QC), in particular, can help in alleviating the security concerns associated with CC, which have prevented users from migrating to cloud. The paper proposes a model framework contemplating the use of Blind Quantum Computation (BQC) between cloud servers involved in multiparty computations during online phase and using authenticated Quantum Key Distribution (QKD) for secure distribution of keys (used for encrypting the secret files) when going into offline phase. Finally, a proof of the model has been presented, using Universal Composibility (UC) framework.


Cloud Cloud security Quantum computing Quantum cryptography Quantum key distribution Blind quantum computing 


  1. 1.
    Alléaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Länger, T., Lütkenhaus, N., et al.: Using quantum key distribution for cryptographic purposes: a survey. Theor. Comput. Sci. 560, 62–81 (2014)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Barz, S., Kashefi, E., Broadbent, A., Fitzsimons, J.F., Zeilinger, A., Walther, P.: Demonstration of blind quantum computing. Science 335(6066), 303–308 (2012)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Bennett, C.H., Brassard, G., Ekert, A.K.: Quantum cryptography. Sci. Am. 267(4), 50–57 (1992)CrossRefGoogle Scholar
  4. 4.
    Broadbent, A., Fitzsimons, J., Kashefi, E.: Measurement-based and universal blind quantum computation. In: Formal Methods for Quantitative Aspects of Programming Languages, pp. 43–86. Springer (2010)Google Scholar
  5. 5.
    Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proceedings. 42nd IEEE Symposium on Foundations of Computer Science, 2001, pp. 136–145. IEEE (2001)Google Scholar
  6. 6.
    Damgård, I., Jakobsen, T.P., Nielsen, J.B., Pagter, J.I.: Secure key management in the cloud. In: IMA International Conference on Cryptography and Coding, pp. 270–289. Springer (2013)Google Scholar
  7. 7.
    Elboukhari, M., Azizi, A., Azizi, M.: Implementation of secure key distribution based on quantum cryptography. In: International Conference on Multimedia Computing and Systems, 2009. ICMCS’09, pp. 361–365. IEEE (2009)Google Scholar
  8. 8.
    Ghernaouti-Hélie, S., Sfaxi, M.A.: Upgrading ppp security by quantum key distribution. In: Network Control and Engineering for QoS, Security and Mobility, IV, pp. 45–59. Springer (2007)Google Scholar
  9. 9.
    Gruska, J.: Quantum Computing, vol. 2005. McGraw-Hill London (1999)Google Scholar
  10. 10.
    Khalid, R., Zulkarnain, Z.A.: Enhanced tight finite key scheme for quantum key distribution (qkd) protocol to authenticate multi-party system in cloud infrastructure. In: Applied Mechanics and Materials, vol. 481, pp. 220–224. Trans Tech Publ (2014)Google Scholar
  11. 11.
    Khan, M.M., Xu, J.: Enhancing grid security using quantum key distribution. Sersc. Org. 6(4), 67–76 (2012)Google Scholar
  12. 12.
    Mell, P., Grance, T., et al.: The nist definition of cloud computing (2011)Google Scholar
  13. 13.
    Mosca, M., Stebila, D., Ustaoğlu, B.: Quantum key distribution in the classical authenticated key exchange framework. In: International Workshop on Post-Quantum Cryptography, pp. 136–154. Springer (2013)Google Scholar
  14. 14.
    Raina, P., Kaushal, S.: A study on quantum cryptography based security management in cloud. In: Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, pp. 350–354. ACM (2015)Google Scholar
  15. 15.
    Sfaxi, M., Ghernaouti-Hélie, S., Ribordy, G., Gay, O.: Using quantum key distribution within ipsec to secure man communications. Proceedings of metropolitan area networks (man2005) (2005)Google Scholar
  16. 16.
    Sueki, T., Koshiba, T., Morimae, T.: Ancilla-driven universal blind quantum computation. Physical Review A 87(6), 060,301 (2013)Google Scholar
  17. 17.
    Verma, A., Kaushal, S.: Cloud computing security issues and challenges: a survey. In: International Conference on Advances in Computing and Communications, pp. 445–454. Springer (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Chitkara UniversityHimachal PradeshIndia
  2. 2.UIET, Panjab UniversityChandigarhIndia

Personalised recommendations