Towards a Novel Privacy-Preserving Distributed Multiparty Data Outsourcing Scheme for Cloud Computing with Quantum Key Distribution

Authors

  • D. Dhinakaran Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, India
  • D. Selvaraj Department of Electronics and Communication Engineering, Panimalar Engineering College, Chennai, India.
  • N. Dharini Department of Computer Science and Engineering (Cyber Security), R.M.K College of Engineering and Technology, Chennai, India
  • S. Edwin Raja Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, India
  • C. Sakthi Lakshmi Priya Department of Computer Science and Engineering, P.S.R Engineering College, Sivakasi, India

Keywords:

Blockchain, cloud computing, cryptographic mechanism, privacy, quantum, security

Abstract

The intersection of cloud computing, blockchain technology, and the impending era of quantum computing presents a critical juncture for data security. This research addresses the escalating vulnerabilities by proposing a comprehensive framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) for securing data in cloud-based blockchain systems. The primary objective is to fortify data against quantum threats through the implementation of QKD, a quantum-safe cryptographic protocol. We leverage the lattice-based cryptographic mechanism, CRYSTALS-Kyber, known for its resilience against quantum attacks. Additionally, ZKPs are introduced to enhance data privacy and verification processes within the cloud and blockchain environment. A significant focus of this research is the performance evaluation of the proposed framework. Rigorous analyses encompass encryption and decryption processes, quantum key generation rates, and overall system efficiency. Practical implications are scrutinized, considering factors such as file size, response time, and computational overhead. The evaluation sheds light on the framework's viability in real-world cloud environments, emphasizing its efficiency in mitigating quantum threats. The findings contribute a robust quantum-safe and ZKP-integrated security framework tailored for cloud-based blockchain storage. By addressing critical gaps in theoretical advancements, this research offers practical insights for organizations seeking to secure their data against quantum threats. The framework's efficiency and scalability underscore its practical feasibility, serving as a guide for implementing enhanced data security in the evolving landscape of quantum computing and blockchain integration within cloud environments.

Downloads

Download data is not yet available.

References

A. Manzoor, A. Braeken, S. S. Kanhere, M. Ylianttila, and M. Liyanage, “Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain,” Journal of Network and Computer Applications, vol. 176, article 102917, 2021.

Dhinakaran D, Joe Prathap P. M, "Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining," The Journal of Supercomputing, 78(16), 17559–17593 (2022).

Q. Li, B. Xia, H. Huang, Y. Zhang, and T. Zhang, “TRAC: traceable and revocable access control scheme for mHealth in 5G-enabled IIoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 3437–3448, 2022

Dhinakaran D, P. M. Joe Prathap, “Preserving data confidentiality in association rule mining using data share allocator algorithm,” Intelligent Automation & Soft Computing, vol. 33, no.3, pp. 1877–1892, 2022. DOI:10.32604/iasc.2022.024509.

A. S. Sani, D. Yuan, W. Bao et al.,“Xyreum: a high performance and scalable blockchain for IIoT security and privacy,” in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1920–1930, Dallas, TX, USA, 2019.

D. Selvaraj, S. M. Udhaya Sankar, D. Dhinakaran, T. P. Anish, "Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 1, pp. 53-62, 2023.

J. Xiong, R. Bi, M. Zhao, J. Guo, and Q. Yang, “Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles,” IEEE Wireless Communications, vol. 27, no. 3, pp. 24–30, 2020.

R. Kashyap, K. Arora, M. Sharma, and A. Aazam, “Security aware GA based practical byzantine fault tolerance for permissioned blockchain,” in 2019 4th International Conference on Control, Robotics and Cybernetics (CRC), Tokyo, Japan, 2019.

J. Li, S. Wu, Y. Yang, F. Duan, H. Lu, and Y. Lu, “Controlled sharing mechanism of data based on the consortium blockchain,” Security and Communication Networks, vol. 2021, 10 pages, 2021.

Selvaraj D, Arul Kumar D and Murugeshwari B, "Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 284-294, 2022. https://doi.org/10.14445/22315381/IJETT-V70I3P232.

J. Xiong, R. Ma, L. Chen et al., “A personalized privacy protection framework for mobile crowdsensing in IIoT,” IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4231–4241, 2020.

M. Harini, D. Dhinakaran, D. Prabhu, S. M. Udhaya Sankar, V. Pooja and P. Kokila Sruthi, "Levarging Blockchain for Transparency in Agriculture Supply Chain Management Using IoT and Machine Learning," 2023 World Conference on Communication & Computing (WCONF), RAIPUR, India, 2023, pp. 1-6,

M. Shen, J. Duan, L. Zhu, J. Zhang, X. Du, and M. Guizani, “Blockchain-based incentives for secure and collaborative data sharing in multiple clouds,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1229 –1241, 2020.

Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145-195.

C. Wang, Q. Wang, K. Ren and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1-9, doi: 10.1109/INFCOM.2010.5462173.

Ogiela L, Ogiela MR, Ko H. Intelligent Data Management and Security in Cloud Computing. Sensors (Basel). 2020 Jun 18;20(12):3458. doi: 10.3390/s20123458. PMID: 32570956; PMCID: PMC7349833.

Faya Safar, Raddad Al King, Data Security in Cloud Computing, International Journal of Wireless and Ad Hoc Communication, Vol. 7, No. 1, (2023) : 50-61.

A. Kumar, "Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing," 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2021, pp. 1529-1535, doi: 10.1109/I-SMAC52330.2021.9640708.

W. Xiaoyu and G. Zhengming, "Research and Development of Data Security Multidimensional Protection System in Cloud Computing Environment," 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI), Ottawa, ON, Canada, 2020, pp. 67-70, doi: 10.1109/ICAACI50733.2020.00019.

Suyel Namasudra, "An improved attribute-based encryption technique towards the data security in cloud computing," Concurrency and Computation: Practice and Experience, Volume31, Issue3, 2017.

Q. Wang, C. Wang, K. Ren, W. Lou and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," in IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011, doi: 10.1109/TPDS.2010.183.

Kaur, M., & Mahajan, M. (2023). Using encryption Algorithms to enhance the Data Security in Cloud Computing. International Journal of Communication and Computer Technologies, 1(2), 130–133.

S. K. Saroj, S. K. Chauhan, A. K. Sharma and S. Vats, "Threshold Cryptography Based Data Security in Cloud Computing," 2015 IEEE International Conference on Computational Intelligence & Communication Technology, Ghaziabad, India, 2015, pp. 202-207, doi: 10.1109/CICT.2015.149.

Imran Ahmad Khan, Rosheen Qazi, Data Security in Cloud Computing Using Elliptic Curve Cryptography, International Journal of Computing and Communication Networks (IJCCN), Vol 1 No 1 (2019): August 2019

Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Information Sciences, Volume 379, 2017, Pages 42-61, ISSN 0020-0255, https://doi.org/10.1016/j.ins.2016.04.015.

Sudhansu Ranjan Lenka, Biswaranjan Nayak, "Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm," International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 3, June-2014.

Zheng, Z., Xie, S., Dai, H. N., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE International Congress on Big Data (BigData Congress) (pp. 557-564). IEEE.

Shi, Rh., Li, Yf. Privacy-preserving quantum protocol for finding the maximum value. EPJ Quantum Technol. 9, 13 (2022).

Dhinakaran, et al. (2023). IoT-Based Environmental Control System for Fish Farms with Sensor Integration and Machine Learning Decision Support. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10), 203–217. https://ijritcc.org/index.php/ijritcc/article/view/8482.

D. A. Kumar, S. Dinesh, D. Selvaraj, and K. Srikanth, Recommendation System for Research Studies Based on GCR, 2022 International Mobile and Embedded Technology Conference (MECON), Noida, India, (2022) 61-65, doi: 10.1109/MECON53876.2022.9751920.

Wang, Q., Liu, K., Ren, K., Lou, W., & Li, J. (2018). Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 29(8), 1731-1744.

Dhinakaran, D., Sankar, S. M. U., Elumalai, G., & Kumar, N. J. (2023). A Neural Radiance Field-Based Architecture for Intelligent Multilayered View Synthesis. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 259–269. https://doi.org/10.17762/ijritcc.v11i9.8342.

M. Kim, Y. Song, S. Wang, Y. Xia, and X. Jiang, “Secure logistic regression based on homomorphic encryption: Design and Evaluation,” JMIR Medical Informatics, vol. 6, no. 2, p. 19, 2018.

S.M. Udhaya Sankar, D. Dhinakaran, C. CathrinDeboral, M. Ramakrishnan, "Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 219-231, 2022. https://doi.org/10.14445/22315381/IJETT-V70I11P224

P. P. Jayaraman, X. Yang, A. Yavari, D. Georgakopoulos, and X. Yi, “Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation,” Future Generation Computer Systems, vol. 76, pp. 540–549, 2017.

D. Dhinakaran, L. Srinivasan, D. Selvaraj, S. M. Udhaya Sankar, "Leveraging Semi-Supervised Graph Learning for Enhanced Diabetic Retinopathy Detection," SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 8, pp. 9-21, 2023. https://doi.org/10.14445/23488549/IJECE-V10I8P102.

S. M. Udhaya Sankar, N. J. Kumar, D. Dhinakaran, S. S. Kamalesh and R. Abenesh, "Machine Learning System For Indolence Perception," 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA), Uttarakhand, India, 2023, pp. 55-60, doi: 10.1109/ICIDCA56705.2023.10099959.

G. K. Monica, D. Dhinakaran, K. Haritha, K. Kohila and U. Priyadharshini, "MEMS based Sensor Robot for Immobilized Persons," 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA), Uttarakhand, India, 2023, pp. 924-929, doi: 10.1109/ICIDCA56705.2023.10100113.

X. Qin, Y. Huang, Z. Yang, and X. Li, “LBAC: a lightweight blockchain-based access control scheme for the Internet of things,” Information Sciences, vol. 554, pp. 222–235, 2021.

D. Dhinakaran, S. M. Udhaya Sankar, B. C. Latha, A. E. J. Anns and V. K. Sri, "Dam Management and Disaster Monitoring System using IoT," 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Erode, India, 2023, pp. 1197-1201, doi: 10.1109/ICSCDS56580.2023.10105132.

Jena Catherine Bel D, Esther C, Zionna Sen G B,Tamizhmalar D, Dhinakaran D, Anish T. P, "Trustworthy Cloud Storage Data Protection based on Blockchain Technology," 2022 International Conference on Edge Computing and Applications (ICECAA), 2022, pp. 538-543, doi: 10.1109/ICECAA55415.2022.9936299.

C. Huang, D. Liu, J. Ni, R. Lu, and X. Shen, “Achieving accountable and efficient data sharing in industrial Internet of things, ” IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 1416 –1427, 2021.

S. M. U. Sankar, D. Dhinakaran, T. Kavya, S. Priyanka and P. P. Oviya, "A Way for Smart Home Technology for Disabled and Elderly People," 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA), Uttarakhand, India, 2023, pp. 369-373, doi: 10.1109/ICIDCA56705.2023.10099817.

L. Srinivasan, D. Selvaraj, D. Dhinakaran, T. P. Anish, "IoT-Based Solution for Paraplegic Sufferer to Send Signals to Physician via Internet," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 1, pp. 41-52, 2023. https://doi.org/10.14445/23488379/IJEEE-V10I1P104.

K. Y. Kumar, N. J. Kumar, D. Dhinakaran, S. M. Udhaya Sankar, U. J. Kumar and V. Yuvaraj, "Optimized Retrieval of Data from Cloud using Hybridization of Bellstra Algorithm," 2023 World Conference on Communication & Computing (WCONF), RAIPUR, India, 2023, pp. 1-6, doi: 10.1109/WCONF58270.2023.10234974.

Anish, T.P., Shanmuganathan, C., Dhinakaran, D., Vinoth Kumar, V. (2023). Hybrid Feature Extraction for Analysis of Network System Security—IDS. In: Jain, R., Travieso, C.M., Kumar, S. (eds) Cybersecurity and Evolutionary Data Engineering. ICCEDE 2022. Lecture Notes in Electrical Engineering, vol 1073. Springer, Singapore. https://doi.org/10.1007/978-981-99-5080-5_3

Dhinakaran, D., Udhaya Sankar, S.M., Ananya, J., Roshnee, S.A. (2023). IOT-Based Whip-Smart Trash Bin Using LoRa WAN. In: Jeena Jacob, I., Kolandapalayam Shanmugam, S., Izonin, I. (eds) Expert Clouds and Applications. ICOECA 2022. Lecture Notes in Networks and Systems, vol 673, pp. 277-288. https://doi.org/10.1007/978-981-99-1745-7_20

Y. Tian, T. Li, J. Xiong, M. Z. Bhuiyan, J. Ma, and C. Peng, “A blockchain-based machine learning framework for edge services in IIoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1918–1929, 2022.

M. Keerthana, D. Dhinakaran, M. Ananthi, R. Harish, S. M. Udhaya Sankar and M. S. Sree, "IoT Based Automated Irrigation System for Agricultural Activities," 2023 12th International Conference on Advanced Computing (ICoAC), Chennai, India, 2023, pp. 1-6, doi: 10.1109/ICoAC59537.2023.10249426

K. Sudharson, B. Alekhya, G. Abinaya, C. Rohini, S. Arthi and D. Dhinakaran, "Efficient Soil Condition Monitoring with IoT Enabled Intelligent Farming Solution," 2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 2023, pp. 1-6, doi: 10.1109/SCEECS57921.2023.10063050.

B. G. Sai Aswin, S. Vishnubala, D. Dhinakaran, N. J. Kumar, S. M. Udhaya Sankar and A. M. Mohamed Al Faisal, "A Research on Metaverse and its Application," 2023 World Conference on Communication & Computing (WCONF), RAIPUR, India, 2023, pp. 1-6, doi: 10.1109/WCONF58270.2023.10235216

Y. Wang, A. Zhang, P. Zhang, and H. Wang, “Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain,” IEEE Access, vol. 7, pp. 136704–136719, 2019.

L. Hou, X. Xu, K. Zheng, and X. Wang, “An intelligent transaction migration scheme for RAFT-based private blockchain in Internet of things applications, ” IEEE Communications Letters, vol. 25, no. 8, pp. 2753–2757, 2021

Downloads

Published

25.12.2023

How to Cite

Dhinakaran, D. ., Selvaraj, D. ., Dharini , N. ., Raja, S. E. ., & Priya, C. S. L. . (2023). Towards a Novel Privacy-Preserving Distributed Multiparty Data Outsourcing Scheme for Cloud Computing with Quantum Key Distribution. International Journal of Intelligent Systems and Applications in Engineering, 12(2), 286–300. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4252

Issue

Section

Research Article