Cloud Data Security through Post Quantum Cryptography: An Integrated Framework

Authors

  • Shaik Mohammad Ilias, V. Sathya Durga, V. Ceronmani Sharmila

Keywords:

Post quantum cryptography, security, encryption, decryption, key exchange, ECDH, SIDH

Abstract

Quantum key cryptography is the cryptography that has capability to overcome the threat of quantum computing in future when exploited by adversaries. With quantum computers in the hands of adversaries in future, the existing security schemes might be broken due to massive computing power. As security is not one-time effort, it is a continuous process that needs development of stronger security schemes. Existing PQC schemes focused on either data security or key exchange. Besides, there is need for further improvement towards enhanced PQC primitives. In this paper, we proposed an integrated cloud data security framework with novel schemes towards PQC. For data security with encryption and decryption, we proposed Hybrid Encoding and Data Transformation (HEDT) algorithm. Another key exchange security scheme called Elliptic Curve Super singular Isogeny Diffie–Hellman (ECSIDH) was developed. The key agreement scheme consists of Elliptic-Curve Diffie–Hellman (ECDH) and Super singular Isogeny Diffie–Hellman (SIDH). ECDH combined with SIDH candidate in PQC which enhances the security of the proposed scheme since they strengthen the ECDH with PQC candidate SIDH. The ECSIDH is found more secure than individual key exchange scheme such as SIDH. Security analysis of HEDT revealed that it is more secure than existing algorithms and ECSIDH is more secure PQC candidate.

Downloads

Download data is not yet available.

References

Lee, Bih-Hwang; Dewi, Ervin Kusuma; Wajdi, Muhammad Farid (2018). 2018 27th Wireless and Optical Communication Conference (WOCC) - Data security in cloud computing using AES under HEROKU cloud. , p1–5.DOI:10.1109/WOCC.2018.8372705

Yu, Liting; Zhang, Dongrong; Wu, Liang; Xie, Shuguo; Su, Donglin; Wang, Xiaoxiao (2018). 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) - AES Design Improvements Towards Information Security Considering Scan Attack. , p322–326.

DOI: 10.1109/TrustCom/BigDataSE43156.2018

Chinnasamy, P.; Deepalakshmi, P. (2018). 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) - Design of Secure Storage for Health-care Cloud using Hybrid Cryptography. , p1717–1720.DOI: 10.1109/ICICCT.2018.8473107

Qian, Quan; Yu, Zhi-ting; Zhang, Rui; Hung, Che-Lun (2018). A multi-layer information dispersal based encryption algorithm and its application for access control. Sustainable Computing: Informatics and Systems, p1-12.https://doi.org/10.1016/j.suscom.2018.06.001

Botacin, M., Galhardo Moia, V. H., Ceschin, F., Amaral Henriques, M. A., & Grégio, A. (2021). Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios. Forensic Science International: Digital Investigation, 38, 301220, p1-19.https://doi.org/10.1016/j.fsidi.2021.301220

Marcelin-Jimenez, Ricardo; Ramirez-Ortiz, Jorge Luis; De La Colina, Enrique Rodriguez; Pascoe-Chalke, Michael; Gonzalez-Compean, Jose Luis (2020). On the Complexity and Performance of the Information Dispersal Algorithm. IEEE Access, 8, p159284–159290.DOI: 10.1109/ACCESS.2020.3020501

Fathurrahmad, Ester. (2020). Development And Implementation Of The Rijndael Algorithm And Base-64 Advanced Encryption Standard (AES) For Website Data Security. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH. 9 (11), p6-9.DOI: 10.23919/FRUCT.2019.8711955

Kumar, Keshav; Ramkumar, K.R.; Kaur, Amanpreet (2020). IEEE 2020 8th International Conference on Reliability, Infocom Technologies and Optimization. A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm on FPGA. , p182–185.DOI: 10.1109/ICRITO48877.2020.9198033

Feng, Ruijue; Wang, Zhidong; Li, Zhifeng; Ma, Haixia; Chen, Ruiyuan; Pu, Zhengbin; Chen, Ziqiu; Zeng, Xianyu (2020). A Hybrid Cryptography Scheme for NILM Data Security. Electronics, 9(7), p1-18.; https://doi.org/10.3390/electronics9071128

Wijayanto, Ardhi; Harjito, Bambang (2019). 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA) - Reduce Rounding Off Errors in Information Dispersal Algorithm. , p36–40.

Borges, F., Reis, P. R., & Pereira, D. (2020). A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography. IEEE Access, 8, p142413–142422.DOI: 10.1109/ACCESS.2020.3013250

Moghadam, M. farhadi, Nikooghadam, M., Jabban, M. A. B. A., Alishahi, M., Mortazavi, L., & Mohajerzadeh, A. (2020). An efficient authentication and key agreement scheme based on ECDH for wireless sensor network. IEEE Access, 8, p73182–73192.DOI: 10.1109/ACCESS.2020.2987764

Shaikh, J. R., Nenova, M., Iliev, G., & Valkova-Jarvis, Z. (2017). Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained E-commerce applications. 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS). p1-4.DOI: 10.1109/COMCAS.2017.8244805

Cai, J., Huang, X., Zhang, J., Zhao, J., Lei, Y., Liu, D., & Ma, X. (2018). A Handshake Protocol With Unbalanced Cost for Wireless Updating. IEEE Access, 6, p18570–18581.DOI: 10.1109/ACCESS.2018.2820086

Swapna, A. I., & Islam, N. (2017). Security analysis of IEEE 802.21 standard in software defined wireless networking. 2017 20th International Conference of Computer and Information Technology (ICCIT). p1-5.DOI: 10.1109/ICCITECHN.2017.8281843

Ghribi, E., Khoei, T. T., Gorji, H. T., Ranganathan, P., & Kaabouch, N. (2020). A Secure Blockchain-based Communication Approach for UAV Networks. 2020 IEEE International Conference on Electro Information Technology (EIT). p411-415DOI: 10.1109/EIT48999.2020.9208314

Li, Y., Zhang, Z., Wang, X., Lu, E., Zhang, D., & Zhang, L. (2019). A Secure Sign-On Protocol for Smart Homes over Named Data Networking. IEEE Communications Magazine, 57(7), p62–68.DOI: 10.1109/MCOM.2019.1800789

Zhang, J., Zhang, F., Huang, X., & Liu, X. (2020). Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence. IEEE Transactions on Dependable and Secure Computing, p1–13.DOI: 10.1109/TDSC.2020.2967703

Wang, J., Han, K., Alexandridis, A., Zilic, Z., Pang, Y., & Lin, J. (2018). An ASIC Implementation of Security Scheme for Body Area Networks. 2018 IEEE International Symposium on Circuits and Systems (ISCAS). p1-5.DOI: 10.1109/ISCAS.2018.8351098

Srinivas, J., Mishra, D., Mukhopadhyay, S., & Kumari, S. (2017). Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 9(4), p875–895.DOI: 10.1109/ICCITECHN.2017.8281843

Zhang, Y., Weng, J., Ling, Z., Pearson, B., & Fu, X. (2020). BLESS: A BLE Application Security Scanning Framework. IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. p636-645.DOI: 10.1109/INFOCOM41043.2020.9155473

Zhang, J., Rajendran, S., Sun, Z., Woods, R., & Hanzo, L. (2019). Physical Layer Security for the Internet of Things: Authentication and Key Generation. IEEE Wireless Communications, p1–7.DOI: 10.1109/MWC.2019.1800455

Koziel, B., Azarderakhsh, R., Mozaffari Kermani, M., & Jao, D. (2017). Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves. IEEE Transactions on Circuits and Systems I: Regular Papers, 64(1), p86–99.DOI: 10.1109/TCSI.2016.2611561

Weiqiang Liu, Jian Ni, Zhe Liu, Chunyang Liu and Maire O’Neill. (2019). Optimized Modular Multiplication for Supersingular Isogeny Diffie-Hellman. IEEE, P1-8.DOI: 10.1109/TC.2019.2899847

Joppe W. Bos and Simon J. Friedberger. (2018). Arithmetic Considerations for Isogeny-Based Cryptography. IEEE, P1-12.DOI: 10.1109/TC.2018.2851238

Craig Costello, Patrick Longa and Michael Naehrig. (2016). Efficient algorithms for supersingular isogeny Diffie-Hellman, https://doi.org/10.1007/978-3-662-53018-4_21P1-34.

Downloads

Published

26.03.2024

How to Cite

Shaik Mohammad Ilias. (2024). Cloud Data Security through Post Quantum Cryptography: An Integrated Framework. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 4028 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6199

Issue

Section

Research Article