Cloud Data Security through Post Quantum Cryptography: An Integrated Framework
Keywords:
Post quantum cryptography, security, encryption, decryption, key exchange, ECDH, SIDHAbstract
Quantum key cryptography is the cryptography that has capability to overcome the threat of quantum computing in future when exploited by adversaries. With quantum computers in the hands of adversaries in future, the existing security schemes might be broken due to massive computing power. As security is not one-time effort, it is a continuous process that needs development of stronger security schemes. Existing PQC schemes focused on either data security or key exchange. Besides, there is need for further improvement towards enhanced PQC primitives. In this paper, we proposed an integrated cloud data security framework with novel schemes towards PQC. For data security with encryption and decryption, we proposed Hybrid Encoding and Data Transformation (HEDT) algorithm. Another key exchange security scheme called Elliptic Curve Super singular Isogeny Diffie–Hellman (ECSIDH) was developed. The key agreement scheme consists of Elliptic-Curve Diffie–Hellman (ECDH) and Super singular Isogeny Diffie–Hellman (SIDH). ECDH combined with SIDH candidate in PQC which enhances the security of the proposed scheme since they strengthen the ECDH with PQC candidate SIDH. The ECSIDH is found more secure than individual key exchange scheme such as SIDH. Security analysis of HEDT revealed that it is more secure than existing algorithms and ECSIDH is more secure PQC candidate.
Downloads
References
Lee, Bih-Hwang; Dewi, Ervin Kusuma; Wajdi, Muhammad Farid (2018). 2018 27th Wireless and Optical Communication Conference (WOCC) - Data security in cloud computing using AES under HEROKU cloud. , p1–5.DOI:10.1109/WOCC.2018.8372705
Yu, Liting; Zhang, Dongrong; Wu, Liang; Xie, Shuguo; Su, Donglin; Wang, Xiaoxiao (2018). 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) - AES Design Improvements Towards Information Security Considering Scan Attack. , p322–326.
DOI: 10.1109/TrustCom/BigDataSE43156.2018
Chinnasamy, P.; Deepalakshmi, P. (2018). 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) - Design of Secure Storage for Health-care Cloud using Hybrid Cryptography. , p1717–1720.DOI: 10.1109/ICICCT.2018.8473107
Qian, Quan; Yu, Zhi-ting; Zhang, Rui; Hung, Che-Lun (2018). A multi-layer information dispersal based encryption algorithm and its application for access control. Sustainable Computing: Informatics and Systems, p1-12.https://doi.org/10.1016/j.suscom.2018.06.001
Botacin, M., Galhardo Moia, V. H., Ceschin, F., Amaral Henriques, M. A., & Grégio, A. (2021). Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios. Forensic Science International: Digital Investigation, 38, 301220, p1-19.https://doi.org/10.1016/j.fsidi.2021.301220
Marcelin-Jimenez, Ricardo; Ramirez-Ortiz, Jorge Luis; De La Colina, Enrique Rodriguez; Pascoe-Chalke, Michael; Gonzalez-Compean, Jose Luis (2020). On the Complexity and Performance of the Information Dispersal Algorithm. IEEE Access, 8, p159284–159290.DOI: 10.1109/ACCESS.2020.3020501
Fathurrahmad, Ester. (2020). Development And Implementation Of The Rijndael Algorithm And Base-64 Advanced Encryption Standard (AES) For Website Data Security. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH. 9 (11), p6-9.DOI: 10.23919/FRUCT.2019.8711955
Kumar, Keshav; Ramkumar, K.R.; Kaur, Amanpreet (2020). IEEE 2020 8th International Conference on Reliability, Infocom Technologies and Optimization. A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm on FPGA. , p182–185.DOI: 10.1109/ICRITO48877.2020.9198033
Feng, Ruijue; Wang, Zhidong; Li, Zhifeng; Ma, Haixia; Chen, Ruiyuan; Pu, Zhengbin; Chen, Ziqiu; Zeng, Xianyu (2020). A Hybrid Cryptography Scheme for NILM Data Security. Electronics, 9(7), p1-18.; https://doi.org/10.3390/electronics9071128
Wijayanto, Ardhi; Harjito, Bambang (2019). 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA) - Reduce Rounding Off Errors in Information Dispersal Algorithm. , p36–40.
Borges, F., Reis, P. R., & Pereira, D. (2020). A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography. IEEE Access, 8, p142413–142422.DOI: 10.1109/ACCESS.2020.3013250
Moghadam, M. farhadi, Nikooghadam, M., Jabban, M. A. B. A., Alishahi, M., Mortazavi, L., & Mohajerzadeh, A. (2020). An efficient authentication and key agreement scheme based on ECDH for wireless sensor network. IEEE Access, 8, p73182–73192.DOI: 10.1109/ACCESS.2020.2987764
Shaikh, J. R., Nenova, M., Iliev, G., & Valkova-Jarvis, Z. (2017). Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained E-commerce applications. 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS). p1-4.DOI: 10.1109/COMCAS.2017.8244805
Cai, J., Huang, X., Zhang, J., Zhao, J., Lei, Y., Liu, D., & Ma, X. (2018). A Handshake Protocol With Unbalanced Cost for Wireless Updating. IEEE Access, 6, p18570–18581.DOI: 10.1109/ACCESS.2018.2820086
Swapna, A. I., & Islam, N. (2017). Security analysis of IEEE 802.21 standard in software defined wireless networking. 2017 20th International Conference of Computer and Information Technology (ICCIT). p1-5.DOI: 10.1109/ICCITECHN.2017.8281843
Ghribi, E., Khoei, T. T., Gorji, H. T., Ranganathan, P., & Kaabouch, N. (2020). A Secure Blockchain-based Communication Approach for UAV Networks. 2020 IEEE International Conference on Electro Information Technology (EIT). p411-415DOI: 10.1109/EIT48999.2020.9208314
Li, Y., Zhang, Z., Wang, X., Lu, E., Zhang, D., & Zhang, L. (2019). A Secure Sign-On Protocol for Smart Homes over Named Data Networking. IEEE Communications Magazine, 57(7), p62–68.DOI: 10.1109/MCOM.2019.1800789
Zhang, J., Zhang, F., Huang, X., & Liu, X. (2020). Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence. IEEE Transactions on Dependable and Secure Computing, p1–13.DOI: 10.1109/TDSC.2020.2967703
Wang, J., Han, K., Alexandridis, A., Zilic, Z., Pang, Y., & Lin, J. (2018). An ASIC Implementation of Security Scheme for Body Area Networks. 2018 IEEE International Symposium on Circuits and Systems (ISCAS). p1-5.DOI: 10.1109/ISCAS.2018.8351098
Srinivas, J., Mishra, D., Mukhopadhyay, S., & Kumari, S. (2017). Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 9(4), p875–895.DOI: 10.1109/ICCITECHN.2017.8281843
Zhang, Y., Weng, J., Ling, Z., Pearson, B., & Fu, X. (2020). BLESS: A BLE Application Security Scanning Framework. IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. p636-645.DOI: 10.1109/INFOCOM41043.2020.9155473
Zhang, J., Rajendran, S., Sun, Z., Woods, R., & Hanzo, L. (2019). Physical Layer Security for the Internet of Things: Authentication and Key Generation. IEEE Wireless Communications, p1–7.DOI: 10.1109/MWC.2019.1800455
Koziel, B., Azarderakhsh, R., Mozaffari Kermani, M., & Jao, D. (2017). Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves. IEEE Transactions on Circuits and Systems I: Regular Papers, 64(1), p86–99.DOI: 10.1109/TCSI.2016.2611561
Weiqiang Liu, Jian Ni, Zhe Liu, Chunyang Liu and Maire O’Neill. (2019). Optimized Modular Multiplication for Supersingular Isogeny Diffie-Hellman. IEEE, P1-8.DOI: 10.1109/TC.2019.2899847
Joppe W. Bos and Simon J. Friedberger. (2018). Arithmetic Considerations for Isogeny-Based Cryptography. IEEE, P1-12.DOI: 10.1109/TC.2018.2851238
Craig Costello, Patrick Longa and Michael Naehrig. (2016). Efficient algorithms for supersingular isogeny Diffie-Hellman, https://doi.org/10.1007/978-3-662-53018-4_21P1-34.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.