Abstract
Secured transmission between users is essential for communication system models. Recently, cryptographic schemes were introduced for secured transmission and secret transmission between cloud users. In a cloud environment, there are many security issues that occur among the cloud users such as, account hacking, data breaches, broken authentication, compromised credentials, and so on. Quantum mechanics has been implemented in cryptography that made it efficient for strong security concerns over outsourced data in a cloud environment. Therefore, the present research focuses on providing excellent security for cloud users utilizing a swift key generation model for QKD cryptography. The Quantum Key Distribution (QKD) is an entirely secure scheme known as Cloud QKDP. Initially, a random bit sequence is generated to synchronize the channel. An eavesdropper will not permit to synchronize parameters between them. In this key reconciliation technique, the random bit sequence is concatenated with the photon polarisation state. BB84 protocol is improved by optimizing its bit size using FireFly Optimization (FFO) at the compatibility state, and in the next state, both transmitter and receiver generate a raw key. Once the key is generated, it is then used for the transmission of messages between cloud users. Furthermore, a Python environment is utilized to execute the proposed architecture, and the accuracy rate of the proposed model attained 98 %, and the error rate is 2 %. This proves the performance of the proposed firefly optimization algorithm based swift key generation model for QKD performs better than previous algorithms.
Highlights
A major problem that is involved here is the factorization of Prime numbers, and researchers work on it to develop a solution for this issue in less exponential time [1]
If the message data get leaked to eavesdroppers, it might decrease key capacity and fails to provide a legitimate communication channel to users. He et al [22] have presented an in-depth security protocol of Elliptic Curve Cryptography (ECC) based Radio-Frequency Identification (RFID) schemes that predicted some of the security requirements that satisfied authentication schemes
A higher value of error in CH-Quantum Key Distribution (QKD) is due to its chaotic channel synchronization techniques that failed to minimize the error between information transferred
Summary
Communication, the ability to interact in a secure manner, is an essential feature of humanity. Quantum computers are used for solving this issue in polynomial time and made it feasible that encryption depends on hardware difficulty of mathematical tasks [2] This resulted in turning the focus over physical laws to encode the messages, and a foundation type of key distribution algorithm has been developed previously. This will include the analysis of state preparation uncertainties, which will result in additional errors These drawbacks in the QKD scheme motivated to design an optimal solution to measure the error between a sender and receiver, enhancing the channel efficiency for secured communication. — To achieve improved key generation and distribution techniques for cloud users, a QKD protocol with its quantum mechanism is developed. The main contributes of the proposed model are given below. — To attain secure data transmission in cloud computing, an effective optimal swift key generation technique is introduced. — To achieve improved key generation and distribution techniques for cloud users, a QKD protocol with its quantum mechanism is developed. — To attain a fast key generation, the model utilizes Firefly Optimization Algorithm (FOA) optimization. — For selecting the appropriate block size, an optimization scheme of Frequency Fitness Assignment (FFA) is implemented in this model to make it useful for obtaining the best key pair. — To verify and evaluate the proposed model, the simulation is accompanied to prove the proposed model
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Scientific and Technical Journal of Information Technologies, Mechanics and Optics
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.