Abstract

Secured transmission between users is essential for communication system models. Recently, cryptographic schemes were introduced for secured transmission and secret transmission between cloud users. In a cloud environment, there are many security issues that occur among the cloud users such as, account hacking, data breaches, broken authentication, compromised credentials, and so on. Quantum mechanics has been implemented in cryptography that made it efficient for strong security concerns over outsourced data in a cloud environment. Therefore, the present research focuses on providing excellent security for cloud users utilizing a swift key generation model for QKD cryptography. The Quantum Key Distribution (QKD) is an entirely secure scheme known as Cloud QKDP. Initially, a random bit sequence is generated to synchronize the channel. An eavesdropper will not permit to synchronize parameters between them. In this key reconciliation technique, the random bit sequence is concatenated with the photon polarisation state. BB84 protocol is improved by optimizing its bit size using FireFly Optimization (FFO) at the compatibility state, and in the next state, both transmitter and receiver generate a raw key. Once the key is generated, it is then used for the transmission of messages between cloud users. Furthermore, a Python environment is utilized to execute the proposed architecture, and the accuracy rate of the proposed model attained 98 %, and the error rate is 2 %. This proves the performance of the proposed firefly optimization algorithm based swift key generation model for QKD performs better than previous algorithms.

Highlights

  • A major problem that is involved here is the factorization of Prime numbers, and researchers work on it to develop a solution for this issue in less exponential time [1]

  • If the message data get leaked to eavesdroppers, it might decrease key capacity and fails to provide a legitimate communication channel to users. He et al [22] have presented an in-depth security protocol of Elliptic Curve Cryptography (ECC) based Radio-Frequency Identification (RFID) schemes that predicted some of the security requirements that satisfied authentication schemes

  • A higher value of error in CH-Quantum Key Distribution (QKD) is due to its chaotic channel synchronization techniques that failed to minimize the error between information transferred

Read more

Summary

Introduction

Communication, the ability to interact in a secure manner, is an essential feature of humanity. Quantum computers are used for solving this issue in polynomial time and made it feasible that encryption depends on hardware difficulty of mathematical tasks [2] This resulted in turning the focus over physical laws to encode the messages, and a foundation type of key distribution algorithm has been developed previously. This will include the analysis of state preparation uncertainties, which will result in additional errors These drawbacks in the QKD scheme motivated to design an optimal solution to measure the error between a sender and receiver, enhancing the channel efficiency for secured communication. — To achieve improved key generation and distribution techniques for cloud users, a QKD protocol with its quantum mechanism is developed. The main contributes of the proposed model are given below. — To attain secure data transmission in cloud computing, an effective optimal swift key generation technique is introduced. — To achieve improved key generation and distribution techniques for cloud users, a QKD protocol with its quantum mechanism is developed. — To attain a fast key generation, the model utilizes Firefly Optimization Algorithm (FOA) optimization. — For selecting the appropriate block size, an optimization scheme of Frequency Fitness Assignment (FFA) is implemented in this model to make it useful for obtaining the best key pair. — To verify and evaluate the proposed model, the simulation is accompanied to prove the proposed model

Literature review
Objective function
Firefly algorithm
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call