through Quantum Cryptography Presented By: Asadullah Khan Hardeep Kumar Fahadullah Shaikh Overview • Presented a security model for mobile cloud computing using Quantum Cryptography • What is Cloud Computing & Mobile Cloud Computing? • Why Quantum Cryptography? • Quantum cryptography is the only known method for transmitting a secret key over a distance that is secure in principle and based on the laws of physics • Current methods for communicating secret keys are all based on unproven mathematical assumptions. • These same methods also are at risk of becoming cracked in the future, compromising today's encrypted transmissions retroactively. This matters very much if you care about long-term security. • How Quantum Cryptography can be used • Transform current network into quantum distribution network • Transmit Quantum key using NFC technology QCMC Model • Presented relationship between Cloud, Trusted NFC Relay Node & Users’ Mobile. • Security access phases: 1. Quantum Key Distribution 2. Key Transmission using NFC 3. Keys on mobile have been used for authentication & encryption • Multiplexing & QKD Link between cloud and NFC • Keys are distributed to NFC from cloud through QKD network • User’s identity and protocol authentication. • Inject key into mobile through NFC • Mobile needs to be placed on TNRN for • few minutes • These keys will be used to access data on cloud. Network Transformation • Used DWDM Multiplexing Technology • Multiplexing is combining multiple signals like analogue as well as digital into one signal over a channel • Dense Wavelength division multiplexing • It is an optical multiplexing technology used to increase bandwidth over existing fiber networks. • DWDM works by combining and transmitting multiple signals simultaneously at different wavelengths on the same fiber. • The technology creates multiple virtual fibers, thus multiplying the capacity of the physical medium. • DWDM provides the ultimate scalability and reach for fiber networks Network Transformation • DWDM is used to transform classical network into quantum distribution network • Added assembly module of BIDI (Single fiber bi-directional) SFP on switch • Two Optical Fiber Connected between cloud and NFC 1. For DWDM Link 2. For QKD Link to distinguish quantum keys • Near Field Communication (NFC) • Wireless Connectivity Standard • Uses Magnetic field induction • Developed by Sony & Philips • Establish peer 2 peer network to exchange data • Works in few inches between devices • Used for payment, ticketing QKD Protocol • BB84 Protocol is adopted for key transmission between cloud and NFC • By Charles Bennet & Gilles Brassard in 1984 • It is first quantum cryptography protocol • It is provably secure QKD protocol • It adopted the polarization property of photon • Alice prepares key and randomly select a basis to prepare quantum states. • Bob also prepare quantum states without knowing the basis of Alice. • Alice send bases sequence she used, Bob checks and keeps the results of same bases. • After post processing distribution of key is completed. • Eavesdropping can be found easily because eavesdropping will damage quantum states. QKD Protocol Key Transmission
qk, qx = secret keys
H = hash function ∆tmax = time for allowed round trip Na, Nb = random numbers m = message Data Accessing • Data stored on cloud is encrypted by quantum cryptography. • Cloud can not decrypt mobile user’s data • Data can only be accessed by using hash value of mobile user’s ID
Pair Hand Authentication
• Presented in research paper “Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center” by V. Thayananthan and A. Albeshri • Pair hand authentication is adopted between cloud and mobile user • Time based quantum key token method is used to further enhance authentication process security Experiments & Results Three trusted areas has been setup with distance 5, 10 and 15km respectively
Each TNRN can generate keys for 10 users at a time
Experiments proved that this model can be effectively applied References • https://www.ibm.com/cloud/learn/what-is-mobile-cloud-computing • https://www.elprocus.com/what-is-multiplexing-types-and-their-applications/ • https://www.techrepublic.com/blog/it-security/how-quantum-cryptography-works-and-by-the-way-its-breakable/ • https://en.wikipedia.org/wiki/Distance-bounding_protocol • https://www.adva.com/en/products/technology/dwdm • https://searchnetworking.techtarget.com/answer/What-is-the-advantage-of-SFP-ports-on-a-Gigabit-switch