Вы находитесь на странице: 1из 12

Enhancing Data & Privacy Security

in Mobile Cloud Computing


through Quantum Cryptography
Presented By:
Asadullah Khan
Hardeep Kumar
Fahadullah Shaikh
Overview
• Presented a security model for mobile cloud computing using Quantum
Cryptography
• What is Cloud Computing & Mobile Cloud Computing?
• Why Quantum Cryptography?
• Quantum cryptography is the only known method for transmitting a secret key over
a distance that is secure in principle and based on the laws of physics
• Current methods for communicating secret keys are all based on unproven
mathematical assumptions.
• These same methods also are at risk of becoming cracked in the future,
compromising today's encrypted transmissions retroactively. This matters very much
if you care about long-term security.
• How Quantum Cryptography can be used
• Transform current network into quantum distribution network
• Transmit Quantum key using NFC technology
QCMC Model
• Presented relationship between Cloud, Trusted NFC Relay Node & Users’ Mobile.
• Security access phases:
1. Quantum Key Distribution
2. Key Transmission using NFC
3. Keys on mobile have been used for authentication & encryption
• Multiplexing & QKD Link between cloud and NFC
• Keys are distributed to NFC from cloud through
QKD network
• User’s identity and protocol authentication.
• Inject key into mobile through NFC
• Mobile needs to be placed on TNRN for
• few minutes
• These keys will be used to access data on cloud.
Network Transformation
• Used DWDM Multiplexing Technology
• Multiplexing is combining multiple signals like analogue as well as digital into
one signal over a channel
• Dense Wavelength division multiplexing
• It is an optical multiplexing technology used to increase bandwidth over existing fiber
networks.
• DWDM works by combining and transmitting multiple signals simultaneously at different
wavelengths on the same fiber.
• The technology creates multiple virtual fibers, thus multiplying the capacity of the
physical medium.
• DWDM provides the ultimate scalability and reach for fiber networks
Network Transformation
• DWDM is used to transform classical network into quantum distribution
network
• Added assembly module of BIDI (Single fiber bi-directional) SFP on switch
• Two Optical Fiber Connected between cloud and NFC
1. For DWDM Link
2. For QKD Link to distinguish quantum keys
• Near Field Communication (NFC)
• Wireless Connectivity Standard
• Uses Magnetic field induction
• Developed by Sony & Philips
• Establish peer 2 peer network to exchange data
• Works in few inches between devices
• Used for payment, ticketing
QKD Protocol
• BB84 Protocol is adopted for key transmission between cloud and NFC
• By Charles Bennet & Gilles Brassard in 1984
• It is first quantum cryptography protocol
• It is provably secure QKD protocol
• It adopted the polarization property of photon
• Alice prepares key and randomly select a basis to prepare quantum states.
• Bob also prepare quantum states without knowing the basis of Alice.
• Alice send bases sequence she used, Bob checks and keeps the results of
same bases.
• After post processing distribution of key is completed.
• Eavesdropping can be found easily because eavesdropping will damage
quantum states.
QKD Protocol
Key Transmission

qk, qx = secret keys


H = hash function
∆tmax = time for allowed round trip
Na, Nb = random numbers
m = message
Data Accessing
• Data stored on cloud is encrypted by quantum cryptography.
• Cloud can not decrypt mobile user’s data
• Data can only be accessed by using hash value of mobile user’s ID

Pair Hand Authentication


• Presented in research paper “Big Data Security Issues Based on Quantum Cryptography and
Privacy with Authentication for Mobile Data Center” by V. Thayananthan and A. Albeshri
• Pair hand authentication is adopted between cloud and mobile user
• Time based quantum key token method is used to further enhance authentication
process security
Experiments & Results
Three trusted areas has been setup with distance 5, 10
and 15km respectively

Each TNRN can generate keys for 10 users at a time


Experiments proved that this model can be effectively
applied
References
• https://www.ibm.com/cloud/learn/what-is-mobile-cloud-computing
• https://www.elprocus.com/what-is-multiplexing-types-and-their-applications/
• https://www.techrepublic.com/blog/it-security/how-quantum-cryptography-works-and-by-the-way-its-breakable/
• https://en.wikipedia.org/wiki/Distance-bounding_protocol
• https://www.adva.com/en/products/technology/dwdm
• https://searchnetworking.techtarget.com/answer/What-is-the-advantage-of-SFP-ports-on-a-Gigabit-switch

Вам также может понравиться