fbpx

Quantum-Resistant Encryption for Securing Cloud Storage

By harish hv on 19th January 2024

Problem Statement

With the advent of quantum computing, traditional encryption methods may become vulnerable. This project aims to develop quantum-resistant encryption techniques specifically designed for securing data stored in the cloud. The goal is to ensure the continued confidentiality and integrity of sensitive information in the face of emerging quantum threats.

Abstract

The project focuses on addressing the security concerns associated with traditional encryption algorithms in the context of cloud storage. By leveraging post-quantum cryptography, the system will implement robust encryption methods that withstand quantum attacks. This ensures that data stored in the cloud remains secure even in the presence of powerful quantum computers.

Outcome

Implementation of quantum-resistant encryption algorithms for cloud storage. Enhanced security measures against potential quantum attacks. Continued confidentiality and integrity of data stored in the cloud.

Reference

With the rapid development of the computing paradigm, cloud computing becomes the most notable one that offers convenient and on-demand services from a shared pool of configurable computing resources. However, the application of quantum computers in clouds would be realized from the recent breakthrough results of quantum computers. In the near future, existing conventional hardness-based authentication schemes will be confronted with quantum attackers. Lattice-based authentication scheme resolves this tension. Albeit, existing lattice-based schemes, users and cloud servers are always worried about the communication privacy against misbehaved private key generator referred to as mPKG since PKG potentially has the power to generate the secret key for any given identity. In this paper, we proposed a secure authentication scheme for cloud storage that thwarts the misbehaved PKG. We integrate the identity-based encryption (IBE) scheme with the lattice-based signature, which is the variant of existing IBE-based authentication schemes and post-quantum secure. Additionally, we integrate identity certifying authority (ICA) with PKG to ensure security against misbehaved PKG. Our comprehensive security proof demonstrates that the proposed scheme provides stronger security guarantees against misbehaved PKG and ICA.

  1. M. J. Hossain, C. Xu, C. Li, S.M. H. Mahmud, X. Zhang and W. Li, “ICAS: Two-factor identity-concealed authentication scheme for remote-servers”, J. Syst. Archit., pp. 102077:1-102077:18, 2021.
  2. Y. Zhang, C. Xu, C. Nan, H. Li, H. Yang and X. Shen, “Chronos+: An Accurate Blockchain-based Time-stamping Scheme for Cloud Storage”, IEEE Trans Services Comput., vol. 13, no. 2, pp. 216229, 2019.
  3. D. Dharminder and K. Chandran, “LWESM: Learning with Error Based Secure Communication in Mobile Devices using Fuzzy Extractor”, J. Ambient Intell. Humaniz. Comput., vol. 11, pp. 4089-4100, 2020.
  4. Y. Zhang, C. Xu, J. Ni, H. Li and X. Shen, “Blockchain-Assisted Public-key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage”, IEEE Trans Cloud Comput., pp. 114, 2019.
  5. P. W. Shor, “Polynomial-Time Algorithms for Prime Factorization and Discrete logarithms on a Quantum Computer”, SIAM Review, vol. 41, no. 2, pp. 303332, 1999.

    https://ieeexplore.ieee.org/document/9449136/references#references