Post-quantum cryptography-driven security framework for cloud computing
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Open Computer Science 2022; 12: 142–153 Research Article Henry Chima Ukwuoma*, Gabriel Arome, Aderonke Thompson, and Boniface Kayode Alese Post-quantum cryptography-driven security framework for cloud computing https://doi.org/10.1515/comp-2022-0235 to safeguard data against attackers/hackers [1]. Usually, data received May 20, 2021; accepted February 17, 2022 exchange is carried out in mediums that are not secure Abstract: Data security in the cloud has been a major issue enough, which gives room for the interception of data by since the inception and adoption of cloud computing. Various intruders [2–4]. According to ref. [4], cloud computing pro- frameworks have been proposed, and yet data breach pre- mises enhanced data security, reduced cost for services, vails. With encryption being the dominant method of cloud enhanced flexibility, and higher availability, but the knowl- data security, the advent of quantum computing implies an edge domain shows that frameworks for various data security urgent need to proffer a model that will provide adequate data models have been proffered for enhanced cloud data security security for both classical and quantum computing. Thus, using advanced encryption standard (AES), data encryption most cryptosystems will be rendered susceptible and obsolete, standard, RSA, and Elliptical Curve Cryptography (ECC), yet though some cryptosystems will stand the test of quantum data security issues still prevail. computing. The article proposes a model that comprises the Cryptosystems such as RSA and ECC based on fac- application of a variant of McEliece cryptosystem, which has toring problems and discrete logarithms, respectively, been tipped to replace Rivest–Shamir–Adleman (RSA) in the have sufficiently provided cloud data security for years quantum computing era to secure access control data and the over all forms of classical attacks. However, today’s data- application of a variant of N-th degree truncated polynomial driven society is gradually drifting from classical com- ring units (NTRU) cryptosystem to secure cloud user data. puting, where information is stored in 0s and 1s to quantum The simulation of the proposed McEliece algorithm computing, where information is stored in qubits. The showed that the algorithm has a better time complexity advent of quantum processors and hence quantum com- than the existing McEliece cryptosystem. Furthermore, puting, has revealed potential weakness in existing crypto- the novel tweaking of parameters S and P further improves systems, thus necessitating the urgent need to source for the security of the proposed algorithms. More so, the simu- alternatives that will ensure data protection. lation of the proposed NTRU algorithm revealed that the Frequently used Cryptosystems, for example RSA and existing NTRU cryptosystem had a superior time complexity ECC have sufficiently provided cloud data security for when juxtaposed with the proposed NTRU cryptosystem. years over all forms of classical attacks, yet the theft of data prevails. Hence, the urgent need to deploy quantum Keywords: Cryptography, Public-key cryptography, private safe cryptosystems that are both safe for data processing key cryptography, data security, quantum cryptography in the classical and quantum space. This article proposes a variant of the Code-based cryptosystems and Lattice-based cryptosystems. It seeks to develop a robust hybrid cloud data security framework 1 Introduction with a view to understudy the cryptosystems as mentioned earlier and the designing of a variant of McEliece cum NTRU With the emergence of cloud computing, the provision of cryptosystems, respectively, in a hybrid architecture. data security through encryption has been a major technique 1.1 The concept of post-quantum * Corresponding author: Henry Chima Ukwuoma, Department of cryptography Cyber Security, Federal University of Technology, Akure, Ondo State, Nigeria, e-mail: henro317@gmail.com Gabriel Arome, Aderonke Thompson, Boniface Kayode Alese: The dominance and recognition of the need for the use of Department of Cyber Security, Federal University of Technology, public, key cryptography such as RSA and ECC demanded Akure, Ondo State, Nigeria researchers to find a proficient way for unravelling the Open Access. © 2022 Henry Chima Ukwuoma et al., published by De Gruyter. This work is licensed under the Creative Commons Attribution 4.0 International License.
Post-quantum cryptography-driven security framework for cloud computing 143 factorisation problem and discrete logarithm problem. d) Hash-based cryptography: Is a cryptosystem that The unravelling of these hard-mathematical problems uses hash functions to guarantee the integrity of mes- will thus provide a breakaway for RSA and ECC security. sages. An example is the Merkle’s hash-tree public- While researchers have tried to solve the problems with key signature system. the use of classical computers, Peter Shor in 1994 used a quantum computer to develop and demonstrate an A group of international academics from the National algorithm for efficient factorisation [5]. It is pertinent Institute of Standards and Technology (NIST) carried out to note that with the advent of quantum computers, a research to find a solution to the imminent threat of the present security infrastructure cum cryptosystems, rendering the present cryptosystems obsolete on classical where users and internet users rely, will be rendered symmetric and asymmetric cryptosystems as regards the obsolete and irrelevant [6]. emerging quantum computation. Table 1 below presents Post-quantum cryptography is a branch of study their findings: whose sole aim is to update and provide security for the current cryptosystems with the presence of quantum Table 1: Cryptosystems under quantum computation computers [7]. Research in this branch of study entails studying cryptosystems that make use of the factorisation S no. Cryptosystems Current status problem and discrete logarithm problem, and remain secured 1. AES Large key sizes against the two problems even though the hacker/attacker is needed armed with quantum computing. However, the National Aca- 2. SHA-2 Larger output demies of Sciences, Engineering, and Medicines describes needed 3. SHA-3 Larger output quantum computing as the usage of the quantum phe- needed nomena (entanglement and superposition) to carry out com- 4. RSA Broken putation for solving computational problems such as the 5. Deffie–Hellman key exchange Broken integer factorisation of the RSA. 6. Elliptic curve cartography Broken 7. Buchmann–Williams key Broken exchange 8. Algebraically homomorphic Broken 1.2 Classes of quantum cryptography 9 McEliece Not broken yet 10. NTRU Not broken yet There are four major classes of quantum cryptographic algorithms that resist quantum attacks [8]. These are: Source [8]. a) Code-based cryptosystems: These categories of crypto- systems adopt the principle of extracting the initial It can be deduced from Table 1 that the dominant bits of data transmitted over a channel by encoding cryptosystems currently in use, which is RSA and ECC, the data in a specific structure, which may be recovered are not secure under quantum computing as they both to a certain number of errors during transmission. rely on hard mathematical problems. Quantum computa- Additional bits of data are added during the encoding tion has excellent speed ups, which can easily solve these of the data to be sent and then decrypted on reception hard-mathematical problems. AES cryptosystems are required if the specific information about the coding structure is to use larger key sizes. known. An example of the code-based cryptosystem is the McEliece cryptosystem. b) Lattice-based cryptosystems: Lattice-based crypto- systems are the foremost candidates for public-key 1.3 The security of cloud computing post-quantum cryptography [9]. They use multidi- mensional lattices on solving the hardness of certain According to the Organisation of NIST, cloud computing problems. An example of a lattice-based cryptosys- is described as a service model that enables immediate, tems is the NTRU cryptosystem. simple, and on-demand available network access to shared c) Multivariate public key cryptosystem: Shehata [6] computing resources such as servers, networks, data, appli- described multivariate cryptosystems as one that uses cations, and services [10]. random sets of quadratic equations, and the proces- There are four cloud computing models: hybrid, public, sing of the encryption or decryption uses these equa- private, and community clouds. Furthermore, the model tions at particular points. also depicts service delivery models, which include
144 Henry Chima Ukwuoma et al. Infrastructure-as-a-Service (IaaS), the Platform-as-a- also involves properly maintaining hardware, technical infra- Service (PaaS), and the Software-as-a-Service (SaaS) structure, and systems that hold and display the information. (Figure 1). Though it is expected that computing will serve as a utility such as telephone, gas, water, and electricity, it comes with a major challenge: data security problems. 2 Literature review Cloud user reception of cloud services can be hindered due to security and privacy issues. Information sourced Ref. [12], proffered a secure framework for a multi-user from the knowledge domain also reveals that cloud users and multi-owner cloud environment. The authors opined feel reluctant to fully adopt cloud services because of that security, integrity, and privacy of cloud data is the security and privacy issues. Ref. [11] describes data primary threat for cloud deployment in a multi-user/ security as a means of securing digital data against multi-tenant cloud environment. They further developed unauthorised users/actions. Data sharing is carried out an algorithm to address the security issues of the cloud in unsecured channels, which is susceptible to intercep- environment and proposed/applied a novel algorithm tion. This has led to cloud providers and clients resorting with the integration of Ciphertext Policy-Identity Attri- to various means of data protection techniques, one of bute-based Encryption and the RSA algorithm for securing such techniques is cryptography. the cloud. Their research was able to establish a frame- Additionally, data security encompasses three attributes: work where both the owners and users are provided with confidentiality, integrity, and authentication. Confidentiality the public and distinct secret keys that are generated by entails the protection of information and restricting it from the Automated Certificate Authority. The proposed frame- unauthorised access. This is achieved by the application of work was implemented through Java. The performance of cryptography. Integrity ensures that unauthorised persons the proposed framework was analysed using standard are not able to change or manipulate data intended for a metrices by comparing with the metrics output of Anand specific user and could be achieved by the use of crypto- and Perumal, 2019 and Xue and Ren, 2019. However, the graphy. It is pertinent to note that data has value only if it simulation of various data sizes revealed that the proposed is safe. Data which has been manipulated does not have any framework is more expedient and effective when com- value and may cause financial waste, for example, data pared with EECDH and I-CP-ABE algorithms. The study manipulation in which information about financial accounts also revealed that the proposed algorithm prevents man- is stored. Similarly, cryptography plays an important role in in-the-middle attack. The authors adopted and applied ensuring data integrity. Frequently used methods of data RSA cryptosystem to the model, however, the RSA crypto- integrity protection contain information about data changes sytem is not quantum safe. and hash checksums by which data integrity is verified. Ref. [13] posited that the provision of data confiden- Availability simply refers that information be made consis- tiality and integrity of user’s cloud data is subject to the tently/readily accessible for authorised parties. Availability provision of an effective security model that provides the mechanism that guarantees prevention of unauthorised access by third parties and a secured communication channel. The authors proposed a security framework that allows cloud users to handle the privacy and integ- rity of their data. The proposed model avails the user the opportunity to security, network usage, privacy, and data storage in the cloud without depending on the cloud pro- vider. The model grants access to authorised and authen- ticated users to the cloud data, which has been proposed to be encrypted using a variant of AES algorithm. The proposed model was simulated using CloudSim with iFogSim as simulators on Eclipse integrated development environment. Results of the simulation revealed that the proposed model reduces energy consumption, network usage, and delay. Hence, the proposed framework enhances security, minimises resource utilisation, and reduces delay Figure 1: Cloud computing model [31]. while utilising services of the cloud. The limitation of the
Post-quantum cryptography-driven security framework for cloud computing 145 Table 2: Reviewed literatures Methodology Remark [15] The McEliece cryptosystem was subjected to simulation in The private and public keys for the McEliece cryptosystem are various extension degrees. very large matrices and consumes time in classical processing [16] Simulated NTRU, RSA, and AES to ascertain the performance of NTRU offers better performance when compared to other the cryptosystem existing cryptosystems because the mechanism for encryption and decryption is simple [17] Used genetic algorithm to determine where data could be Consumes time in identifying the storage location of data stored and adopted the capability list. [18] Used tornado codes and AES cryptosystem for cloud data AES has a simple key management system and encryption security [19] Provided an overview of algorithms in lattice-based, super- Computationally expensive and hence impractical to apply singular elliptic curves, and code-based, and suggested adopting lattice-based algorithms [20] Proposed adopting an RSA cryptosystem that generates RSA cryptosystem will be broken by quantum computing primes in batches. [21] Applied binary method in Lattice multiplication to ECC ECC increases the size of encrypted data and is not cryptosystem quantum safe [22] Proposed hierarchical role for access control The proposed method cannot be applied to encrypted data [23] Applied RNS on NTRU Any slight modification on the parameters of the framework slows down its computation [24] Proposed a four-level data cloud security, adopting IP filtering IP cloning renders the model inefficient as the first level of security [25] The proposed framework adopted three cryptosystems namely ECC increases the size of the encrypted message. RSA is not the ECC for encryption, Dual-RSA algorithm for authentication, quantum-safe and MD5 for integrity check [26] Proposed a Lattice-based Identity Based Encryption scheme Keys are created and stored, which attracts hackers to attempt with specific parameters to hijack the system [27] Proposed the use of ECC to secure cloud applications ECC possesses the tendency of producing encrypted data with large sizes [28] Proposed the adoption of HDFS in cloud computing HDFS has very slow processing speed and does not support environment encryption at the data storage and network levels [29] Proposed using four prime numbers in the key generation RSA is not quantum safe of RSA study lies in the fact that the AES cryptosystem has key cost in cloud computing. They further stated that cloud distribution challenges. computing is less expensive and the blockchain technology Ref. [14] suggested that cryptography is the most is more expensive when applied with a chain of objects. well-known technique for data security in a cloud envir- More so, they opined that blockchain storage accounts onment. They further posited that cryptographic services are more secured, though security and privacy challenges in any cloud environment must accommodate authorisa- depended on the type of business. Also, they stated that tion, availability, confidentiality, integrity, and non-repudia- Blockchain technology can improve anonymity and security tion. They proposed the implementation of RSA, AES, and in a cloud environment and the major challenges include SHA256 in data security. The limitation of this mechanism is data integrity, data authentication, availability of data, loca- that it consumes a lot of time during execution. The long tion of data, data privacy, confidentiality, data storage, keys of RSA means that they incur high computational over- backup, and recovery. They concluded by positing that head and RSA cryptosystems are susceptible to quantum data integrity is affected because of inadequate encryption attacks. Furthermore, AES suffers from key exchange pro- and audit control, authentication, and authorisation. blem which is a limitation. Ref. [10] stated that in spite of research works carried Ref. [30] researched on privacy and security challenges out in the area of cloud computing, challenges have per- in a cloud environment in the context of a smart campus sisted in the section of load balancing in cloud-based security with 100 respondents. The authors postulated that applications directed to the IaaS cloud service model. Blockchain technology overcomes the major challenge of They postulated that IaaS model is technological driven
146 Henry Chima Ukwuoma et al. that manages backend servers and virtual machine. Further- the algorithms are subjected to simulation with standard more, they stated that cloud service providers should ensure performance metrics alongside ECC, RSA, AES, and the situations where clients are being overloaded/underloaded existing NTRU and McEliece algorithms using MATLAB. to forestall machine failure or higher execution time sug- The following subsections present the framework and the gesting task scheduling. The scholars proffered an LB algo- result of the simulation. rithm directed towards optimising resources and enhancing load balancing considering the quality of service (QoS) task parameters, priority of virtual machines, and resource allocation. Results from their experiment revealed that the 3.1 The proposed hybrid framework proposed LB algorithm had better execution time and make- span when juxtaposed with the Dynamic LBA algorithm. In the proposed system, as depicted in Figure 3, a block The rest of the literatures reviewed are presented on diagram of the proposed framework is shown. McEliece tabular form (Table 2). cryptosystem is used to encrypt/decrypt user credentials, Upon review of relevant literature as regard to data while the proposed NTRU is used to encrypt/decrypt security in cloud computing, it was discovered that most user data. access control (username and password) data and user The proposed framework for enhanced data security data were either secured using cryptosystems that will be is presented in Figures 2 and 3 depicts the processes in rendered obsolete with the advent of quantum computing the proposed framework. The cloud administrator creates or not secured enough in the classical computing era. users such that their user credentials are encrypted/ More so, most of the literature suggested the securing decrypted using the proposed McEliece cryptosystem. of both the user data and access control data using the Upon request to access the cloud, users provide their same algorithm. Finally, literature revealed that authors user credentials, which is subjected to authentication. It adopted a hybrid cryptographic approach in the safe- should be noted that the cloud administrator provides guarding of cloud data. users with their credentials. The proposed model also The following research gaps were identified based on includes the encryption and decryption of cloud data the review; using a variant of the NTRU cryptosystem. The sections Gap one: It can be deduced that most of the scholars/ below explain the details of each segment of the model. researchers neglect user authentication and how their data should be secured independently. Authentication and authorisation are key to any model proffered for cloud data security, since it decides who gets into a 3.2 Proposed user verification cloud system and what kind of data can be accessed. The adoption and application of authentication and The framework proposes the authorisation and authenti- authorisation on feature frameworks will go a long cation of cloud users using onetime password (OTP) authen- way in ensuring data security. Also, the independent tication and user credentials authentication. The figure encryption of access control data is also very important below depicts the processes involved in the authentication as most literature reviewed said little or nothing about and authorisation of cloud users (Figure 4). this approach. For the proposed data storage/retrieval, an authenti- Gap two: It was revealed that quantum-safe crypto- cated and authorised user accesses the data that have systems were rarely adopted or applied in securing both been stored in the cloud. Data is encrypted using a access control data and cloud user data. Literature review variant of the McEliece for user credentials and NTRU also revealed that most of the frameworks proposed by cryptosystems for user data and then stored/retrieved in authors are not/partially implemented or experimented on. the cloud. 3 Materials and method 3.3 Proposed McEliece cryptosystem The article proposes a framework for an enhanced cloud In a bid to increase the security of the McEliece crypto- data security. The proposed framework comprises a var- system, the key generation mechanism is strengthened, iant of the McEliece and NTRU algorithm. Subsequently, as shown below.
Post-quantum cryptography-driven security framework for cloud computing 147 Figure 2: Optimised framework for data security in the cloud. Figure 3: A block diagram of the proposed framework.
148 Henry Chima Ukwuoma et al. Figure 4: Proposed user verification. 3.3.1 Definition of variables matrix P, satisfying the following criteria; ST ≠ S, S−1 ≠ S and PT ≠ P. G: Goppa codes, m: message to be encrypted The sender processes the encryption and decryption S: non-singular matrix, P: permutation matrix keys by processing Pk: public key, Sk: private key, t: weight of the dis- G key = S T ⋅ G ⋅ P T, (1) torting matrix, Gkey: computed public key The following are the proposed modifications to the where T represents transpose. existing McEliece algorithm: The sender also sets the public key as: McEliece consists of three algorithms: key generation P k = (G key, t ) and private key as : Sk = (S T, G , P T) . algorithm, which produces a public and a private key, an encryption algorithm, and a decryption algorithm. 3.3.3 Encryption 3.3.2 Key generation The sender’s message (m) is encoded in binary form with Choose a binary Goppa code C, with parameters (n; k; and a length, k. The following is processed by the sender t). The generator matrix G(n × k) is obtained with a binary The sender processes: non-singular (k × k) matrix S and a permutation (n × n) CI = m × G key . (2)
Post-quantum cryptography-driven security framework for cloud computing 149 A random n-bit vector z, containing exactly t ones (a Algorithm 1: Proposed McEliece-key generation vector of length n and weight t), is generated by the sender and then the ciphertext is computed as: Input: parameters for key generation (S, P, G) C = CI + z. (3) Output: keys (G key , P k ) Begin i. Calculate the transpose of S and P 3.3.4 Decryption ii. Compute G key = S T ⋅ G ⋅ P T iii. P k = ( G key , t ) The receiver upon receiving the ciphertext computes the iv. Return (G key , P k ) inverse of PT i.e., (PT)−1 and computes: End d = C (P T)−1 . (4) The receiver finally uses the decoding algorithm for the In the above algorithm, the sender sets the public key code G to decode d to X and computes: as P k = (G key , t ) and the private key as Sk = S T ⋅ G ⋅ P T . Below is the encryption algorithm for proposed McEliece m = X (S T)−1 , (5) cryptosystem. which is equivalent to the original message. Algorithm 2: Proposed McEliece-encryption Figure 5 below depicts the processes involved in the proposed McEliece algorithm. Input: Parameters for encryption (m , G key ) Below is the algorithm for key generation, encryp- Output: Cipher text (C) tion, and decryption of the proposed McEliece algorithm. Begin Figure 5: Proposed McEliece cryptosystem.
150 Henry Chima Ukwuoma et al. i. Compute CI = m × G key 3.4 Proposed NTRU cryptosystem ii. A random n-bit vector z, containing exactly t ones (a vector of length n and weight t , is generated) Data is encrypted/decrypted using the modified NTRU iii. C = CI + z cryptosystem, the proposed NTRU cryptosystem will be iv. Return (C) driven by lattice arithmetic. Lattice multiplication is the End method for multiplying bigger numbers or for carrying out complex multiplication. It is algorithmically identical to the traditional long multiplication method, but breaks Below is the proposed decryption algorithm for the process into smaller steps. The following steps are McEliece cryptosystem. required for the proposed NTRU cryptosystem. Algorithm 3: Proposed McEliece-decryption Input: Parameters for encryption (S, P, G) 3.4.1 Definition of variables Output: Plain text (m) Begin N – the polynomials in the ring R with degree N − 1. i. Computes the inverse of PT i.e., (P T)−1 p and q – are small and large modulus respectively, ii. Use the decoding algorithm for the code G to which are used for the reduction in coefficients in the decode d to X encryption/decryption of data. iii. m = X(ST)−1 f and g – polynomials used to process the public key h, iv. Return (m) r – a random blinding polynomial used to distort data, m – End is the message to be encrypted/decrypted represented in polynomial form. Figure 6: Proposed NTRU cryptosystem.
Post-quantum cryptography-driven security framework for cloud computing 151 Table 3: Total average execution time taken for the proposed McEliece File size (kB) ECC (s) AES (s) RSA (s) Existing McEliece (s) Proposed McEliece (s) 20 0.0102 0.5501 0.1600 17.5009 17.6744 77 0.0302 0.4901 1.1400 64.4509 66.0208 153 0.0202 0.5001 1.2600 141.9506 133.5506 283 0.0402 0.5001 1.4900 250.9907 247.8208 305 0.0402 0.5301 2.3500 268.8508 266.3308 Average time 0.02820 0.5141 1.2800 148.7488 146.2795 Throughput 20856.1473 1580.7977 356.5955 3.1170 3.1465 Upon access to the cloud, users are given the oppor- Algorithm 4: Proposed NTRU-key generation tunity to either edit already uploaded data or upload fresh data, these data are secured using the proposed Input: parameters for encryption (p, f, g, q) NTRU cryptosystem. NTRU algorithms consists of three Output: Keys (h) algorithms: key generation algorithm, which produces a Begin public and a private key, an encryption algorithm, and a i. Compute f ·f p = 1(mod p) and decryption algorithm. The following processes are driven by lattice arithmetic. ii. f ·fq = 1(mod q ) iii. h = p ⋅ fq ·g ( mod q ) iv. Return (h) 3.4.2 Key generation End The sender computes f·fp = 1(mod p) and f·fq = 1(mod q) Algorithm 5: Proposed NTRU-encryption and then processes the public key h using: h = pfq ·g (mod q ) . (6) Input: Parameters for encryption (m , r , h , q ) Output: Cipher text (e) Begin 3.4.3 Encryption i. Compute e = r ·h + m (mod q ) ii. Return (e) To encrypt a message, the following is processed: End e = r ·h + m(mod q ) . (7) Algorithm 6: Proposed NTRU-decryption 3.4.4 Decryption Input: Parameters for encryption (e, f, p, q) Output: Plain text (c) The following is computed to decrypt the message Begin i. Compute a = f·e(mod q) a = f ·e(mod q ) , (8) ii. Compute b = a(mod p) b = a(mod p) , (9) iii. C = fp· b iv. Return (c) C = f p ⋅ b, (10) End which is equivalent to the original message. The figure below shows the processes involved in the 4 Results and discussion encryption and decryption of NTRU cryptosystem driven by lattice arithmetic (Figure 6). The proposed algorithms were subjected to limitation against Below are the algorithms for processes of the pro- ECC, AES, RSA, existing McEliece, proposed McEliece, NTRU, posed NTRU cryptosystem. and proposed NTRU algorithms.
152 Henry Chima Ukwuoma et al. Table 4: Total execution time taken for the proposed NTRU File size (kB) ECC AES RSA Existing NTRU (s) Proposed NTRU (s) (s) (s) (s) 20 0.0133 0.5539 0.1573 811.0032 2024.7362 77 0.0136 0.4875 1.1636 3243.864 8176.1374 153 0.0219 0.5045 1.2572 6560.97 19572.5671 283 0.0393 0.4987 1.4974 12224.2308 44397.6335 305 0.0352 0.5272 2.3517 37438.7863 97741.92 Average execution time 0.02466 0.5144 1.2854 12055.7707 34382.5988 Throughput 33976.10 1629.19 651.92 0.07 0.02 Table 3 above shows the execution time of the pro- 6 Future work posed McEliece algorithm as well as the average execution time and throughput of the simulated algorithms. This article highlights post-quantum cryptographic sys- Table 3 above shows that ECC has the best throughput. tems and recommends the application of the proposed Comparing the existing and proposed McEliece algorithms, algorithms on a quantum computer platform as the authors it is revealed that the proposed McEliece algorithm has a of this article carried out its simulation on a classical higher throughput and a lower average execution. Table 4 computer. below shows the execution time of the proposed NTRU algorithm as well as the average execution time. Conflict of interest: Authors state no conflict of interest. Table 4 above depicts that ECC has the best throughput. Juxtaposing the existing and proposed NTRU algorithms, it Data availability statement: The authors declare that is revealed that the existing NTRU algorithm has a higher data supporting the findings of this study are available throughput and a lower average execution. within the article. In comparing, the existing and proposed McEliece algorithm, the above proved that the introduction of the transpose function of variables S and P in the proposed McEliece algorithm enhanced the total execution time of References the algorithm. However, the proposed NTRU algorithm, [1] M. N. Daodu, A. Gabriel, B. K. Alese, and A. O. Adetunmbi, “A which is Lattice multiplication driven, proved to be more data encryption standard (DES) based web services security time consuming and with lower throughput. It can thus architecture,” Ann Comput Sci Series, Tibiscus Univ, vol. 14, be deduced that the proposed McEliece is effective and no. 2. pp. 53–8, 2016. efficient while that of the proposed NTRU is less effective [2] B. K. Alese, Deign of public key cryptosystem using elliptic and efficient. curve, Thesis, Akure, Ondo State, Nigeria, The Federal University of Technology, 2004. [3] A. F. Thompson, O. E. Oyinloye, M. T. David, and B. K. Alese, “A secured system of Internet Enabled Host Devices,” Netw Commun Technol, vol. 5, no. 1. pp. 26–36, 2020. 5 Conclusion [4] A. J. Gabriel, B. K. Alese, A. O. Adetumbi, and O. S. Adewale, “Post-quantum cryptography based security framework for This article proposes a framework that adopts quantum- Cloud Computing,” J Internet Technol Secured Trans, vol. 4, safe algorithms to safeguard cloud data. Innovatively, a no. 1. pp. 351–7, 2015. [5] A. M. Kuo. Opportunities and Challenges of Cloud Computing variant of McEliece cryptosystem was used to safeguard to Improve Health Care Services. 2011. Available at: https:// user credentials, while a variant of NTRU cryptosystem www.ncbi.nlm.nih.gov/pmc/articles/PMC3222190/. Accessed was used to safeguard cloud data. The McEliece and 02/03/2018. NTRU cryptosystems were proposed to provide an effi- [6] S. S. S. Shehata, Post Quantum Cryptography with Random cient data security in the cloud environment amidst the Split of St-Gen Codes, Norwegian University of Science and Technology, Department of Information Security and emergence of quantum computing. It is expected that the Communication Technology, 2017. Available at: https:// proposed model will decrease man-in-the-middle attacks ntnuopen.ntnu.no/ntnu-xmlui/bitstream/handle/11250/ and improves data security. 2450584/16929_FULLTEXT.pdf?sequence=1.
Post-quantum cryptography-driven security framework for cloud computing 153 [7] J. Buchmann, and J. Ding, “Post-quantum cryptography”, Retrieved from https://pdfs.semanticscholar.org/8ed3/ Second Int Workshop, PQCrypto, 2008, pp. 17–9. 7b0e436e96384bfb14f02ea21c9a9f84ee65.pdf. Accessed [8] L. Chen, S. Jordan, Y. -K. Liu, D. Moody, R. Peralta, R. Perlner 21/09/2020. et al., Report on post-quantum cryptography, National [20] D. J. Bernstein, N. Heninger, P. Lou, and L. Valenta, Post- Institute of Standards and Technology Internal Report 8105, quantum RSA, 2017, Available at https://cr.yp.to/papers/ 2016. Available at: https://dl.acm.org/doi/proceedings/10. pqrsa-20170419.pdf. Accessed 04/06/2018. 5555/1473109. [21] S. Pavithra and S. Baskar, “Lattice based multiplier for [9] D. Micciancio and O. Regev Lattice-based cryptography. 2008. WSN applications for ECC,” Int J Trend Res Dev, vol. 2, no. 6, Available at http://cims.nyu.edu. Accessed 28/06/2020. pp. 21–27, 2015. [10] D. A. Shafiq, N. Z. Jhanjhi, A. Abdullah, and M. A. Alzain, [22] P. Zhang, J. Xu, H. Muazu, and W. Mao, “Access control “A load balancing algorithm for the data centres to optimise research on data security in cloud computing”, 2015 IEEE cloud computing applications,” IEEE Access, vol. 9, 16th International Conference on Communication Technology pp. 41731–44, 2021, doi: 10.1109/ACCESS.2021.3065308. (ICCT), Hangzhou, China, 2015, pp.874–44. [11] G. Summers, Data and databases, Developing Databases with [23] A. Zalekian, M. Esmaeildoust, and A. Kaabi, “Efficient Access, H. Koehne, editor, Nelson Australia Pty Limited, 2004, implementation of NTRU cryptography using residue number pp. 4–5. Available at: https://catalogue.nla.gov.au/Record/ system,” Int J Comput Appl (0975 – 8887), vol. 124, no. 7. 4610312. pp. 33–7, 2015. [12] S. Chandel, G. Yang, and S. Chakravarty, “RSA-CP-IDABE: a [24] A. Siam, H. El-khobby, S. Abd Elkader, and M. AbdelNaby, secure framework for multi-user and multi-owner cloud “Enhanced data security model for cloud computing platform,” environment,” Information, vol. 11, p. 382, 2020. Int J Sci Res Science, Eng Technol, vol. 1, no. 4, [13] I. J. Awan, M. Shiraz, M. U. Hashmi, Q. Shaheen, R. Akhtar, and pp. 450–460, 2015. A. Ditta, “Secure framework enhancing AES algorithm in cloud [25] D. V. Kumar, “A hybrid security protocol using python,” Int J computing,” Hindawi, Security Commun Netw, vol. 2020, Comput Sci Inf Technol Res, vol. 2, no. 4, pp. 9–16, 2014. pp. 1–16, 2020. [26] L. Ducas, V. Lyubashevsky, and T. Prest, Identity-based [14] M. M. Abdelnapi, F. A. Omara, and N. F. Omra, “A hybrid encryption NTRU lattices, 2014, https://eprint.iacr.org/2014/ hashing security algorithm for data storage on cloud com- 794. Accessed 28/07/2020. puting,” Int J Comput Sci Inf Security (IJCSIS), vol. 14, no. 4, [27] O. D. Alowolodu, B. K. Alese, A. O. Adetunmbi, O. S. Adewale, pp. 175–181, 2016. and O. S. Ogundele, “Elliptic curve cryptography for securing [15] R. Kumar, A. S. Naidu, A. Singh, and A. N. Tentu, “McEliece cloud computing applications,” Int J Comput Appl (0975 – cryptosystem: simulation and security vulnerabilities,” Int J 8887), vol. 66, no. 23, pp. 11–17, 2013. Comput Sci Mathematics, vol. 12, no. No 1. pp. 64–81, 2020. [28] P. Dhawan, “Data security model for cloud computing,” [16] N. Rani, N. Juliet, and S. Arunkumar, “A novel cryptosystem Int J Res Sci Technol (IJRST) 2013, vol. No. 2, no. V, for files stored in cloud using NTRU encryption algorithm,” pp. 264–271, 2013. Int J Recent Technol Eng (IJRTE), vol. 9, no. 1. [29] U. P. B. Ivy, P. Mandiwa, and M. Kumar, “A modified RSA pp. 2277–3878, 2020. cryptosystem based on ‘n’ prime numbers,” Int J Eng Comput [17] S. Mall, and K. Saroj, “A new security framework for cloud Sci, vol. 1, no. 2. pp. 63–6, 2012, ISSN:2319-7242. data”, 8th International Conference on Advances in Computing [30] S. H. Gill, M. A. Razzaq, M. Ahmad, F. M. Almansour, I. Haq, and Communication (ICACC), 2018. N. Z. Jhanjhi, et al., “Security and privacy aspects of cloud com- [18] R. Wang, Research on data security technology based on cloud puting: a smart campus case study,” Intell Autom Soft Comput, storage, 13th Global Congress on Manufacturing and vol. 31, no. 1, pp. 117–128, 2022, doi: 10.32604/ Management, GCMM 2016, 2016. iasc.2022.016597. [19] M. Kindberg, “A usability study of post-quantum algorithms”, [31] H. Kharche and D. S. Chouhan, “Building trust in cloud using Master’s thesis, Lund, Sweden, Department of Electrical public key infrastructure,” (IJACSA) Int J Adv Comput Sci Appl, and Information Technology Lund University, 2017, vol. 3, no. 3. p. 2012, 2012.
You can also read