Quantum Cryptography-Enabled Cloud Security (QCECS) Framework
Wassan Adnan Hashim
International Journal of Computational and Electronic Aspects in Engineering
Volume 5: Issue 4, December 2024, pp 214-228
Author's Information
Wassan Adnan Hashim1
Corresponding Author
1 Medical Instruments Techniques, Department, Al-Qalam University College, Kirkuk, Iraq
wasan.eng@alqalam.edu.iq
Abstract:-
The QCECS Framework is ready to prevent new types of threats in the cloud environment given the increasing threat potential of quantum computing. RSA and ECC conventional encryption techniques cannot protect data security from quantum penetration and, therefore, the need for quantum security models. This incorporates the QKD for the impenetrable key exchange, post-quantum cryptography for data scrambling, blockchain for a more transparent way of managing keys, and the use of Artificial intelligence for real-time intrusion detection especially for traditional as well as quantum threats. At the same time, the proposed framework forms a symmetrical hybrid encryption approach with both quantum-resistant and classical interference to deliver the best outcomes while maintaining security integrity. The evidence derived from the study indicates that the framework protects the data through cryptographic mechanisms such as lattice-based cryptography and QKD and key management is secured through blockchain. It is crucial to mention, that the application of AI improves the detection of new threats in process and real time. This framework provides higher encryption strength, clarity, and quantum security compared to other methods. Even though various obstacles are resolved in the framework, several barriers remain in terms of hardware access, cloud adaptability, and internal enhancement. Yet, due to its novel approach to post-quantum cybersecurity, it has become a potential dominating solution for future cloud security.Index Terms:-
Quantum Key Distribution (QKD); Post-Quantum Cryptography; Blockchain-Based Key Management; Hybrid Encryption Models; AI-Driven Intrusion DetectionREFERENCES
- M. K. Yousif, Z. E. Dallalbashi, and S. W. Kareem, “Information security for big data using the NTRUEncrypt method,”
Measurement: Sensors, vol. 27, p. 100738, 2023.
- G. Y. Ismail, S. Alhayali, S. W. Kareem, and Z. S. Hussain, “Secure Data in the Cloud with a Robust Hybrid
Cryptographic Approach,” Journal of Electrical Systems, vol. 20, no. 2, pp. 2450–2457, 2024.
- S. M. J. Abdalwahid, B. F. Ibrahim, S. H. Ismael, and S. W. Kareem, “A New Efficient Method for Information Security
in Hadoop,” Qalaai Zanist Journal, vol. 7, no. 2, pp. 1115–1138, 2022.
- D. Sikeridis et al., “ELCA: Introducing Enterprise-level Cryptographic Agility for a Post-Quantum Era,” Cryptology
ePrint Archive, 2023.
- A. Kumar, C. Ottaviani, S. S. Gill, and R. Buyya, “Securing the future internet of things with post‐quantum
cryptography,” Security and Privacy, vol. 5, no. 2, p. e200, 2022.
- B. Kelley, J. J. Prevost, P. Rad, and A. Fatima, “Securing cloud containers using quantum networking channels,” in
2016 IEEE International Conference on Smart Cloud (SmartCloud), 2016, pp. 103–111.
- M. Siddireddy, “A lightweight end-to-end encryption algorithm for IoT data integration: Blockchain framework.”
Southern Illinois University at Carbondale, 2024.
- N. Purohit, S. Joshi, M. Pande, and S. Lincke, “Pragmatic analysis of ECC based security models from an empirical
perspective,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 26, no. 3, pp. 739–758, 2023.
- M. Gupta et al., “Game theory-based authentication framework to secure internet of vehicles with blockchain,”
Sensors, vol. 22, no. 14, p. 5119, 2022.
- R. Pandey, “Quantum Information Theory-Principles and Concepts: Exploring the principles and concepts of quantum
information theory, including quantum entanglement, teleportation, and quantum error correction,” Australian Journal of
Machine Learning Research & Applications, vol. 4, no. 1, pp. 240–248, 2024.
- B. Zolfaghari and T. Koshiba, “The dichotomy of neural networks and cryptography: war and peace,” Applied System
Innovation, vol. 5, no. 4, p. 61, 2022.
- S. M. Sasubilli, A. K. Dubey, and A. Kumar, “Hybrid security analysis based on intelligent adaptive learning in Big
Data,” in 2020 International Conference on Advances in Computing and Communication Engineering (ICACCE), 2020, pp. 1–5.
- C. P. Eze, J. Emmanuel, C. I.-O. Onietan, I. Isewon, and J. Oyelade, “Systematic Review on the Recent Trends of
Cybersecurity in Automobile Industry,” in 2023 International Conference on Science, Engineering and Business for
Sustainable Development Goals (SEB-SDG), 2023, vol. 1, pp. 1–7.
- B. Zolfaghari, H. Nemati, N. Yanai, and K. Bibak, “The Dichotomy of Crypto and NN: War and Peace,” in Crypto and
AI: From Coevolution to Quantum Revolution, Springer, 2023, pp. 15–39.
- M. R. Naaz and A. Kumar, “Simulation Of A Secure Approach Of Data Communication On Peer To Peer Network Using Blockhain Technology On Ethereum,”
Simulation, vol. 18, no. 2, 2023.
- M. N. Rahman and N. Rahman, “Exploring digital trade provisions in Regional Trade Agreements (RTAs) in times of
crisis: India and Asia-Pacific countries,” Asia and the Global Economy, vol. 2, no. 2, p. 100036, 2022.
- S. Manjunath, “Experimental Evaluation of Lightweight Cryptographic Algorithms.” BMS College of Engineering, 2022.
- M. Sudha and M. Monica, “Enhanced security framework to ensure data security in cloud computing using
cryptography,” Advances in Computer Science and its Applications, vol. 1, no. 1, pp. 32–37, 2012.
- S. Kareem, A. Hasan, R. Hawezi, K. Muheden, and F. Khoshaba, “Big Data Security Issues and Challenges.,” Journal of
Applied Computer Science & Mathematics, vol. 15, no. 32, 2021.
- S. W. KAREEM, “Secure Cloud Approach Based on Okamoto-Uchiyama Cryptosystem.,” Journal of Applied Computer Science
& Mathematics, vol. 14, no. 29, 2020.
- S. M. J. Abdalwahid, R. Z. Yousif, and S. W. Kareem, “Enhancing approach using hybrid pailler and RSA for
information security in bigdata,” Applied Computer Science, vol. 15, no. 4, pp. 63–74, 2019.
- M. Alrashidi and M. Alrashidi, “A Framework and Cryptography Algorithm for Protecting Sensitive Data on Cloud
Service Providers,” journal of King Abdulaziz University Computing and Information Technology Sciences, vol. 8, no. 2,
pp. 69–92, 2019.
- H. Li, Y. Dai, and B. Yang, “Identity-based cryptography for cloud security,” Cryptology ePrint Archive, 2011.
- S. Farooq, P. Chawla, and N. Kumar, “A cryptographic security framework for hybrid Cloud‐Internet of Things
network,” Security and Privacy, vol. 6, no. 5, p. e309, 2023.
- P. Kanagala and R. Jayaraman, “Effective encryption approach to improving the secure cloud framework through
fuzzy-based encrypted cryptography,” Soft Computing, pp. 1–10, 2023.
- H. Dubey, S. Kumar, and A. Chhabra, “Cyber security model to secure data transmission using cloud cryptography,”
Cyber Secur. Insights Mag, vol. 2, pp. 9–12, 2022.
- I. A. Awan, M. Shiraz, M. U. Hashmi, Q. Shaheen, R. Akhtar, and A. Ditta, “Secure framework enhancing AES algorithm
in cloud computing,” Security and communication networks, vol. 2020, no. 1, p. 8863345, 2020.
- V. Kakkad, M. Patel, and M. Shah, “Biometric authentication and image encryption for image security in cloud
framework,” Multiscale and Multidisciplinary Modeling, Experiments and Design, vol. 2, no. 4, pp. 233–248, 2019.
- M. Kaleem et al., “New Efficient Cryptographic Techniques For Cloud Computing Security,” Migration Letters, vol.
21, no. S11, pp. 13–28, 2024.
- P. Yong, Z. Wei, X. I. E. Feng, Z. Dai, G. Yang, and D. Chen, “Secure cloud storage based on cryptographic
techniques,” The Journal of China Universities of Posts and Telecommunications, vol. 19, pp. 182–189, 2012.
- S. I. Hamad, “Use of chaos in key schedules for a symmetrical encryption algorithm without data loss,”
International Journal of Computational and Electronic Aspects in Engineering, vol. 5, no. 4, pp. 194–202, 2024.
- J. M. Ragini Chavan, “Trust Model for Cloud Data Service Providers,” International Journal of Computational and
Electronic Aspects in Engineering, RAME Publishers, vol. 4, no. 3, pp. 86–89, 2023, doi:
https://doi.org/10.26706/ijceae.4.3.20230905.
- Z. S. Karam, R. H. Ali, and B. O. Al-Nashy, “Exploring Emerging Strategies for Countering Computer Malware Attacks:
A Comprehensive Survey of Tools and Techniques.,” International Journal of Computational & Electronic Aspects in
Engineering (IJCEAE), vol. 4, no. 2, 2023.
- I. K. AI–Dulaimi, “The Use of Cloud Computing to Process Big Data: An Applied Study of the Virtual Library at the
University of Mosul.,” International Journal of Computational & Electronic Aspects in Engineering (IJCEAE), vol. 4, no.
2, 2023.
- A.-A. A. Alsaiqal, “An Encrypting Electronic Payments Based on Kerberos Cryptography Protocol.,” International
Journal of Computational & Electronic Aspects in Engineering (IJCEAE), vol. 5, no. 3, 2024.
To view full paper, Download here
To View Full Paper
For authors
Author's guidelines Publication Ethics Publication Policies Artical Processing Charges Call for paper Frequently Asked Questions(FAQS) View All Volumes and IssuesPublishing with



