2022
DOI: 10.21123/bsj.2022.7281
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Data Security through BB84 Protocol and Genetic Algorithm

Abstract: In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Kumar J, & Saxena V., 13 had presented the quality-of-service composition method that was based on Multi-Population GA (MPGA), IoT-Cloud architecture, and Fog-IoT computing. This resulted in the use of a 5-layered architecture that was implemented using a Fog computing system which was the transport layer.…”
Section: Related Workmentioning
confidence: 99%
“…Kumar J, & Saxena V., 13 had presented the quality-of-service composition method that was based on Multi-Population GA (MPGA), IoT-Cloud architecture, and Fog-IoT computing. This resulted in the use of a 5-layered architecture that was implemented using a Fog computing system which was the transport layer.…”
Section: Related Workmentioning
confidence: 99%
“…The device architecture protects against various types of assaults, such as intercepting responses, man-in-the-middle eavesdrop attacks, and impact endurance. Man-in-the-middle attacks occur when a hacker eavesdrops on a communication between an originator and a recipient and then uses that knowledge to trick one party into believing they are the other [25,26]. Ayat and Isa can promptly identify and dispose of any communication error resulting from an intruder's attempt to gain entry to the qubit, allowing QKD to prohibit sending its encrypted qubits to Isa over the channel.…”
Section: Stability Assessmentmentioning
confidence: 99%
“…In this technology information is collected from credit card transaction data, online banking transaction data, customer's information and other types of transactional information. The Rivest, Shamir and Adleman (RSA) digital system is also used for secure online transaction 1 . The cracking by hackers of RSA digital system is still not reported in the literature but hackers have hacked the other types of algorithms which are used in the transaction of digital currency, hence it is a big challenge for the financial transaction to stay safe and also to avoid frauds.…”
Section: Introductionmentioning
confidence: 99%