1998 1077
Full Length Article
Journal of Intelligent Systems and Internet of Things
Volume 1 , Issue 2, PP: 61-71 , 2020 | Cite this article as | XML | Html |PDF


Improving the Security and Authentication of the Cloud with IoT using Hybrid Optimization Based Quantum Hash Function

Authors Names :   K. Shankar   1 *  

1  Affiliation :  Department of Computer Applications, Alagappa University, Karaikudi, India

    Email :  : shankarcrypto@gmail.com

Doi   :   https://doi.org/10.54216/JISIoT.010201

Abstract :

The security with the protection of IoT is to stay a consequential test, for the most part, because of the huge scale and dispersed nature of IoT systems. A cloud server brings wide pertinence of IoT in numerous businesses just as Government parts. Be that as it may, the security concerns, for example, verification and information protection of these gadgets assume a key job in fruitful coordination of two innovations. To build the security here, a quantum hash work system and hybrid cuckoo search-Artificial Bee Colony algorithm is displayed. A quantum hash work has been presented as an amazing system for secure correspondence of IoT and cloud because of its irregular disordered robust execution, greater affectability for introductory authority dimension, steadiness, and the exceptionally huge crucial area is hypothetically sufficiently able to oppose different known assaults. Cloud servers utilizing CS-ABC to upgrading the safe calculations through a quantum channel inside the cloud framework. Execution examinations and recreation outcomes demonstrate our presented methods are portrayed and also have greater safety, proficiency with strength opposed to a few surely understood assaults which choose them as a great contender for verifying cloud and IoT applications.

Keywords :

Cloud Computing , IoT , Quantum hash function , cuckoo search- Artificial Bee Colony and security.

References :

[1]       Wang, King-Hang, Chien-Ming Chen, Weicheng Fang, and Tsu-Yang Wu, "A secure authentication scheme for Internet of Things," Pervasive and Mobile Computing, Vol.  42, pp. 15-26, 2017.

[2]       Geneiatakis, Dimitris, IoannisKounelis, Ricardo Neisse, Igor Nai-Fovino, Gary Steri, and GianmarcoBaldini, "Security and privacy issues for an IoT based smart home," In process of 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1292-1297, 2017.

[3]       El-Latif, Ahmed A. Abd, BassemAbd-El-Atty, M. ShamimHossain, Samir Elmougy, and Ahmed Ghoneim, "Secure quantum steganography protocol for fog cloud Internet of Things," IEEE access, Vol. 6, pp. 10332-10340, 2018.

[4]       Yang, Zhe, Qihao Zhou, Lei Lei, KanZheng, and Wei Xiang, "An IoT-cloud based wearable ECG monitoring system for smart healthcare," Journal of medical systems, Vol.  40, No. 12, pp. 286, 2016.

[5]       Wang, Wei, PengXu, and Laurence T. Yang., "Secure data collection, storage and access in cloud-assisted IoT.," IEEE cloud computing, Vol. 5, No. 4, pp.  77-88, 2018.

[6]       Stergiou, Christos, Kostas E. Psannis, Brij B. Gupta, and Yutaka Ishibashi, "Security, privacy & efficiency of sustainable cloud computing for big data & IoT." Sustainable Computing: Informatics and Systems, Vol.19, pp. 174-184, 2018.

[7]       Yang, YuGuang, YuChen Zhang, Gang Xu, XiuBo Chen, Yi-Hua Zhou, and WeiMin Shi, "Improving the efficiency of quantum Hash function by dense coding of coin operators in discrete-time quantum walk," SCIENCE CHINA Physics, Mechanics & Astronomy , Vol. 61, No. 3, pp. 030312, 2018.

[8]       Srinidhi, N.N., Kumar, S.D. and Venugopal, K.R., 2018. Network optimizations in the Internet of Things: A review. Engineering Science and Technology, an International Journal.

[9]       Reyna, A., Martín, C., Chen, J., Soler, E. and Díaz, M., 2018. On blockchain and its integration with IoT. Challenges and opportunities. Future Generation Computer Systems.

[10]    Tsurumaru, Toyohiro, and Masahito Hayashi. "Dual universality of hash functions and its applications to quantum cryptography." IEEE transactions on information theory, Vol.59, No. 7, pp.  4700-4717, 2013.

[11]    Sharma, Geeta, and SheetalKalra, "A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications," Journal of information security and applications, Vol. 42, pp. 95-106, 2018.

[12]    Henze, Martin, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, and Klaus Wehrle, "A comprehensive approach to privacy in the cloud-based Internet of Things," Future Generation Computer Systems, Vol. 56, pp. 701-718, 2016.

[13]    Yang, Yu-Guang, Jing-Lin Bi, Xiu-Bo Chen, Zheng Yuan, Yi-Hua Zhou, and Wei-Min Shi, "Simple hash function using discrete-time quantum walks," Quantum Information Processing, Vol. 17, No. 8, pp.  189, 2018.

[14]    Ple┼ča, Mihail-Iulian, "Hybrid scheme for secure communications using quantum and classical mechanisms," In process of 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1-6, 2017.


[15]     Cheng, Chi, Rongxing Lu, Albrecht Petzoldt, and Tsuyoshi Takagi, "Securing the Internet of Things in a quantum world," IEEE Communications Magazine, Vol.  55, No. 2, pp. 116-120, 2017.

Cite this Article as :
K. Shankar, Improving the Security and Authentication of the Cloud with IoT using Hybrid Optimization Based Quantum Hash Function, Journal of Intelligent Systems and Internet of Things, Vol. 1 , No. 2 , (2020) : 61-71 (Doi   :  https://doi.org/10.54216/JISIoT.010201)