Enhancing Cloud Security: A Hybrid Honeycomb-Lattice Encryption Model for Quantum Resistance

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 3
Year of Publication : 2024
Authors : K. Samunnisa, Sunil VK Gaddam, K. Madhavi
pdf
How to Cite?

K. Samunnisa, Sunil VK Gaddam, K. Madhavi, "Enhancing Cloud Security: A Hybrid Honeycomb-Lattice Encryption Model for Quantum Resistance," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 3, pp. 141-159, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I3P115

Abstract:

This study introduces an innovative Hybrid cryptographic model, which seamlessly integrates a honeycomb access mechanism with lattice-based encryption algorithms aimed at enhancing cloud security and addressing emerging quantum threats. The Hybrid model represents a significant leap forward from traditional Lattice encryption methods, as demonstrated by comprehensive simulations. It achieves a commendable success rate of 90.15%, boasting lower variability (1.72% standard deviation) compared to Lattice encryption’s 94.99% success rate with higher variability (2.93%). Operationally, the Hybrid model excels in providing consistent performance and faster processing times, making it a more efficient choice for cryptographic operations. Moreover, its cost-effectiveness is evident, with operational costs ranging from 0.862 to 7.24 microdollars for encryption and 0.871 to 7.29 microdollars for decryption. Furthermore, the energy consumption of both models is maintained within the practical range of 1.35 to 3.46 joules, highlighting the Hybrid model’s suitability. This research underscores the Hybrid model’s potential to safeguard cloud computing environments against advanced quantum attacks, offering a promising solution that strikes a balance between performance, cost-effectiveness, and energy efficiency. In an era where quantum computing poses a significant threat to traditional encryption, the Hybrid cryptographic model emerges as a robust and practical alternative, capable of fortifying cloud security while maintaining operational efficiency and affordability.

Keywords:

Hybrid encryption model, Honeycomb access mechanism, Lattice encryption, Cloud security, Quantum computing threats, Cryptographic performance, Comparative analysis, Security simulations, Operational efficiency, Cloud computing infrastructures.

References:

[1] Ashutosh Kumar, and Garima Verma, “Revolutionizing Cloud Security: Leveraging Quantum Computing and Key Distribution for Enhanced Protection,” The Review of Socionetwork Strategies, vol. 17, pp. 131-143, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Rajvir Shah, “The Conventional Security of Cloud Computing and the Growing Threat to Quantum Computing,” IEEE 3rd Global Conference for Advancement in Technology (GCAT), Bangalore, India, pp. 1-7, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] R. Poorvadevi et al., “An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services,” International Journal of Computer Engineering in Research Trends, vol. 4, no. 2, pp. 20-24, 2017.
[Google Scholar] [Publisher Link]
[4] Henry Chima Ukwuoma et al., “Post-Quantum Cryptography-Driven Security Framework for Cloud Computing,” Open Computer Science, vol. 12, no. 1, pp. 142-153, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Hafsa Fatima Amreen, FirdousRehana, and G.S.S. Rao, “Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud,” International Journal of Computer Engineering in Research Trends, vol. 4, no. 10, pp. 392-399, 2017.
[Publisher Link]
[6] Praveen Kumar, and Naga Lakshmi, “Efficient Data Access Control for Multi-Authority Cloud Storage Using CP-ABE,” International Journal of Computer Engineering In Research Trends, vol. 2, no. 12, pp. 1182-1187, 2015.
[Google Scholar] [Publisher Link]
[7] Henry C. Ukwuoma et al., “Quantum Attack-Resistant Security System for Cloud Computing Using Lattice Cryptography,” International Journal for Information Security Research, vol. 12, no. 1, pp. 1053-1061, 2022.
[Google Scholar] [Publisher Link]
[8] Hoang Phuc Hau Luu, Abdlehak Sakhi, and Mukhlisulfatih Latief, “Optimizing Group Management and Cryptographic Techniques for Secure and Efficient MTC Communication,” International Journal of Computer Engineering in Research Trends, vol. 11, no. 2, pp. 1-8, 2024.
[CrossRef] [Publisher Link]
[9] Ritik Bavdekar et al., “Post-Quantum Cryptography: A Review of Techniques, Challenges and Standardizations,” International Conference on Information Networking (ICOIN), Bangkok, Thailand, pp. 146-151, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] G. Prathyusha, Dunna Nikitha Rao, and Kaipa Chandana Sree, “Enhancing Cloud-Based IoT Security: Integrating AI and Cybersecurity Measures,” International Journal of Computer Engineering in Research Trends, vol. 10, no. 5, pp. 26-32, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Robert E. Campbell, “Evaluation of Post-Quantum Distributed Ledger Cryptography,” Journal of the British Blockchain Association, vol. 2, no. 1, pp. 1-8, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Alvaro Cintas Canto, Mehran Mozaffari Kermani, and Reza Azarderakhsh, “Reliable Constructions for the Key Generator of Code-Based Post-Quantum Cryptosystems on FPGA,” ACM Journal on Emerging Technologies in Computing Systems, vol. 19, no. 1, pp. 1-20, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Victor Garcia et al., “Modelling and Verification of Post-Quantum Key Encapsulation Mechanisms Using Maude,” PeerJ Computer Science, vol. 9, pp. 1-47, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Claus Pahl et al. “Enhancing Cloud Service Selection and Orchestration with DALMOCS: A Dynamic Adaptive Learning and Multi-Criteria Decision Analysis Approach,” International Journal of Computer Engineering in Research Trends, vol. 11, no. 2, pp. 18-26, 2024.
[CrossRef] [Publisher Link]
[15] Catinca Mujdei et al., “Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication,” ACM Transactions on Embedded Computing Systems, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Eduard Sanou Gozalo, “Post-Quantum Cryptography: Lattice-Based Encryption,” Master Thesis, Polytechnic University of Catalonia, Spain, 2016.
[Google Scholar] [Publisher Link]
[17] Somnath Mondal, Sachin Patkar, and T.K. Pal, “A Configurable and Efficient Implementation of Number Theoretic Transform (NTT) for Lattice-Based Post-Quantum-Cryptography,” IEEE 7th International conference for Convergence in Technology (I2CT), Mumbai, India, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Hamid Nejatollahi et al., “Post-Quantum Lattice-Based Cryptography Implementations: A Survey,” ACM Computing Surveys, vol. 51, no. 6, pp. 1-41, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Uthpala Premarathne et al., “Hybrid Cryptographic Access Control for Cloud-Based EHR Systems,” IEEE Cloud Computing, vol. 3, no. 4, pp. 58-64, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[20] E. Dinesh et al., “Trust Based Access Control with Hybrid Cryptographic Algorithm Based Data Security on Cloud for E-Learning Application,” Journal of Intelligent & Fuzzy Systems, vol. 45, no. 5, pp. 7563-7573, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Uthpala Subodhani Premarathne et al., “Hybrid Cryptographic Access Control for Cloud Based Electronic Health Records Systems,” IEEE Cloud Computing, vol. 2, pp. 1-7, 2017.
[Google Scholar]
[22] Shahnawaz Ahmad, Shabana Mehfuz, and Javed Beg, “Hybrid Cryptographic Approach to Enhance the Mode of Key Management System in Cloud Environment,” The Journal of Supercomputing, vol. 79, pp. 7377-7413, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Saiyu Qi et al., “Efficient Data Access Control with Fine-Grained Data Protection in Cloud-Assisted IIoT,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2886-2899, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Abdul Hannan Khan et al., “Load Balancing of Cloud Computing Service Model Empowered with Fuzzy Logic,” Sir Syed University Research Journal of Engineering & Technology, vol. 13, no. 1, pp. 10-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Avani Prakasan, Kurunandan Jain, and Prabhakar Krishnan, “Authenticated-Encryption in the Quantum Key Distribution Classical Channel Using Post-Quantum Cryptography,” 6th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, pp. 804-811, 2022.
[CrossRef] [Google Scholar] [Publisher Link]