基于安全密钥数据分发的用户存储传输服务器身份验证过程数学后量子密码学模型

IF 1.2 4区 数学 Q3 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Networks and Heterogeneous Media Pub Date : 2023-01-01 DOI:10.3934/nhm.2023057
Santosh Kumar Henge, Gitanjali Jayaraman, M. Sreedevi, Rajakumar R, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, A. Alghamdi
{"title":"基于安全密钥数据分发的用户存储传输服务器身份验证过程数学后量子密码学模型","authors":"Santosh Kumar Henge, Gitanjali Jayaraman, M. Sreedevi, Rajakumar R, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, A. Alghamdi","doi":"10.3934/nhm.2023057","DOIUrl":null,"url":null,"abstract":"The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-based complex systems. It also demonstrates solutions to many challenging problems in cloud computing security. This study proposes a user-storage-transit-server authentication process model based on secure keys data distribution and mathematical post-quantum cryptography methodology. The post-quantum cryptography mathematical algorithm is used in this study to involve the quantum computing-based distribution of security keys. It provides security scenarios and technical options for securing data in transit, storage, user, and server modes. Post-quantum cryptography has defined and included the mathematical algorithm in generating the distributed security key and the data in transit, on-storage, and on-editing. It has involved reversible computations on many different numbers by super positioning the qubits to provide quantum services and other product-based cloud-online access used to process the end-user's artificial intelligence-based hardware service components. This study will help researchers and industry experts prepare specific scenarios for synchronizing data with medicine, finance, engineering, and banking cloud servers. The proposed methodology is implemented with single-tenant, multi-tenant, and cloud-tenant-level servers and a database server. This model is designed for four enterprises with 245 users, and it employs integration parity rules that are implemented using salting techniques. The experimental scenario considers the plain text size ranging from 24 to 8248 for analyzing secure key data distribution, key generation, encryption, and decryption time variations. The key generation and encryption time variations are 2.3233 ms to 8.7277 ms at quantum-level 1 and 0.0355 ms to 1.8491 ms at quantum-level 2. The key generation and decryption time variations are 2.1533 ms to 19.4799 ms at quantum-level 1 and 0.0525 ms to 3.3513 ms at quantum-level 2.","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology\",\"authors\":\"Santosh Kumar Henge, Gitanjali Jayaraman, M. Sreedevi, Rajakumar R, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, A. Alghamdi\",\"doi\":\"10.3934/nhm.2023057\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-based complex systems. It also demonstrates solutions to many challenging problems in cloud computing security. This study proposes a user-storage-transit-server authentication process model based on secure keys data distribution and mathematical post-quantum cryptography methodology. The post-quantum cryptography mathematical algorithm is used in this study to involve the quantum computing-based distribution of security keys. It provides security scenarios and technical options for securing data in transit, storage, user, and server modes. Post-quantum cryptography has defined and included the mathematical algorithm in generating the distributed security key and the data in transit, on-storage, and on-editing. It has involved reversible computations on many different numbers by super positioning the qubits to provide quantum services and other product-based cloud-online access used to process the end-user's artificial intelligence-based hardware service components. This study will help researchers and industry experts prepare specific scenarios for synchronizing data with medicine, finance, engineering, and banking cloud servers. The proposed methodology is implemented with single-tenant, multi-tenant, and cloud-tenant-level servers and a database server. This model is designed for four enterprises with 245 users, and it employs integration parity rules that are implemented using salting techniques. The experimental scenario considers the plain text size ranging from 24 to 8248 for analyzing secure key data distribution, key generation, encryption, and decryption time variations. The key generation and encryption time variations are 2.3233 ms to 8.7277 ms at quantum-level 1 and 0.0355 ms to 1.8491 ms at quantum-level 2. The key generation and decryption time variations are 2.1533 ms to 19.4799 ms at quantum-level 1 and 0.0525 ms to 3.3513 ms at quantum-level 2.\",\"PeriodicalId\":54732,\"journal\":{\"name\":\"Networks and Heterogeneous Media\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Networks and Heterogeneous Media\",\"FirstCategoryId\":\"100\",\"ListUrlMain\":\"https://doi.org/10.3934/nhm.2023057\",\"RegionNum\":4,\"RegionCategory\":\"数学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"MATHEMATICS, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Networks and Heterogeneous Media","FirstCategoryId":"100","ListUrlMain":"https://doi.org/10.3934/nhm.2023057","RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MATHEMATICS, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

中央远程服务器对于存储和处理用于云计算评估的数据至关重要。然而,传统系统需要提高其提供技术数据安全解决方案的能力。在当今快速发展的技术中,许多数据安全挑战和复杂性等待着技术解决方案。这些复杂性不能通过组合所有安全加密技术来解决。量子计算有效地发展了复合算法,使网络安全、取证、人工智能和基于机器学习的复杂系统得以自然发展。它还演示了云计算安全中许多具有挑战性问题的解决方案。本文提出了一种基于安全密钥数据分发和数学后量子密码学方法的用户-存储-传输-服务器身份验证过程模型。本研究采用后量子密码数学算法,涉及基于量子计算的安全密钥分发。它提供了在传输、存储、用户和服务器模式下保护数据的安全场景和技术选项。后量子密码学定义并包含了生成分布式安全密钥和传输、存储和编辑中的数据的数学算法。它涉及对许多不同数字的可逆计算,通过超级定位量子位来提供量子服务和其他基于产品的云在线访问,用于处理最终用户基于人工智能的硬件服务组件。这项研究将帮助研究人员和行业专家准备与医疗、金融、工程和银行云服务器同步数据的具体场景。所提出的方法是通过单租户、多租户和云租户级别的服务器以及数据库服务器实现的。该模型是为拥有245个用户的4家企业设计的,它采用了使用盐化技术实现的集成奇偶规则。实验场景考虑从24到8248的纯文本大小,用于分析安全密钥数据分发、密钥生成、加密和解密时间变化。密钥生成和加密时间变化在量子级1为2.3233 ~ 8.7277 ms,在量子级2为0.0355 ~ 1.8491 ms。密钥生成和解密时间变化在量子级1为2.1533 ms ~ 19.4799 ms,在量子级2为0.0525 ms ~ 3.3513 ms。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology
The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-based complex systems. It also demonstrates solutions to many challenging problems in cloud computing security. This study proposes a user-storage-transit-server authentication process model based on secure keys data distribution and mathematical post-quantum cryptography methodology. The post-quantum cryptography mathematical algorithm is used in this study to involve the quantum computing-based distribution of security keys. It provides security scenarios and technical options for securing data in transit, storage, user, and server modes. Post-quantum cryptography has defined and included the mathematical algorithm in generating the distributed security key and the data in transit, on-storage, and on-editing. It has involved reversible computations on many different numbers by super positioning the qubits to provide quantum services and other product-based cloud-online access used to process the end-user's artificial intelligence-based hardware service components. This study will help researchers and industry experts prepare specific scenarios for synchronizing data with medicine, finance, engineering, and banking cloud servers. The proposed methodology is implemented with single-tenant, multi-tenant, and cloud-tenant-level servers and a database server. This model is designed for four enterprises with 245 users, and it employs integration parity rules that are implemented using salting techniques. The experimental scenario considers the plain text size ranging from 24 to 8248 for analyzing secure key data distribution, key generation, encryption, and decryption time variations. The key generation and encryption time variations are 2.3233 ms to 8.7277 ms at quantum-level 1 and 0.0355 ms to 1.8491 ms at quantum-level 2. The key generation and decryption time variations are 2.1533 ms to 19.4799 ms at quantum-level 1 and 0.0525 ms to 3.3513 ms at quantum-level 2.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Networks and Heterogeneous Media
Networks and Heterogeneous Media 数学-数学跨学科应用
CiteScore
1.80
自引率
0.00%
发文量
32
审稿时长
6-12 weeks
期刊介绍: NHM offers a strong combination of three features: Interdisciplinary character, specific focus, and deep mathematical content. Also, the journal aims to create a link between the discrete and the continuous communities, which distinguishes it from other journals with strong PDE orientation. NHM publishes original contributions of high quality in networks, heterogeneous media and related fields. NHM is thus devoted to research work on complex media arising in mathematical, physical, engineering, socio-economical and bio-medical problems.
期刊最新文献
Real positive solutions of operator equations $ AX = C $ and $ XB = D $ Some results on the existence and stability of impulsive delayed stochastic differential equations with Poisson jumps Diffusion of binary opinions in a growing population with heterogeneous behaviour and external influence High-order schemes for the fractional coupled nonlinear Schrödinger equation Error estimate of L1-ADI scheme for two-dimensional multi-term time fractional diffusion equation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1