Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

A Quantum Cryptography Protocol for Access Control in Big Data

google+
Views: 53                 

Author :  Abiodun O. Odedoyin

Affiliation :  Obafemi Awolowo University

Country :  Nigeria

Category :  Networks & Communications

Volume, Issue, Month, Year :  8, 2, June, 2018

Abstract :


Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.

Keyword :  Quantum cryptography, protocols, access controls, confidentiality, big data.

Journal/ Proceedings Name :  International Journal on Cryptography and Information Security (IJCIS)

URL :  https://wireilla.com/papers/ijcis/V8N2/8218ijcis01.pdf

User Name : Jones Smith
Posted 06-07-2018 on 20:11:14 AEDT



Related Research Work

  • Ensemble Of Probabilistic Learning Networks For Iot Edge Intrusion Detection
  • Improvement Of Multiple Routing Based On Fuzzy Clustering And Pso Algorithm In Wsns To Reduce Energy Consumption
  • Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism In Wireless And Mobile Networks
  • Scalable And Energy Efficient Task Offloading Schemes For Vehicular Cloud Computing

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals