Meet Inspiring Speakers and Experts at our 3000+ Global Conference Series LLC LTD Events with over 1000+ Conferences, 1000+ Symposiums and 1000+ Workshops on Medical, Pharma, Engineering, Science, Technology and Business.

Explore and learn more about Conference Series LLC LTD : World’s leading Event Organizer


Zuriati Ahmad Zukarnain

Zuriati Ahmad Zukarnain

University Putra Malaysia, Malaysia

Title: QKD communication protocol for authentication mechanism of cloud network


Biography: Zuriati Ahmad Zukarnain


Quantum Key Distribution (QKD) protocol is a unique communication protocol for Authentication Mechanism of Cloud Network in replacing the key distribution technique based on public key infrastructure to achieve unconditional security in cloud. Cloud infrastructure provides many benefits in terms of low cost and accessibility of data. Ensuring the security aspect is a major factor in the cloud infrastructure. Currently, there are certain issues pertaining on Public Key Infrastructure (PKI) in cloud systems. It is obviously shown, there is no sufficient secured procedure to move private keys between clouds client. At the same time, there is no certificate authority separation thus it is not provide a secure authentication and authorization of cloud network. This QKD protocol is believed to be able to detect any eavesdropping activities and provide an effective security. The Quantum Key Distribution (QKD) protocol used the concept of Multiparty QKD (MQKD) which allow the same key is distributed to different parties based on quantum mechanism. A quantum key server generates a secret key that may strengthen the security aspects. A quantum key distribution key scheme is imposed in the cloud network to secure the top-secret message or information and capture the eavesdropper. The existence of quantum key storage between the cloud provider and cloud client may guarantee the integrity of communication process that ensure the party is authenticated and the communication cannot be intercept. To achieve the practical feasibility and simplicity in MQKD, a standard cryptographic like authentication scheme is designed. The simulation results show that our proposed protocol provides authentication of the clients is acceptable response to error rate and time. In addition, our result shows that the proposed scheme could reduce amount of information leak.

Speaker Presentations

Speaker PDFs

Speaker PPTs Click Here