Securing the Future of Library Cloud Infrastructure with AQFA: Adaptive Quantum-Resistant Authentication

Authors

  • Ajay N. Upadhyaya
  • G. Sreenivasula Reddy
  • Sathyavani Addanki
  • Rahul Vadisetty
  • A. Lakshmanarao
  • Mohaideen A
  • Vivekanandan G Sri Sai Ram Institute Of Technology

DOI:

https://doi.org/10.22399/ijcesen.696

Keywords:

Cloud protection,, Flexible identity,, Quantum proof,, Federated learning,, ACN deblocking

Abstract

The deployment of cloud infrastructure in libraries enhances scalability and availability of resources, but different hazards have evolved, and so has the need for sound security measures for shielding critical information from some risks such as quantum computing’s risks. This paper proposes the Quantum-Resistant Federated Authentication (AQFA) framework which uses the federated learning with quantum-resistant cryptographic technologies for the improvement of authentication in library cloud systems. AQFA employs a multilayer security model which ensures two things; user credential protection against quantum attacks, privacy, and accessibility. It also uses trust models to adapt its incident response to real-time user behavior; thereby making it easier to manage risks of unauthorized access. In addition, AQFA also adapts homomorphic encryption to help encrypt data for processing with the ability of library that enables libraries to perform operations on encrypted data. This thinking solution not only improves the general security of library cloud infrastructures but also enables reasonable scale and user adjustment in a more and more digital environment. The findings further affirm the ability of AQFA in mitigating risks to historical library assets and preventing information leakage in cloud configuration

References

I. F. Akyildiz and X. Wang et al, (2005). A survey on wireless mesh networks, IEEE Commun. Mag., 43(9);S23–S30.

S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith and A. Jamalipour et al, (2014). Wireless body area networks: A survey, IEEE Commun. Surv. Tutorials, 16(3);1658–1686.

J. Liu, Y. Shi et al, Z. M. Fadlullah and N. Kato et al, (2018). Space-airground integrated network: A survey, IEEE Commun. Surv. Tutorials, 20(4);2714–2741

C. Zhang, P. Patras and H. Haddadi, (2019). Deep Learning in Mobile and Wireless Networking: A Survey, IEEE Communications Surveys & Tutorials, 21(3); 2224-2287, doi: 10.1109/COMST.2019.2904897.

Z. Shen, J. Jin, C. Tan, A. Tagami, S. Wang, Q. Li, Q. Zheng, and J. Yuan, (2023). A survey of next-generation computing technologies in space-air-ground integrated networks, ACM Comput. Surv., 56(1); 23.

Y. Zou et al, J. Zhu et al, X. Wang et al, and L. Hanzo et al, (2016). A survey on wireless security: Technical challenges, recent advances, and future trends, Proc. IEEE, 104(9);1727–1765

C. E. Shannon et al, (1949). Communication theory of secrecy systems, Bell Syst. Tech. J., 28(4);656–715.

R. Perez et al, R. Sailer et al, and L. Doorn et al, (2006), vTPM: Virtualizing the trusted platform module, in Proc. 15th Conf. USENIX Security Symposium, Vancouver, Canada, pp. 305–320.

B. Kauer et al, (2007) OSLO: Improving the security of trusted computing, in Proc. 16th Conf. USENIX Security Symposium, Boston, MA, USA, 2007, pp. 1–9.

C. Shen , H. Zhang , H. Wang et, J. Wang , B. Zhao , F. Yan , F. Yu, L. Zhang, and M. Xu, (2010). Research on trusted computing and its development, Sci. China Inf. Sci., 53(3);405–433.

V. Ananthakrishna, & Chandra Shekhar Yadav. (2025). QP-ChainSZKP: A Quantum-Proof Blockchain Framework for Scalable and Secure Cloud Applications. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.718

Downloads

Published

2025-03-25

How to Cite

Ajay N. Upadhyaya, G. Sreenivasula Reddy, Sathyavani Addanki, Rahul Vadisetty, A. Lakshmanarao, Mohaideen A, & G, V. (2025). Securing the Future of Library Cloud Infrastructure with AQFA: Adaptive Quantum-Resistant Authentication. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.696

Issue

Section

Research Article