QP-ChainSZKP: A Quantum-Proof Blockchain Framework for Scalable and Secure Cloud Applications
DOI:
https://doi.org/10.22399/ijcesen.718Keywords:
Quantum-Resistant Cryptography, Zero-Knowledge Proofs, Cloud Security, Blockchain Technology, Scalable Cryptographic FrameworkAbstract
In the rapidly evolving landscape of cloud computing, the burgeoning growth and centralization of data exacerbate security vulnerabilities, necessitating robust and scalable cryptographic solutions. This paper introduces the QP-ChainSZKP framework, a novel architecture that amalgamates Quantum-Secure Cryptographic Algorithms with Zero-Knowledge Proof Management to shield cloud environments against both classical and emerging quantum threats. The proposed QP-ChainSZKP framework effectively integrates advanced cryptographic techniques, enhancing the security protocols and compliance measures required for robust cloud operations. This ensures not only adherence to high-security standards but also provides strong protection against data breaches and unauthorized access, crucial for maintaining data integrity and confidentiality in cloud environments. We employ a dual approach in our methodology by simulating and rigorously testing the framework to evaluate its security, scalability, and performance metrics. The experimental results demonstrate a significant enhancement in transaction throughput and reduction in latency, corroborating the framework’s capability to manage high throughput cloud applications effectively. Specifically, the framework achieves a throughput improvement of 20% and a latency reduction of 30% under peak load scenarios, establishing its efficacy in handling dynamic cloud environments. Notably, the QP-ChainSZKP framework addresses future quantum computational threats by modifying existing cryptographic practices used in public clouds, setting a pioneering standard for using advanced cryptographic technologies in cloud security. Our study contributes a scalable, quantum-resistant solution tailored for extensive cloud applications, marking a substantial advancement in cloud computing security frameworks that can meet the imminent global security requirements.
References
Singh, Vineeta, and Vandana Dixit Kaushik. (2024). Navigating the Landscape of Security Threat Analysis in Cloud Computing environments. In Security and Risk Analysis for Intelligent Cloud Computing. 1-25. CRC Press.
Angel, Nancy A., Dakshanamoorthy Ravindran, PM Durai Raj Vincent, Kathiravan Srinivasan, and Yuh-Chung Hu. (2021). Recent advances in evolving computing paradigms: Cloud, edge, and fog technologies. Sensors. 22(1): 196. DOI: 10.3390/s22010196
Ionescu, Sergiu-Alexandru, and Vlad Diaconita. (2023). Transforming financial decision-making: the interplay of AI, cloud computing and advanced data management technologies. International Journal of Computers Communications & Control. 18(6). DOI:10.15837/ijccc.2023.6.5735
Aceto, Giuseppe, Valerio Persico, and Antonio Pescapé. (2020). Industry 4.0 and health: Internet of things, big data, and cloud computing for healthcare 4.0. Journal of Industrial Information Integration. 18 100129. DOI: 10.1016/j.jii.2020.100129
Bharany, Salil, Sandeep Sharma, Osamah Ibrahim Khalaf, Ghaida Muttashar Abdulsahib, Abeer S. Al Humaimeedy, Theyazn HH Aldhyani, Mashael Maashi, and Hasan Alkahtani. (2022). A systematic survey on energy-efficient techniques in sustainable cloud computing. Sustainability. 14(10): 6256. DOI:10.3390/su14106256
Alaghbari, Khaled A., Mohamad Hanif Md Saad, Aini Hussain, and Muhammad Raisul Alam. (2022). Complex event processing for physical and cyber security in datacentres-recent progress, challenges and recommendations. Journal of Cloud Computing. 11(1): 65. DOI:10.1186/s13677-022-00338-x
Lone, Aejaz Nazir, Suhel Mustajab, and Mahfooz Alam. (2023). A comprehensive study on cybersecurity challenges and opportunities in the IoT world. Security and Privacy. 6(6): e318. DOI:10.1002/spy2.318
Jimmy, F. N. U. (2024). Cyber security Vulnerabilities and Remediation Through Cloud Security Tools. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023. 2(1): 129-171. DOI: 10.60087/jaigs.v2i1.102
Stutz, Dalmo, Joaquim T. de Assis, Asif A. Laghari, Abdullah A. Khan, Nikolaos Andreopoulos, Andrey Terziev, Anand Deshpande, Dhanashree Kulkarni, and Edwiges GH Grata. (2024). Enhancing Security in Cloud Computing Using Artificial Intelligence (AI). Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection. 179-220. DOI:10.1002/9781394196470.ch11
Anthi, Eirini, Lowri Williams, Vasilis Ieropoulos, and Theodoros Spyridopoulos. (2024). Investigating Radio Frequency Vulnerabilities in the Internet of Things (IoT). IoT. 5(2): 356-380. DOI:10.3390/iot5020018
Baseri, Yaser, Vikas Chouhan, and Ali Ghorbani. (2024). Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure. arXiv preprint arXiv:2404.10659. DOI: 10.48550/arXiv.2404.10659
Rahul, R., S. Geetha, Soniya Priyatharsini, K. Mehata, Ts Sundaresan Perumal, N. Ethiraj, and S. Sendilvelan. (2024). Cybersecurity Issues and Challenges in Quantum Computing. Topics in Artificial Intelligence Applied to Industry 4.0. 203-221. DOI:10.1002/9781394216147.ch11
Bhat, M. Iqbal, and Kaiser J. Giri. (2021).Impact of computational power on cryptography. Multimedia Security: Algorithm Development, Analysis and Applications. 45-88. DOI:10.1007/978-981-15-8711-5_4
Vaishnavi, Anshika, and Samaya Pillai. (2021). Cybersecurity in the quantum era-a study of perceived risks in conventional cryptography and discussion on post quantum methods. In Journal of Physics: Conference Series. 1964(4): 042002. IOP Publishing. DOI:10.1088/1742-6596/1964/4/042002
Rosch-Grace, Dominic, and Jeremy Straub. (2022). Analysis of the likelihood of quantum computing proliferation. Technology in Society. 68: 101880. DOI:10.1016/j.techsoc.2022.101880
Rajawat, Anand Singh, S. B. Goyal, Chaman Verma, and Jaiteg Singh. (2024). Advancing network security paradigms integrating quantum computing models for enhanced protections. In Applied Data Science and Smart Systems, pp. 517-528. DOI:10.1201/9781003471059-66
Atiewi, Saleh, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, and Yaser Jararweh. (2020). Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access. 8: 113498-113511. DOI:10.1109/ACCESS.2020.3002815
Javadpour, Amir, Forough Ja’fari, Tarik Taleb, Yue Zhao, Yang Bin, and Chafika Benzaïd. (2023). Encryption as a service for IoT: opportunities, challenges and solutions. IEEE Internet of Things Journal. 11(5): 7525-7558. DOI:10.1109/JIOT.2023.3341875
Wang, Wenjia, Seyed Masoud Sadjadi, and Naphtali Rishe. (2024). A Survey of Major Cybersecurity Compliance Frameworks. In 2024 IEEE 10th Conference on Big Data Security on Cloud (BigDataSecurity), IEEE. 23-34. DOI:10.1109/BigDataSecurity62737.2024.00013
Apeh, Apeh Jonathan, Azeez Olanipekun Hassan, Olajumoke Omotola Oyewole, Ololade Gilbert Fakeyede, Patrick Azuka Okeleke, and Olubukola Rhoda Adaramodu. (2023). GRC strategies in modern cloud infrastructures: a review of compliance challenges. Computer Science & IT Research Journal. 4(2): 111-125. DOI:10.51594/csitrj.v4i2.609
Rani, Sita, Pankaj Bhambri, and Aman Kataria. (2023). Integration of IoT, Big Data, and Cloud Computing Technologies: Trend of the Era. In Big Data, Cloud Computing and IoT. 1-21. Chapman and Hall/CRC,.
Reddy, M. Vijay Bhasker, Rajiv Kumar, Akash Bag, Abdulnaser A. Hagar, G. Vaitheeswaran, and Vikas Tripath. (2022). The multi layer security network authentication system development through blockchain technology. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). 259-264. IEEE,. DOI:10.1109/ICACITE53722.2022.9823909
Zhou, Lu, Abebe Diro, Akanksha Saini, Shahriar Kaisar, and Pham Cong Hiep. (2024). Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities. Journal of Information Security and Applications. 80: 103678. DOI:10.1016/j.jisa.2023.103678
Xu, Yuqing, Guangxia Xu, Yong Liu, Yuan Liu, and Ming Shen. (2024). A survey of the fusion of traditional data security technology and blockchain. Expert Systems with Applications. 252(5): 124151. DOI:10.1016/j.eswa.2024.124151
Zhang, Bingxue, Guangguang Lu, Pengpeng Qiu, Xumin Gui, and Yang Shi. (2023). Advancing federated learning through verifiable computations and homomorphic encryption. Entropy. 25(11): 1550. DOI:10.3390/e25111550
Du, Zhiqiang, Wenlong Jiang, Chenguang Tian, Xiaofeng Rong, and Yuchao She. (2023). Blockchain-based authentication protocol design from a cloud computing perspective. Electronics. 12(9): 2140. DOI: 10.3390/electronics12092140
Casanova-Marqués, Raúl, Joaquín Torres-Sospedra, Jan Hajny, and Michael Gould. (2023). Maximizing privacy and security of collaborative indoor positioning using zero-knowledge proofs. Internet of Things. 22: 100801. DOI: 10.1016/j.iot.2023.100801
Exceline, C. Eben, and Sivakumar Nagarajan. (2024). Flexible access control mechanism for cloud stored EHR using consortium blockchain. International Journal of System Assurance Engineering and Management. 15(1): 503-518. DOI:10.21203/rs.3.rs-397642/v1
Sucharitha, G., Vedula Sitharamulu, Sachi Nandan Mohanty, Anjanna Matta, and Deepa Jose. (2023). Enhancing secure communication in the cloud through blockchain assisted-cp-dabe. IEEE Access. 1(1):99. DOI:10.1109/ACCESS.2023.3312609
Yang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang, and Yan Li. (2023). A review of homomorphic encryption for privacy-preserving biometrics. Sensors. 23(7): 3566. DOI:10.3390/s23073566
Doan, Thi Van Thao, Mohamed-Lamine Messai, Gérald Gavin, and Jérôme Darmont. (2023). A survey on implementations of homomorphic encryption schemes. The Journal of Supercomputing. 79(13): 15098-15139. DOI:10.21203/rs.3.rs-2018739/v1
Mahato, Ganesh Kumar, and Swarnendu Kumar Chakraborty. (2023). A comparative review on homomorphic encryption for cloud security. IETE Journal of Research. 69(8): 5124-5133. DOI:10.1080/03772063.2021.1965918
Saxena, Urvashi Rahul, and Taj Alam. (2023). Role-based access using partial homomorphic encryption for securing cloud data. International Journal of System Assurance Engineering and Management. 14(3): 950-966. DOI: 10.1007/s13198-023-01896-2
Komar, Rajesh, and Arjun Patil. (2023). Emerging Trends in Cloud Computing: A Comprehensive Analysis of Deployment Models and Service Models for Scalability, Flexibility, and Security Enhancements. Journal of Intelligent Systems and Applied Data Science. 1(1): 20-28.
Nguyen, Hoa T., Prabhakar Krishnan, Dilip Krishnaswamy, Muhammad Usman, and Rajkumar Buyya. (2024). Quantum Cloud Computing: A Review, Open Problems, and Future Directions. arXiv preprint arXiv:2404.11420. DOI:10.48550/arXiv.2404.11420
Srivastava, Tanya, Bharat Bhushan, Saurabh Bhatt, and AKM Bhalul Haque. (2022). Integration of quantum computing and blockchain technology: a cryptographic perspective. In Multimedia Technologies in the Internet of Things Environment. 3: 197-228. Singapore: Springer Singapore,. DOI:10.1007/978-981-19-0924-5_12
Huang, Jose Luis Lo, and Vincent C. Emeakaroha. (2024). Performing Distributed Quantum Calculations in a Multi-cloud Architecture Secured by the Quantum Key Distribution Protocol. SN Computer Science. 5(4): 410. DOI:10.1007/s42979-024-02761-0
Preskill, John. (2023). Quantum computing 40 years later. In Feynman Lectures on Computation. pp. 193-244. CRC Press,. DOI: 10.48550/arXiv.2106.10522
Yu, Wang-Ke, and Xi-En Cheng. (2023). New Post-quantum Blockchain Privacy Protection Scheme Based on the Signcryption. International Journal of Network Security. 25(3): 495-501. DOI:10.6633/IJNS.202305 25(3).13
Wazid, Mohammad, Ashok Kumar Das, and Youngho Park. (2024). Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research. IEEE Open Journal of the Computer Society. 99: 1-20. DOI:10.1109/OJCS.2024.3397307
Kuznetsov, Oleksandr, Alex Rusnak, Anton Yezhov, Dzianis Kanonik, Kateryna Kuznetsova, and Stanislav Karashchuk. (2024). Enhanced Security and Efficiency in Blockchain with Aggregated Zero-Knowledge Proof Mechanisms. IEEE Access. 1(1): 99. DOI:10.1109/ACCESS.2024.3384705
Bai, Tianyu, Yangsheng Hu, Jianfeng He, Hongbo Fan, and Zhenzhou An. (2022). Health-zkIDM: a healthcare identity system based on fabric blockchain and zero-knowledge proof. Sensors. 22(20): 7716. DOI:10.3390/s22207716
Feng, Tao, Pu Yang, Chunyan Liu, Junli Fang, and Rong Ma. (2022). Blockchain Data Privacy Protection and Sharing Scheme Based on Zero‐Knowledge Proof. Wireless Communications and Mobile Computing 2022: 1-11. DOI:10.1155/2022/1040662
Zhang, Ye, Shuo Wang, Xian Zhang, Jiangbin Dong, Xingzhong Mao, Fan Long, Cong Wang, Dong Zhou, Mingyu Gao, and Guangyu Sun. (2021). Pipezk: Accelerating zero-knowledge proof with a pipelined architecture.” In 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA), pp. 416-428. IEEE,. DOI:10.1109/ISCA52012.2021.00040
Abdelkhalek, Kais, Wissam Chemissany, Leander Fiedler, Gianpiero Mangano, and René Schwonnek. (2016). Optimal uncertainty relations in a modified Heisenberg algebra. Physical Review D. 94(12): 123505. DOI: 10.1103/PhysRevD.94.123505
Fahim, Shahriar, S. Katibur Rahman, and Sharfuddin Mahmood. (2023). Blockchain: A comparative study of consensus algorithms PoW, PoS, PoA, PoV. Int. J. Math. Sci. Comput. 3: 46-57. DOI:10.5815/ijmsc.2023.03.04
Khalil, Muhammad Khuram, Marwa Al Jahdhami, and Vishal Dattana. (2023). Cloud Storage Security Compliance: An Analysis of Standards and Regulations. Journal of Student Research.
M. Husain Bathushaw, & S. Nagasundaram. (2024). The Role of Blockchain and AI in Fortifying Cybersecurity for Healthcare Systems. International Journal of Computational and Experimental Science and Engineering, 10(4);1120-1129. https://doi.org/10.22399/ijcesen.596
TAKAOĞLU, M., ÖZYAVAŞ, A., AJLOUNİ, N., DURSUN, T., TAKAOĞLU, F., & DEMİR, S. (2023). OTA 2.0: An Advanced and Secure Blockchain Steganography Algorithm . International Journal of Computational and Experimental Science and Engineering, 9(4), 419–434. Retrieved from https://ijcesen.com/index.php/ijcesen/article/view/289
Prasada, P., & Prasad, D. S. (2024). Blockchain-Enhanced Machine Learning for Robust Detection of APT Injection Attacks in the Cyber-Physical Systems. International Journal of Computational and Experimental Science and Engineering, 10(4);799-810. https://doi.org/10.22399/ijcesen.539
BENTAJER, A., HEDABOU , M., ENNAAMA, F., & ELFEZAZİ , S. (2020). Development of Design for Enhancing Trust in Cloud’s SPI Stack. International Journal of Computational and Experimental Science and Engineering, 6(1), 13–18. Retrieved from https://ijcesen.com/index.php/ijcesen/article/view/109
El-Taj, H. (2024). A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication. International Journal of Computational and Experimental Science and Engineering, 10(3);434-460. https://doi.org/10.22399/ijcesen.382
Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4);1041-1049. https://doi.org/10.22399/ijcesen.417
P., V., & A., M. R. (2024). A Scalable, Secure, and Efficient Framework for Sharing Electronic Health Records Using Permissioned Blockchain Technology. International Journal of Computational and Experimental Science and Engineering, 10(4);827-834. https://doi.org/10.22399/ijcesen.535
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.