Hybrid Security Models for Cloud Systems: Blockchain and Quantum Cryptographic Integration

PDF (1189KB), PP.99-111

Views: 0 Downloads: 0

Author(s)

Neethu V. A. 1 Arun Vaishnav 2,* Mohammad Akram Khan 3

1. Department of Computer Science & Engineering, Madhav University, Abu Road, Rajasthan, India

2. Faculty of Computing and Informatics, Sir Padampat Singhania University, Udaipur 313601, Rajasthan, India

3. Department of Computer Science & Application, Madhav University, Abu Road, Rajasthan, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2025.06.08

Received: 15 Dec. 2024 / Revised: 22 Mar. 2025 / Accepted: 25 Jun. 2025 / Published: 8 Dec. 2025

Index Terms

Blockchain Technology, Quantum Cryptography, Hybrid Security Mode, Cloud Security, Quantum Key Distribution (QKD), Data Integrity and Scalability, Post-Quantum Cryptography, Post-Quantum Quasi-Monoalphabetic cryptography (PQQM)

Abstract

The introduction of cloud technology changes the face of data management by eliminating tedious concerns with regards to proper storage and accessibility as it can done from any location, therefore, it can be said that the emergence of this technology came with a number of challenges related to data confidentiality, integrity, and authentication as well. As a resolution to certain weaknesses presented in this case, the authors in this paper suggest a hybrid security model which integrates both quantum cryptography and blockchain technology, and improves security flaws on cloud and quantum models. There are three characteristics of data that are crucial to its safety and security; confidentiality, integrity, and availability, and cloud technology has been known to be accompanied with plenty of challenges concerning these aspects, however, with the use of Blockchain technology, data becomes immutable, decentralized, and transparent thereby reducing the risk of unauthorized access. The combination of strategies proposed in this paper, helps to eliminate a number of drawbacks like key loss, data loss, and man in the middle attacks that are common in cloud infrastructure. This study shows the structural design, data transmission and processes of the architecture for the hybrid model, looking forward to achieve better data security. The analysis of the model suggests its advantages over conventional encryption model and a purely constructed model of blockchain. Performance benchmarks are also included, demonstrating that the model is resilient to cyber threats during the quantum age. The architecture is seamless with the current cloud stature, takes cloud security a notch higher by solving the considerable challenges and is poised to be deployed on a larger scale The directional works will include improving the system’s computational efficiency and extending the model to multiple cloud infrastructures to achieve higher security in today’s complex cloud systems.

Cite This Paper

Neethu V. A., Arun Vaishnav, Mohammad Akram Khan, "Hybrid Security Models for Cloud Systems: Blockchain and Quantum Cryptographic Integration", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.17, No.6, pp. 99-111, 2025. DOI:10.5815/ijieeb.2025.06.08

Reference

[1]Y. Baseri, V. Chouhan, and A. Ghorbani, “Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure,”arXiv preprint arXiv:2404.10659 , 2024.
[2]A. Rahman, Islam, M. J.Islam, R. Aziz, A. Kundu, D. Sazzad,  , “Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks,”arXiv preprint arXiv:2211.15013, 2022.
[3]Arebu Dejen, Murad Ridwan, "A Review of Quantum Computing", International Journal of Mathematical Sciences and Computing, Vol.8, No.4, pp. 49-59, 2022. 
[4]S. Sarker, A. Kumar Saha, and M.S. Ferdous,” A survey on blockchain and cloud integration,” In 2020 23rd International Conference on Computer and Information Technology (ICCIT) (pp. 1-7), IEEE, December 2022.
[5]P. Patil, P. Tulsiani, and S. Mane,” Mitigating Data Sharing in Public Cloud using Blockchain,” arXiv e-prints, arXiv-2404, 2024.
[6]W. Cui, T. Dou, and S. Yan,” Threats and opportunities: Blockchain meets quantum computation,” In 2020 39th Chinese control conference (CCC) (pp. 5822-5824). IEEE, July 2020.
[7]D. Gurung, S. Raj Pokhrel, and Li, G,” Performance Analysis and Evaluation of Post Quantum Secure Block chained Federated Learning,”arXiv preprint arXiv:2306.14772, 2023.
[8]T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka,” Security services using blockchains: A state-of-the-art survey”, IEEE communications surveys and tutorials, 21(1), 858-880 , 2018.
[9]G. Alagic, A. Broadbent, B.  Fefferman, T. Gagliardoni, C. Schaffner, and St. Jules,” Computational security of quantum encryption, “ In Information Theoretic Security: 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers 9 (pp. 47-71). Springer International Publishing,2016.
[10]K. Kaushik, and A. Kumar, “Demystifying quantum blockchain for healthcare”,Security and Privacy, 6(3), e284, 2023.
[11]R. R. Irshad, S. Hussain, I.Nasir, J. A. Zeb, K.M. Alalayah, and I.M. Alwayle,”IoT-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain-based approach toward a trustworthy cloud computing,” IEEE Access, 11, 105479-105498,2023.
[12]D. Dhinakaran, D. Selvaraj, N. Dharini, Raja, and C. Priya,” Towards a novel privacy-preserving distributed multiparty data outsourcing scheme for cloud computing with quantum key distribution,” arXiv preprint arXiv:2407.18923, 2024.
[13]Tohfa Niraula, Aditi Pokharel, Ashmita Phuyal, Pratistha Palikhel, Manish Pokharel, "Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions", International Journal of Wireless and Microwave Technologies, Vol.12, No.5, pp. 10-20, 2022. DOI:10.5815/ijwmt.2022.05.02
[14]Maurice, C. (2023). Micro-architectural side channels: Studying the attack surface from hardware to browsers (Doctoral dissertation, Université de Lille).
[15]Singh, S., Ra, I. H., Meng, W., Kaur, M., & Cho, G. H. (2019). SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology. International Journal of Distributed Sensor Networks, 15(4), 1550147719844159.
[16]Hafeez, S., Khan, A. R., Al-Quraan, M. M., Mohjazi, L., Zoha, A., Imran, M. A., & Sun, Y. (2023). Blockchain-assisted UAV communication systems: A comprehensive survey. IEEE Open Journal of Vehicular Technology, 4, 558-580.
[17]Onieva, J. A., Rios, R., Roman, R., & Lopez, J. (2019). Edge-assisted vehicular networks security. IEEE Internet of Things Journal, 6(5), 8038-8045.
[18]Wu, Y., Dai, H. N., & Wang, H. (2020). Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet of Things Journal, 8(4), 2300-2317.
[19]Leng, J., Zhou, M., Zhao, J. L., Huang, Y., & Bian, Y. (2020). Blockchain security: A survey of techniques and research directions. IEEE Transactions on Services Computing, 15(4), 2490-2510.
[20]Li, W., Wu, J., Cao, J., Chen, N., Zhang, Q., & Buyya, R. (2021). Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions. Journal of Cloud Computing, 10(1), 35.
[21]Dejen, A., & Ridwan, M. (2022). A Review of Quantum Computing. International Journal of Mathematical Sciences and Computing, 8(4), 49-59.
[22]Pitchai, A., Reddy, A. V., & Savarimuthu, N. (2016). Quantum Walk Algorithm to Compute Subgame Perfect Equilibrium in Finite Two-player Sequential Games. International Journal of Mathematical Sciences and Computing, 2(3), 32-40.
[23]Rahaman, M., & Islam, M. M. (2016). An overview on quantum computing as a service (qcaas): Probability or possibility. International Journal of Mathematical Sciences and Computing), 2(1), 16-22.
[24]Layeb, A., & Boussalia, S. R. (2012). A novel quantum inspired cuckoo search algorithm for bin packing problem. International Journal of Information Technology and Computer Science, 4(5), 58-67.
[25]Shah, Y. A., Mir, I. A., & Rathe, U. M. (2016). Quantum Mechanics Analysis: Modeling and Simulation of some simple systems. Int. J. Math. Sci. Comput, 2(1), 23-40.
[26]Jones, N. C. (2013). The Role of Quantum Computing in Bioinformatics. Briefings in Bioinformatics, 14(5), 580-591.
[27]Gottesman, D. (1998). Theory of Fault-Tolerant Quantum Computation. Physical Review A, 57(1), 127-137.A
[28]Ur Rasool, R.; Ahmad, H.F.; Rafique, W.; Qayyum, A.; Qadir, J.; Anwar, Z. Quantum Computing for Healthcare: A Review. Future Internet 2023, 15, 94. https://doi.org/10.3390/fi15030094
[29]Belkhir, M., Benkaouha, H., & Benkhelifa, E. (2022, December). Quantum vs classical computing: a comparative analysis. In 2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC) (pp. 1-8). 
[30]Davis, H., & Günther, F. (2021, June). Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols. In International Conference on Applied Cryptography and Network Security (pp. 448-479). Cham: Springer International Publishing