{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:17:04Z","timestamp":1749010624215,"version":"3.41.0"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319321660"},{"type":"electronic","value":"9783319321684"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32168-4_8","type":"book-chapter","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T11:46:09Z","timestamp":1464867969000},"page":"241-272","source":"Crossref","is-referenced-by-count":0,"title":["Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service"],"prefix":"10.1007","author":[{"given":"Omer K.","family":"Jasim Mohammad","sequence":"first","affiliation":[]},{"given":"El-Sayed M.","family":"El-Horbaty","sequence":"additional","affiliation":[]},{"given":"Abdel-Badeeh M.","family":"Salem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,3]]},"reference":[{"key":"8_CR1","unstructured":"Nelson, G., Charles, M., Fernando, R., Marco, S., Teresa, C., Mats, N., Makan, P.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud. Comput. Adv. Syst. Appl. 1(11), 34\u201351 (2014)"},{"key":"8_CR2","volume-title":"Distributed Computing","author":"M Sunita","year":"2013","unstructured":"Sunita, M., Seema, S.: Distributed Computing, 2nd edn. Oxford University Press, New York (2013)","edition":"2"},{"issue":"5","key":"8_CR3","first-page":"67","volume":"3","author":"K Chander","year":"2013","unstructured":"Chander, K., Yogesh, S.: Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 67\u201378 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"8_CR4","unstructured":"Mohammad, A., John, B., Ingo, T.: An analysis of the cloud computing security problem. In: APSE 2010 Proceeding\u2014Cloud Workshop, Sydney, Australia, pp. 56\u201364 (2010)"},{"key":"8_CR5","unstructured":"Faiza, F.: Management of symmetric cryptographic keys in a cloud-based environment. In: A 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 90\u201398 (2012)"},{"key":"8_CR6","volume-title":"Cloud Security, and Privacy; An Enterprise Perspective on Risks and Compliance","author":"T Mather","year":"2013","unstructured":"Mather, T., Kumaraswamy, S.: Cloud Security, and Privacy; An Enterprise Perspective on Risks and Compliance, 1st edn. O\u2019Reilly Media, Sebastopol (2013)","edition":"1"},{"key":"8_CR7","first-page":"1","volume":"8","author":"CSA","year":"2012","unstructured":"CSA: Security a-a-services guidance for critical areas in cloud computing. Category 8, 1\u201321 (2012)","journal-title":"Category"},{"issue":"2","key":"8_CR8","first-page":"45","volume":"6","author":"OK Jasim","year":"2014","unstructured":"Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Cryptographic cloud computing environment as a more trusted communication environment. Int. J. Grid. High. Perform. Comput. (IJGHPC) 6(2), 45\u201360 (2014)","journal-title":"Int. J. Grid. High. Perform. Comput. (IJGHPC)"},{"key":"8_CR9","unstructured":"Sekar, A., Radhika, S., Anand, K.: Secure communication using 512 bit key. Eur. J. Sci. Res. 52(1), 61\u201365, 90\u2013104 (2012)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Doelitzscher, F., Reich, C., Kahl, M., Clarke, N.: An autonomous agent-based incident detection system for cloud computing. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS. pp. 197\u2013204 (2011)","DOI":"10.1109\/CloudCom.2011.35"},{"key":"8_CR11","unstructured":"Lejiang, G., XiangPing, C., Chao, G., Wang, D.P.: The intelligence security control platform based on cloud and trusted computing technology. In: International Conference on Electrical and Computer Engineering, Advances in Biomedical Engineering, vol. 11, pp. 221\u2013229 (2012)"},{"issue":"8","key":"8_CR12","first-page":"87","volume":"7","author":"Q Wang","year":"2012","unstructured":"Wang, Q., Cong, X., Min, S.: Protecting privacy by multi-dimensional K-anonymity. J. Softw. 7(8), 87\u201390 (2012)","journal-title":"J. Softw."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Hossein, R., Elankovan, S., Zulkarnain, A., Abdullah, M.: Encryption as a service (EaaS) as a solution for cryptography in cloud. In: 4th International Conference on Electrical Engineering and Informatics, ICEEI\u201913, vol. 11, pp. 1202\u20131210 (2013)","DOI":"10.1016\/j.protcy.2013.12.314"},{"issue":"1","key":"8_CR14","first-page":"56","volume":"1","author":"N Esh","year":"2012","unstructured":"Esh, N., Mohit, P., Aman, B., Prem, H.: To enhance the data security of cloud in cloud computing using RSA algorithm. Int. J. Softw. Eng. 1(1), 56\u201364 (2012)","journal-title":"Int. J. Softw. Eng."},{"key":"8_CR15","unstructured":"Soren, B., Sven, B., Hugo, I.: Client\u2013controlled cryptography-as-a-service in the cloud. In: Proceedings of 11th International Conference, ACNS 2013, vol. 7954, pp. 74\u201382. Springer (2013)"},{"issue":"10","key":"8_CR16","first-page":"156","volume":"2","author":"K Mandeep","year":"2012","unstructured":"Mandeep, K., Manish, G.: Implementing various encryption algorithms to enhance the data security of cloud in cloud computing. Int. J. Comput. Sci. Inf. Technol. 2(10), 156\u2013204 (2012)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Dabrowski, C., Mills, K.: VM leakage and orphan control in open source cloud. In: 3rd IEEE International on Cloud Computing Technology and Sciences, CloudCom 2011, CPS, pp. 554\u2013559 (2011)","DOI":"10.1109\/CloudCom.2011.84"},{"key":"8_CR18","unstructured":"Emmanuel, S., Navdeep, A., Prashant, T., Bhanu, P.: Cloud computing: data storage security analysis and its challenges. Int. J. Comput. Appl. 70(24), 98\u2013105 (2013). ISSN 0975-8887"},{"key":"8_CR19","unstructured":"William, S.: Cryptography and Network Security, a Library of Congress Cataloging, 5th edn. Prentice Hall (2012). ISBN 13; 978-0-13609704-4"},{"key":"8_CR20","unstructured":"Winkler, J.: Securing the Cloud: Cloud Computer Security Techniques and Tactics, a Library of Congress Cataloging. Elsevier (2011). ISBN 13; 978-1-59749-592-9"},{"issue":"3","key":"8_CR21","first-page":"23","volume":"3","author":"A Padmapriya","year":"2013","unstructured":"Padmapriya, A., Subhas, P.: Cloud computing: security challenges and encryption practices. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 23\u201331 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Manpreet, R., Rajbir, V.: Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int. J. Comput. Appl. 70(18) (2013)","DOI":"10.5120\/12167-8127"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Hauschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE ICCC, Bangalore, pp. 109\u2013116 (2009)","DOI":"10.1109\/CLOUD.2009.60"},{"key":"8_CR24","unstructured":"Gawain, B., Waugh, R., Patil, S.: Enhancement of data security in cloud computing environment. Int. J. Internet Comput. 1(3), 123\u2013132 (2012)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Farhad, A., Seyed, S., Athula, G.: Cloud computing: security and reliability issues. Commun. IBIMA 1(655710) (2013)","DOI":"10.5171\/2013.655710"},{"key":"8_CR26","unstructured":"Eman, M., Hatem, S., Sherif, E.: Enhanced data security model for cloud computing. In: 8th International Conference on Informatics and Systems (INFO2012), Egypt, pp. 12\u201317 (2012)"},{"key":"8_CR27","unstructured":"Sanjo, S., Jasmeet, S.: Implementing cloud data security by encryption using Rijndael. Global J. Comput. Sci. Technol. Cloud Distrib. 13(4), 56\u201364 (2013)"},{"key":"8_CR28","unstructured":"Syam, P., Subramanian, R., Thamizh, D.: Ensuring data security in cloud computing using sobol sequence. In: Proceeding of 1st International Conference on Parallel, Distributed and Grid Computing (PDGC) (2010). IEEE 978-1-4244-7674-9\/10"},{"key":"8_CR29","unstructured":"Wesam, D., Ibrahim, T., Christoph, M.: Infrastructure as a service security: challenges and solution. In: The Proceeding of 7th International Conference on Informatics and Systems (INFOS), Egypt, pp. 89\u201395 (2010)"},{"key":"8_CR30","first-page":"167","volume":"3","author":"S Arif","year":"2011","unstructured":"Arif, S., Olariu, S., Wang, J., Yan, G., Yang, W., Khalil, I.: Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Trans. Parallel Distrib. Syst. 3, 167\u2013177 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"8_CR31","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 98\u2013105 (2010)"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Klems, K., Lenk, K., Nimis, J., Sandholm, T., Tai, T.: What\u2019s inside the cloud? An architectural map of the cloud landscape. In: IEEE Xplore, pp. 23\u201331 (2009)","DOI":"10.1109\/CLOUD.2009.5071529"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: A comparative study of modern encryption algorithms based on cloud computing environment. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, pp. 536\u2013541 (2013)","DOI":"10.1109\/ICITST.2013.6750258"},{"key":"8_CR34","unstructured":"Kraska, F.: Building database applications in the cloud, Swiss federal institute of technology (2010)"},{"key":"8_CR35","unstructured":"Global Net optex Incorporated (2009) Demystifying the cloud, important opportunities and crucial choices, http:\/\/www.gni.com , pp. 4\u201314"},{"key":"8_CR36","unstructured":"Gongjun, Y., Ding, W., Stephan, O., Michele, C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 67\u201373 (2013)"},{"key":"8_CR37","unstructured":"Patil, D., Akshay, R.: Data security over cloud emerging trends in computer science and information technology. In: Proceeding Published in International Journal of Computer Applications, pp. 123\u2013147 (2012)"},{"key":"8_CR38","unstructured":"Itani, W., Kayassi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International Conference on Energy Aware Computing (ICEAC10), Egypt, pp. 234\u2013241 (2012)"},{"key":"8_CR39","unstructured":"Solange, G., Mohammed, A.: Applying QKD to reach unconditional security in communications, European research project SECOQC, www.secoqc.net (2014)"},{"issue":"4","key":"8_CR40","first-page":"351","volume":"4","author":"Stephen S Yau","year":"2010","unstructured":"Yau, Stephen S., Ho, G.An.: Confidentiality protection in cloud computing systems. Int. J. Softw. Inform. 4(4), 351\u2013363 (2010)","journal-title":"Int. J. Softw. Inform."},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy (SP \u201907), pp. 321\u2013334 (2011)","DOI":"10.1109\/SP.2007.11"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Cutillo, A., Molva, R., Strufe, T.: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. (2012)","DOI":"10.1109\/WoWMoM.2011.5986118"},{"key":"8_CR43","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-540-78532-3_5","volume":"121","author":"C Trugenberger","year":"2008","unstructured":"Trugenberger, C., Diamantini, C.: Quantum associative pattern retrieval. Stud. Comput. Intell. (SCI) 121, 103\u2013113 (2008)","journal-title":"Stud. Comput. Intell. (SCI)"},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"Christain, K., Mario, P.: Applied Quantum Cryptography, Lecture Notes in Physics, vol. 797. Springer, Berlin (2010). doi: 10.1007\/978-3-642-04831-9","DOI":"10.1007\/978-3-642-04831-9"},{"key":"8_CR45","unstructured":"Ammar, O., Khaled, E., Muneer, A., Eman, A.: Quantum key distribution by using RSA. In: Proceedings of 3rd International Conference on Innovative Computing Technology (INTECH), pp. 123\u2013128 (2013)"},{"key":"8_CR46","unstructured":"Jasim, O.K., Anas, A.: The goals of parity bits in quantum key distribution system. Int. J. Comput. Appl. 56(18), 5\u20139 (2012)"},{"issue":"3418","key":"8_CR47","first-page":"56","volume":"5","author":"G Dani","year":"2014","unstructured":"Dani, G.: An experimental implementation of oblivious transfer in the noisy storage model. Nat. Commun. J. 5(3418), 56\u201364 (2014)","journal-title":"Nat. Commun. J."},{"issue":"7","key":"8_CR48","first-page":"23","volume":"1","author":"V Rawal","year":"2012","unstructured":"Rawal, V., Dhamija, A., Sharma, S.: Revealing new concepts in cryptography & clouds. Int. J. Sci. Technol. Res. 1(7), 23\u201333 (2012)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Quantum key distribution: simulation and characterizations. In: International Conference on Communication, Management and Information Technology (ICCMIT 2015), Procedia Computer Science, pp. 78\u201388, Prague (2015)","DOI":"10.1016\/j.procs.2015.09.014"},{"key":"8_CR50","volume-title":"Daylight Operation of a Free Space, Entanglement-Based Quantum Key Distribution System","author":"P Matthew","year":"2008","unstructured":"Matthew, P., Caleb, H., Lamas, L., Christian, K.: Daylight Operation of a Free Space, Entanglement-Based Quantum Key Distribution System. National University of Singapore, Centre for Quantum Technologies, Singapore (2008)"},{"key":"8_CR51","doi-asserted-by":"crossref","unstructured":"Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Statistical analysis of random bits generation of quantum key distribution. In: 3rd IEEE-International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), pp. 45\u201352 (2014)","DOI":"10.1109\/CyberSec.2014.6913970"},{"issue":"23","key":"8_CR52","first-page":"56","volume":"3","author":"G Matthew","year":"2013","unstructured":"Matthew, G.: Statistical tests of randomness on QKD through a free-space channel coupled to daylight noise. J. Lightwave Technol. 3(23), 56\u201368 (2013)","journal-title":"J. Lightwave Technol."},{"key":"8_CR53","unstructured":"Aidan, F., Hans, V., Patrick, L., Damian, F.: (2012) Microsoft Private Cloud Computing. Wiley, ISBN: 978-1-118-25147-8"},{"key":"8_CR54","doi-asserted-by":"crossref","unstructured":"Sharif, M.S.: Quantum cryptography: a new generation of information technology security system. In: 6th International Conference on Information Technology: New Generations, pp. 1644\u20131648 (2009)","DOI":"10.1109\/ITNG.2009.173"},{"key":"8_CR55","unstructured":"Woolley, R., Fletcher, D.: The hybrid cloud: bringing cloud-based IT services to state government (2009)"},{"key":"8_CR56","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-540-78532-3_3","volume":"121","author":"A Raheel","year":"2008","unstructured":"Raheel, A., Stuart, B., Elizabeth, C., Kavitha, G., James, E.: Quantum simultaneous recurrent networks for content addressable memory. Stud. Comput. Intell. (SCI) 121, 57\u201374 (2008)","journal-title":"Stud. Comput. Intell. (SCI)"},{"key":"8_CR57","unstructured":"Center for Quantum Technology, http:\/\/www.quantumlah.org\/research\/topic\/qcrypto . Accessed 1 Sept 2014"},{"key":"8_CR58","unstructured":"Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Advanced encryption standard development based quantum key distribution. In: 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), UK, pp. 343\u2013354 (2014)"}],"container-title":["Intelligent Systems Reference Library","New Approaches in Intelligent Control"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32168-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T20:25:16Z","timestamp":1748982316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32168-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319321660","9783319321684"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32168-4_8","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2016]]}}}