{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:59:31Z","timestamp":1777658371195,"version":"3.51.4"},"reference-count":31,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,30]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails. With encryption being the dominant method of cloud data security, the advent of quantum computing implies an urgent need to proffer a model that will provide adequate data security for both classical and quantum computing. Thus, most cryptosystems will be rendered susceptible and obsolete, though some cryptosystems will stand the test of quantum computing. The article proposes a model that comprises the application of a variant of McEliece cryptosystem, which has been tipped to replace Rivest\u2013Shamir\u2013Adleman (RSA) in the quantum computing era to secure access control data and the application of a variant of N-th degree truncated polynomial ring units (NTRU) cryptosystem to secure cloud user data. The simulation of the proposed McEliece algorithm showed that the algorithm has a better time complexity than the existing McEliece cryptosystem. Furthermore, the novel tweaking of parameters S and P further improves the security of the proposed algorithms. More so, the simulation of the proposed NTRU algorithm revealed that the existing NTRU cryptosystem had a superior time complexity when juxtaposed with the proposed NTRU cryptosystem.<\/jats:p>","DOI":"10.1515\/comp-2022-0235","type":"journal-article","created":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T09:02:37Z","timestamp":1648717357000},"page":"142-153","source":"Crossref","is-referenced-by-count":26,"title":["Post-quantum cryptography-driven security framework for cloud computing"],"prefix":"10.1515","volume":"12","author":[{"given":"Henry Chima","family":"Ukwuoma","sequence":"first","affiliation":[{"name":"Department of Cyber Security, Federal University of Technology , Akure , Ondo State , Nigeria"}]},{"given":"Gabriel","family":"Arome","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Federal University of Technology , Akure , Ondo State , Nigeria"}]},{"given":"Aderonke","family":"Thompson","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Federal University of Technology , Akure , Ondo State , Nigeria"}]},{"given":"Boniface Kayode","family":"Alese","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Federal University of Technology , Akure , Ondo State , Nigeria"}]}],"member":"374","published-online":{"date-parts":[[2022,3,30]]},"reference":[{"key":"2022081707553250912_j_comp-2022-0235_ref_001","unstructured":"M. N. Daodu, A. Gabriel, B. K. Alese, and A. O. Adetunmbi, \u201cA data encryption standard (DES) based web services security architecture,\u201d Ann Comput Sci Series, Tibiscus Univ, vol. 14, no. 2. pp. 53\u20138, 2016."},{"key":"2022081707553250912_j_comp-2022-0235_ref_002","unstructured":"B. K. Alese, Deign of public key cryptosystem using elliptic curve, Thesis, Akure, Ondo State, Nigeria, The Federal University of Technology, 2004."},{"key":"2022081707553250912_j_comp-2022-0235_ref_003","doi-asserted-by":"crossref","unstructured":"A. F. Thompson, O. E. Oyinloye, M. T. David, and B. K. Alese, \u201cA secured system of Internet Enabled Host Devices,\u201d Netw Commun Technol, vol. 5, no. 1. pp. 26\u201336, 2020.","DOI":"10.5539\/nct.v5n1p26"},{"key":"2022081707553250912_j_comp-2022-0235_ref_004","doi-asserted-by":"crossref","unstructured":"A. J. Gabriel, B. K. Alese, A. O. Adetumbi, and O. S. Adewale, \u201cPost-quantum cryptography based security framework for Cloud Computing,\u201d J Internet Technol Secured Trans, vol. 4, no. 1. pp. 351\u20137, 2015.","DOI":"10.20533\/jitst.2046.3723.2014.0043"},{"key":"2022081707553250912_j_comp-2022-0235_ref_005","unstructured":"A. M. Kuo. Opportunities and Challenges of Cloud Computing to Improve Health Care Services. 2011. Available at: https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC3222190\/. Accessed 02\/03\/2018."},{"key":"2022081707553250912_j_comp-2022-0235_ref_006","unstructured":"S. S. S. Shehata, Post Quantum Cryptography with Random Split of St-Gen Codes, Norwegian University of Science and Technology, Department of Information Security and Communication Technology, 2017. Available at: https:\/\/ntnuopen.ntnu.no\/ntnu-xmlui\/bitstream\/handle\/11250\/2450584\/16929_FULLTEXT.pdf?sequence=1."},{"key":"2022081707553250912_j_comp-2022-0235_ref_007","doi-asserted-by":"crossref","unstructured":"J. Buchmann, and J. Ding, \u201cPost-quantum cryptography\u201d, Second Int Workshop, PQCrypto, 2008, pp. 17\u20139.","DOI":"10.1007\/978-3-540-88403-3"},{"key":"2022081707553250912_j_comp-2022-0235_ref_008","doi-asserted-by":"crossref","unstructured":"L. Chen, S. Jordan, Y. -K. Liu, D. Moody, R. Peralta, R. Perlner et al., Report on post-quantum cryptography, National Institute of Standards and Technology Internal Report 8105, 2016. Available at: https:\/\/dl.acm.org\/doi\/proceedings\/10.5555\/1473109.","DOI":"10.6028\/NIST.IR.8105"},{"key":"2022081707553250912_j_comp-2022-0235_ref_009","unstructured":"D. Micciancio and O. Regev Lattice-based cryptography. 2008. Available at http:\/\/cims.nyu.edu. Accessed 28\/06\/2020."},{"key":"2022081707553250912_j_comp-2022-0235_ref_010","doi-asserted-by":"crossref","unstructured":"D. A. Shafiq, N. Z. Jhanjhi, A. Abdullah, and M. A. Alzain, \u201cA load balancing algorithm for the data centres to optimise cloud computing applications,\u201d IEEE Access, vol. 9, pp. 41731\u201344, 2021, 10.1109\/ACCESS.2021.3065308.","DOI":"10.1109\/ACCESS.2021.3065308"},{"key":"2022081707553250912_j_comp-2022-0235_ref_011","unstructured":"G. Summers, Data and databases, Developing Databases with Access, H. Koehne, editor, Nelson Australia Pty Limited, 2004, pp. 4\u20135. Available at: https:\/\/catalogue.nla.gov.au\/Record\/4610312."},{"key":"2022081707553250912_j_comp-2022-0235_ref_012","doi-asserted-by":"crossref","unstructured":"S. Chandel, G. Yang, and S. Chakravarty, \u201cRSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environment,\u201d Information, vol. 11, p. 382, 2020.","DOI":"10.3390\/info11080382"},{"key":"2022081707553250912_j_comp-2022-0235_ref_013","doi-asserted-by":"crossref","unstructured":"I. J. Awan, M. Shiraz, M. U. Hashmi, Q. Shaheen, R. Akhtar, and A. Ditta, \u201cSecure framework enhancing AES algorithm in cloud computing,\u201d Hindawi, Security Commun Netw, vol. 2020, pp. 1\u201316, 2020.","DOI":"10.1155\/2020\/8863345"},{"key":"2022081707553250912_j_comp-2022-0235_ref_014","unstructured":"M. M. Abdelnapi, F. A. Omara, and N. F. Omra, \u201cA hybrid hashing security algorithm for data storage on cloud computing,\u201d Int J Comput Sci Inf Security (IJCSIS), vol. 14, no. 4, pp. 175\u2013181, 2016."},{"key":"2022081707553250912_j_comp-2022-0235_ref_015","doi-asserted-by":"crossref","unstructured":"R. Kumar, A. S. Naidu, A. Singh, and A. N. Tentu, \u201cMcEliece cryptosystem: simulation and security vulnerabilities,\u201d Int J Comput Sci Mathematics, vol. 12, no. No 1. pp. 64\u201381, 2020.","DOI":"10.1504\/IJCSM.2020.108787"},{"key":"2022081707553250912_j_comp-2022-0235_ref_016","doi-asserted-by":"crossref","unstructured":"N. Rani, N. Juliet, and S. Arunkumar, \u201cA novel cryptosystem for files stored in cloud using NTRU encryption algorithm,\u201d Int J Recent Technol Eng (IJRTE), vol. 9, no. 1. pp. 2277\u20133878, 2020.","DOI":"10.35940\/ijrte.A2536.059120"},{"key":"2022081707553250912_j_comp-2022-0235_ref_017","doi-asserted-by":"crossref","unstructured":"S. Mall, and K. Saroj, \u201cA new security framework for cloud data\u201d, 8th International Conference on Advances in Computing and Communication (ICACC), 2018.","DOI":"10.1016\/j.procs.2018.10.397"},{"key":"2022081707553250912_j_comp-2022-0235_ref_018","unstructured":"R. Wang, Research on data security technology based on cloud storage, 13th Global Congress on Manufacturing and Management, GCMM 2016, 2016."},{"key":"2022081707553250912_j_comp-2022-0235_ref_019","unstructured":"M. Kindberg, \u201cA usability study of post-quantum algorithms\u201d, Master\u2019s thesis, Lund, Sweden, Department of Electrical and Information Technology Lund University, 2017, Retrieved from https:\/\/pdfs.semanticscholar.org\/8ed3\/7b0e436e96384bfb14f02ea21c9a9f84ee65.pdf. Accessed 21\/09\/2020."},{"key":"2022081707553250912_j_comp-2022-0235_ref_020","unstructured":"D. J. Bernstein, N. Heninger, P. Lou, and L. Valenta, Post-quantum RSA, 2017, Available at https:\/\/cr.yp.to\/papers\/pqrsa-20170419.pdf. Accessed 04\/06\/2018."},{"key":"2022081707553250912_j_comp-2022-0235_ref_021","unstructured":"S. Pavithra and S. Baskar, \u201cLattice based multiplier for WSN applications for ECC,\u201d Int J Trend Res Dev, vol. 2, no. 6, pp. 21\u201327, 2015."},{"key":"2022081707553250912_j_comp-2022-0235_ref_022","doi-asserted-by":"crossref","unstructured":"P. Zhang, J. Xu, H. Muazu, and W. Mao, \u201cAccess control research on data security in cloud computing\u201d, 2015 IEEE 16th International Conference on Communication Technology (ICCT), Hangzhou, China, 2015, pp.874\u201344.","DOI":"10.1109\/ICCT.2015.7399964"},{"key":"2022081707553250912_j_comp-2022-0235_ref_023","doi-asserted-by":"crossref","unstructured":"A. Zalekian, M. Esmaeildoust, and A. Kaabi, \u201cEfficient implementation of NTRU cryptography using residue number system,\u201d Int J Comput Appl (0975 \u2013 8887), vol. 124, no. 7. pp. 33\u20137, 2015.","DOI":"10.5120\/ijca2015905527"},{"key":"2022081707553250912_j_comp-2022-0235_ref_024","unstructured":"A. Siam, H. El-khobby, S. Abd Elkader, and M. AbdelNaby, \u201cEnhanced data security model for cloud computing platform,\u201d Int J Sci Res Science, Eng Technol, vol. 1, no. 4, pp. 450\u2013460, 2015."},{"key":"2022081707553250912_j_comp-2022-0235_ref_025","unstructured":"D. V. Kumar, \u201cA hybrid security protocol using python,\u201d Int J Comput Sci Inf Technol Res, vol. 2, no. 4, pp. 9\u201316, 2014."},{"key":"2022081707553250912_j_comp-2022-0235_ref_026","unstructured":"L. Ducas, V. Lyubashevsky, and T. Prest, Identity-based encryption NTRU lattices, 2014, https:\/\/eprint.iacr.org\/2014\/794. Accessed 28\/07\/2020."},{"key":"2022081707553250912_j_comp-2022-0235_ref_027","unstructured":"O. D. Alowolodu, B. K. Alese, A. O. Adetunmbi, O. S. Adewale, and O. S. Ogundele, \u201cElliptic curve cryptography for securing cloud computing applications,\u201d Int J Comput Appl (0975 \u2013 8887), vol. 66, no. 23, pp. 11\u201317, 2013."},{"key":"2022081707553250912_j_comp-2022-0235_ref_028","unstructured":"P. Dhawan, \u201cData security model for cloud computing,\u201d Int J Res Sci Technol (IJRST) 2013, vol. No. 2, no. V, pp. 264\u2013271, 2013."},{"key":"2022081707553250912_j_comp-2022-0235_ref_029","unstructured":"U. P. B. Ivy, P. Mandiwa, and M. Kumar, \u201cA modified RSA cryptosystem based on \u2018n\u2019 prime numbers,\u201d Int J Eng Comput Sci, vol. 1, no. 2. pp. 63\u20136, 2012, ISSN:2319-7242."},{"key":"2022081707553250912_j_comp-2022-0235_ref_030","doi-asserted-by":"crossref","unstructured":"S. H. Gill, M. A. Razzaq, M. Ahmad, F. M. Almansour, I. Haq, N. Z. Jhanjhi, et al., \u201cSecurity and privacy aspects of cloud computing: a smart campus case study,\u201d Intell Autom Soft Comput, vol. 31, no. 1, pp. 117\u2013128, 2022, 10.32604\/iasc.2022.016597.","DOI":"10.32604\/iasc.2022.016597"},{"key":"2022081707553250912_j_comp-2022-0235_ref_031","doi-asserted-by":"crossref","unstructured":"H. Kharche and D. S. Chouhan, \u201cBuilding trust in cloud using public key infrastructure,\u201d (IJACSA) Int J Adv Comput Sci Appl, vol. 3, no. 3. p. 2012, 2012.","DOI":"10.14569\/IJACSA.2012.030305"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0235\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0235\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T08:04:08Z","timestamp":1660723448000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0235\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3,16]]},"published-print":{"date-parts":[[2022,3,16]]}},"alternative-id":["10.1515\/comp-2022-0235"],"URL":"https:\/\/doi.org\/10.1515\/comp-2022-0235","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}