{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T06:05:11Z","timestamp":1743314711066},"reference-count":30,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<p>Cloud Communication Environment is an internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources and services that belong to different organizations. In order to develop cloud computing applications, security and trust to share data through distributed resources must be assured. This paper offers a study of the different mechanisms used in open cloud environments such as keys generation and management, and encryption\/decryption algorithms. In addition, the paper proposes a new cryptographic environment, annotated as \u201cCCCE\u201d that deploys the combination between quantum key distribution mechanisms (QKD) and advanced encryption standard (AES), and demonstrates how quantum mechanics can be applied to improve computation.<\/p>","DOI":"10.4018\/ijghpc.2014040103","type":"journal-article","created":{"date-parts":[[2014,9,18]],"date-time":"2014-09-18T13:08:03Z","timestamp":1411045683000},"page":"38-51","source":"Crossref","is-referenced-by-count":8,"title":["Cryptographic Cloud Computing Environment as a More Trusted Communication Environment"],"prefix":"10.4018","volume":"6","author":[{"given":"Omer K.","family":"Jasim","sequence":"first","affiliation":[{"name":"Alma'arif University College, Anbar, Iraq"}]},{"given":"Safia","family":"Abbas","sequence":"additional","affiliation":[{"name":"Ain Shams University, Cairo, Egypt"}]},{"given":"El-Sayed M.","family":"El-Horbaty","sequence":"additional","affiliation":[{"name":"Ain Shams University, Cairo, Egypt"}]},{"given":"Abdel-Badeeh M.","family":"Salem","sequence":"additional","affiliation":[{"name":"Ain Shams University, Cairo, Egypt"}]}],"member":"2432","reference":[{"key":"ijghpc.2014040103-0","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Kamara, S., & Katz, J. (2012). Proofs of storage from holomorphic identification protocols. In Advances in Cryptology (ASIACRYPT '09) (Vol. 5912, Lecture Notes in Computer Science, pp. 319-333).","DOI":"10.1007\/978-3-642-10366-7_19"},{"key":"ijghpc.2014040103-1","unstructured":"Cipher cloud gateway architecture. (n.d.). Retrieved from www.ciphercloud.net"},{"key":"ijghpc.2014040103-2","unstructured":"Cloud Security Alliance (CSA). (n.d.). Retrieved from http:\/\/www.cloudsecurityalliance.org\/"},{"key":"ijghpc.2014040103-3","unstructured":"Ferrie, P. (2007). Attacks on virtual machine emulators, White Paper. Symantec Corporation, 3(12)."},{"key":"ijghpc.2014040103-4","first-page":"23","article-title":"Understanding cloud-computing vulnerabilities.","volume":"99","author":"B.Grobauer","year":"2009","journal-title":"IEEE Security and Privacy"},{"key":"ijghpc.2014040103-5","doi-asserted-by":"publisher","DOI":"10.1126\/science.283.5410.2050"},{"key":"ijghpc.2014040103-6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8265-8_1230"},{"key":"ijghpc.2014040103-7","unstructured":"IDC. (2011). IDC ranking of issues of cloud computing model. Retrieved from http:\/\/blogs.idc.com\/ie\/?p=210"},{"issue":"18","key":"ijghpc.2014040103-8","first-page":"975","article-title":"The goals of parity bits in quantum key distribution system.","volume":"56","author":"O.Jasim","year":"2012","journal-title":"International Journal of Computers and Applications"},{"key":"ijghpc.2014040103-9"},{"key":"ijghpc.2014040103-10","unstructured":"John, M., & Ingo, L. (2010). An analysis of the cloud computing security problem. APSEC 2010 Proceeding Cloud Workshop, Sydney, Australia."},{"key":"ijghpc.2014040103-11","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"ijghpc.2014040103-12","doi-asserted-by":"crossref","unstructured":"Kollmitzer, W., & Pivk, E. (2010). Applied quantum cryptography. Lecture Note in Physics ISSN 0075-8450, Springer Heidelberg, library of Congress Control Number:2010920541.","DOI":"10.1007\/978-3-642-04831-9"},{"issue":"13","key":"ijghpc.2014040103-13","first-page":"47","article-title":"Redact algorithm based execution times prediction in knowledge discovery cloud computing environment.","volume":"10","author":"G.Kun","year":"2013","journal-title":"The International Arab Journal of Information Technology"},{"key":"ijghpc.2014040103-14","article-title":"Cloud computing and EMC deal.","author":"T.Lohr","year":"2009","journal-title":"The New York Times"},{"issue":"9","key":"ijghpc.2014040103-15","first-page":"67","article-title":"Hacking commercial quantum cryptography systems by tailored bright.","volume":"2","author":"L.Lydersen","year":"2009","journal-title":"IJQS"},{"issue":"12","key":"ijghpc.2014040103-16","first-page":"78","article-title":"Using encryption algorithms to enhance the data security in cloud computing.","volume":"1","author":"T.Mandeep","year":"2013","journal-title":"International Journal of Communication and Computer Technologies"},{"key":"ijghpc.2014040103-17","unstructured":"Markoff, T., & John, N. (2001). An internet critic who is not shy about ruffling the big names in high technology. New York Times."},{"issue":"12","key":"ijghpc.2014040103-18","first-page":"34","article-title":"Server virtualization.","volume":"3","author":"R.McAllister","year":"2008","journal-title":"InfoWorld"},{"issue":"1","key":"ijghpc.2014040103-19","article-title":"To enhance the data security of cloud in cloud computing using RSA algorithm.","volume":"1","author":"E.Mohit","year":"2012","journal-title":"International Journal of Software Engineering"},{"issue":"4","key":"ijghpc.2014040103-20","first-page":"23","article-title":"Data security in cloud computing using RSA algorithm.","volume":"1","author":"N.Parsi","year":"2012","journal-title":"International Journal of Research in Computer Communication Technology"},{"key":"ijghpc.2014040103-21","first-page":"123","article-title":"Data security over cloud emerging trends in computer science and information technology.","author":"D.Patil","year":"2012","journal-title":"Proceedings of the International Journal of Computer Applications"},{"key":"ijghpc.2014040103-22","first-page":"344","article-title":"Cloud computing security issues and challenges.","author":"K.Popovic","year":"2010","journal-title":"Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services"},{"issue":"7","key":"ijghpc.2014040103-23","article-title":"Revealing new concepts in cpytography & clouds.","volume":"1","author":"V.Rawal","year":"2012","journal-title":"International Journal of Scientific & Technology Research"},{"issue":"5","key":"ijghpc.2014040103-24","first-page":"78","article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications.","volume":"2","author":"A.Rukhin","year":"2010","journal-title":"IJCA"},{"key":"ijghpc.2014040103-25","article-title":"Modern encryption techniques for cloud computing.","author":"M.Sherif","year":"2012","journal-title":"Proceedings of the 2nd International Conference on Communication and Information Technology"},{"key":"ijghpc.2014040103-26","unstructured":"Singh, B. (2012). Enhancing security in cloud computing using public key cryptography with matrices. International Journal of Engineering Research and application, 2(4)."},{"key":"ijghpc.2014040103-27","doi-asserted-by":"publisher","DOI":"10.1063\/1.2720728"},{"key":"ijghpc.2014040103-28","first-page":"90","article-title":"A survey on security issues in service delivery models of cloud computing.","volume":"2","author":"T.Subashini","year":"2012","journal-title":"Journal of Network and Computer Applications"},{"key":"ijghpc.2014040103-29","unstructured":"Taih, S., & Jasim, O. (2011). Reducing the authentication cost in quantum cryptography. ISBN: 978-1-902560-25-0 \u00a9 2011 PGNet- Liverpool, UK."}],"container-title":["International Journal of Grid and High Performance Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=115241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:07:00Z","timestamp":1654099620000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijghpc.2014040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijghpc.2014040103","relation":{},"ISSN":["1938-0259","1938-0267"],"issn-type":[{"value":"1938-0259","type":"print"},{"value":"1938-0267","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}