Enhancing cloud data security using quantum key distribution (QKD) and quantum cryptography

Authors

  • O. Sarjiyus
    Department of Computer Science, Adamawa State University, Mubi
  • Umaru Faruku Adamu
    Department of Computer Engineering, Federal Polytechnic, Mubi
  • Salamatu Umar
    Department of Computer Science, Adamawa State University, Mubi

Keywords:

Quantum Cloud Security, Post-quantum cryptography (PQC), Quantum key distribution (QKD), Hybrid cryptography, TLS handshake performance

Abstract

Cloud computing systems face serious security risks that are intensified by advances in quantum computing because powerful quantum algorithms such as Shor's algorithm can break widely used public-key schemes which include RSA and ECC. The cloud environment needs Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD) as countermeasures but their individual deployment creates problems because scalability and infrastructure requirements become obstacles for multi-tenant systems. This research proposes a hybrid security architecture that uses both hardware-based QKD for symmetric key generation over optical fibers and PQC for authentication through quantum-resistant key encapsulation using CRYSTALS-Kyber and digital signatures with CRYSTALS-Dilithium. The hybrid design uses XOR to combine the QKD-generated secret with the PQC-derived key material which creates the final session key yet security remains intact if either component gets compromised. The system tested on a private cloud testbed with 10 virtual machines and a 50 km commercial QKD link through optical fiber measured performance against Classical TLS 1.3 and PQC-TLS and QKD-only configurations. The results showed that QKD-only achieved the lowest handshake latency of 5.2 ms while the hybrid approach delivered the strongest security through a 19.8 ms overhead which was only 1.7 ms slower than pure PQC. After creating the secure channel all systems achieved similar data throughput of about 942 Mbps which shows that quantum-security mechanisms affect the connection setup phase instead of persistent data transfer.

Dimensions

[1] P. Varshney & Y. Simmhan, “Characterizing application scheduling on edge, fog and cloud computing resources”, Software: Practice and Experience 50 (2020) 558. https://doi.org/10.1002/spe.2699.

[2] V. Topno, T. Kundu & M. K. Dehury, “Role of quantum computing in government and the defence sector”, in Digital technologies in modelling and management: insights in education and industry, Igi Global, 2024, pp. 296–312. https://doi.org/10.4018/978-1-6684-9576-6.ch015.

[3] M. K. Yousif, Z. E. Dallalbashi & S. W. Kareem, “Information security for big data using the NTRU encrypt method”, Measurement: Sensors 27 (2023) 100738. https://doi.org/10.1016/j.measen.2023.100738.

[4] G. Yousif, S. Alhayali, S. Wahhab & Z. Hussain, “Secure data in the cloud with a robust hybrid cryptographic approach”, Journal of Electrical Systems 20 (2024) 2450. https://doi.org/10.52783/jes.2018.

[5] A. Kumar, C. Ottaviani, S. S. Gill & R. Buyya, “Securing the future internet of things with post-quantum cryptography”, Security and Privacy 5 (2022) e200. https://doi.org/10.1002/spy2.200.

[6] F. Barrett-Danes & F. Ahmad, “Quantum computing and cybersecurity: a rigorous systematic review of emerging threats, post-quantum solutions, and research directions (2019–2024)”, Discover Applied Science 7 (2025) 1083. https://doi.org/10.1007/s42452-025-07322-5.

[7] A. Priyadarshini, S. P. Abirami, M. A. Ahmed & B. Arunkumar, “Quantum-enhanced cybersecurity analysis and medical image encryption in cloud IoT networks”, Optical and Quantum Electronics 56 (2024) 4. https://doi.org/10.1007/s11082-023-06018-7.

[8] D. Dhinakaran, L. Srinivasan, S. M. Udhaya Sankar & D. Selvaraj, “Quantum-based privacy-preserving techniques for secure and trustworthy internet of medical things: an extensive analysis”, Quantum Information and Computation 24 (2024) 227. https://doi.org/10.26421/QIC24.3-4-3.

[9] S. R. Julakanti, N. S. K. Sattiraju & R. Julakanti, “Multi-cloud security: strategies for managing hybrid environments”, Neuro Quantology 20 (2022) 10063. https://doi.org/10.48047/nq.2022.20.11.nq67000.

[10] S. M. J. Abdalwahid, B. F. Ibrahim, S. H. Ismael & S. W. Kareem, “A new efficient method for information security in Hadoop”, Qalaai Zanist Journal 7 (2022) 1115. https://doi.org/10.25212/lfu.qzj.7.2.42.

[11] U. Nauman, Y. Zhang, Z. Li & T. Zhen, “Q-ECS: quantum-enhanced cloud security with attribute-based cryptography and quantum key distribution”, Research Square Preprint (2024). https://doi.org/10.21203/rs.3.rs-4006533/v1.

[12] H. T. Nguyen, M. Usman & R. Buyya, “iQuantum: a toolkit for modeling and simulation of quantum computing environments”, Software: Practice and Experience 54 (2024) 1141. https://doi.org/10.1002/spe.3331.

[13] D. Sikeridis, D. Ott, S. Huntley, S. Sharma, V. K. Dhanasekar, M. Bansal, A. Kumar, U. N. Anwitha, D. Beveridge & S. Veeraswamy, “ELCA: introducing enterprise-level cryptographic agility for a post-quantum era”, Cryptology ePrint Archive, Paper 2023/1539 (2023). https://eprint.iacr.org/2023/1539.

[14] A. I. Saiyed, “Hybrid quantum-classical cryptographic protocols: enhancing security in the era of quantum supremacy”, Spectrum of Research 5 (2025) 1. http://spectrumofresearch.com//index.php/sr/article/view/12/12.

[15] A. L. Tariq, A. Atta, U. Farooq, N. Anwar, M. Asim & N. Tabassum, “Quantum-inspired cryptography protocols for enhancing security in cloud computing infrastructures”, Statistics, Computing and Interdisciplinary Research 6 (2024) 19. https://doi.org/10.52700/scir.v6i1.149.

Published

2026-04-20

How to Cite

Enhancing cloud data security using quantum key distribution (QKD) and quantum cryptography. (2026). Proceedings of the Nigerian Society of Physical Sciences, 266. https://doi.org/10.61298/pnspsc.2026..266

How to Cite

Enhancing cloud data security using quantum key distribution (QKD) and quantum cryptography. (2026). Proceedings of the Nigerian Society of Physical Sciences, 266. https://doi.org/10.61298/pnspsc.2026..266