Comparative Analysis of IECC-QKD with Several Access Control and Security Approaches for Secure Authentication and Data Sharing in Cloud Environments

Abstract

Blockchain has evolved a lot in the context of digital transformation, as it is decentralized and accessible. However, it has become extremely difficult to keep sensitive data secure in cloud storage and distributed systems. Traditional methods didn't do a good job of controlling who could access data, and there was a risk of unauthorized access, especially in centralized cloud systems, which raised concerns about data security and privacy. This study suggested an Improved Elliptic Curve Cryptography-based Quantum Key Distribution (IECC-QKD) framework that uses a blockchain system to protect data exchange and access control mechanisms in order to reduce security risks. The Edwards curve and binary randomness are both used in the IECC to make sure that the encryption and sensitive data participated on the cloud are safe from tampering. The QKD-based secure key uses quantum mechanics to keep the data safe from unauthorized access by making it impossible to tamper with. The new Proof of Storage (PoSt) consensus mechanism in the Ethereum blockchain also combines the best parts of Proof of Space (PoS) to store and prove the integrity of the data while using as few resources as possible.

Downloads

Download data is not yet available.
Published
2026-03-24
How to Cite
Agrawal, A., & Thour, R. (2026). Comparative Analysis of IECC-QKD with Several Access Control and Security Approaches for Secure Authentication and Data Sharing in Cloud Environments. ITEGAM-JETIA, 12(58), 64-74. https://doi.org/10.5935/jetia.v12i58.2767
Section
Articles