Password-Protected, Quantum-Resilient Data Offloading for Cloud Platforms

International Journal of Emerging Research in Science, Engineering, and Management
Vol. 2, Issue 1, pp. 169-174, January 2026.

https://doi.org/10.58482/ijersem.v2i1.23

R. Priyadarshini

K. Reddy Geethika

V. Sravya

K. Pujitha

Chandra Prakash

Amit Kumar

Department of CSE, Siddartha Institute of Science and Technology, Puttur, India.

Abstract: The increasing adoption of cloud computing has revolutionized data storage and accessibility, but it has also presented severe security and privacy issues, particularly in the context of developing quantum computing threats. Despite being effective against classical assaults, conventional encryption and password protection mechanisms are becoming more susceptible to quantum algorithms that can compromise current cryptographic systems. This paper presents QPause, a Password-Protected, Quantum-Resilient Data Offloading for Cloud Platforms forsafe cloud storage, in response to these new threats. To guarantee data confidentiality, integrity, and resilience against both classical and quantum adversaries, the suggested system combines sophisticated password-based authentication methods with post-quantum cryptography approaches. QPause uses zero-knowledge proof methods to enable secure verification without disclosing sensitive credentials, and it leverages lattice-based encryption to safeguard data that is outsourced. Additionally, the system integrates efficient key management and access control mechanisms to boost scalability and user confidence. QPause delivers strong resilience to quantum attacks while preserving low processing overhead and excellent usability for practical cloud applications, according to experimental evaluation. This framework offers a solid solution for secure and future-proof data outsourcing, bridging the gap between existing cloud services and the next generation of quantum-secure computing environments.

Keywords: cloud computing, QPause, quantum computing, data offloading quantum attacks..

References: 

  1. J. Jiang, D. Wang and G. Zhang, “QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage,” in IEEE Transactions on Services Computing, vol. 17, no. 3, pp. 1140-1153, May-June 2024, doi: 10.1109/TSC.2023.3331000.
  2. O. Regev, “On lattices, learning with errors, random linear codes, and cryptography,” Journal of the ACM, vol. 56, no. 6, pp. 1–40, Sep. 2009, doi: 10.1145/1568318.1568324.
  3. K. Mansoor, M. Afzal, W. Iqbal, Y. Abbas, S. Mussiraliyeva, and A. Chehri, “PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems,” Internet of Things, vol. 27, p. 101228, May 2024, doi: 10.1016/j.iot.2024.101228.
  4. P. R. Babu, S. A. P. Kumar, A. G. Reddy, and A. K. Das, “Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges,” Computer Science Review, vol. 54, p. 100676, Aug. 2024, doi: 10.1016/j.cosrev.2024.100676.
  5. Um-E-Habiba, I. Ahmed, M. Alqahtani, M. Asif, and M. Khalid, “The role of energy management technologies for cyber resilient smart homes in sustainable urban development,” Energy Strategy Reviews, vol. 56, p. 101602, Nov. 2024, doi: 10.1016/j.esr.2024.101602.
  6. H. K. Apat and B. Sahoo, “A Blockchain assisted fog computing for secure distributed storage system for IoT Applications,” Journal of Industrial Information Integration, vol. 42, p. 100739, Nov. 2024, doi: 10.1016/j.jii.2024.100739
  7. S. Ali et al., “Security and privacy in multi-cloud and hybrid cloud environments: Challenges, strategies, and future directions,” Computers & Security, vol. 157, p. 104599, Jul. 2025, doi: 10.1016/j.cose.2025.104599.
  8. S. Ali et al., “Next-Generation Quantum Security: The Impact of Quantum Computing on Cybersecurity—Threats, Mitigations, and Solutions,” Computers & Electrical Engineering, vol. 128, p. 110649, Aug. 2025, doi: 10.1016/j.compeleceng.2025.110649.
  9. N. Alsharabi, A. Alayba, G. Alshammari, M. Alsaffar, and A. Jadi, “An end-to-end four tier remote healthcare monitoring framework using edge-cloud computing and redactable blockchain,” Computers in Biology and Medicine, vol. 189, p. 109987, Mar. 2025, doi: 10.1016/j.compbiomed.2025.109987.
  10. A. Alzahrani and H. A. Alzahrani, “A privacy-preserving and energy efficient authentication protocol for the cloud-based e-healthcare system,” Alexandria Engineering Journal, vol. 118, pp. 59–90, Jan. 2025, doi: 10.1016/j.aej.2025.01.051.
  11. O. Cheikhrouhou, K. Mershad, M. Laurent, and A. Koubaa, “Blockchain and emerging technologies for next generation secure healthcare: A comprehensive survey of applications, challenges, and future directions,” Blockchain Research and Applications, vol. 6, no. 4, p. 100305, May 2025, doi: 10.1016/j.bcra.2025.100305.
  12. A. Razaque, S. Hariri, A. M. Alajlan, and J. Yoo, “A comprehensive review of cybersecurity vulnerabilities, threats, and solutions for the Internet of Things at the network-cum-application layer,” Computer Science Review, vol. 58, p. 100789, Jul. 2025, doi: 10.1016/j.cosrev.2025.100789.
  13. M. H. Kashani, M. Madanipour, M. Nikravan, P. Asghari, and E. Mahdipour, “A systematic review of IoT in healthcare: Applications, techniques, and trends,” Journal of Network and Computer Applications, vol. 192, p. 103164, Jul. 2021, doi: 10.1016/j.jnca.2021.103164.
  •