Decentralized AI-Based Intrusion Detection for Zero-Day Attacks in Cloud Networks
DOI:
https://doi.org/10.63345/x31h1k81Keywords:
Post-Quantum Cryptography, Quantum Computing, Cloud Storage, Data Security, LatticeBased Cryptography, RSA, ECC, Hybrid Cryptography, Quantum-Safe Algorithms, Shor’s Algorithm, Cryptographic AlgorithmsAbstract
As quantum computing continues to advance, the need for secure systems resistant to the power
of quantum algorithms has become critical. Traditional cryptographic algorithms that rely on the
difficulty of certain mathematical problems, such as RSA and ECC, are vulnerable to quantum
attacks, particularly Shor's algorithm. This manuscript explores the integration of Post-Quantum
Cryptography (PQC) for ensuring long-term data security in cloud storage. We analyze quantumsafe cryptographic algorithms and their ability to protect sensitive data from quantum threats,
focusing on lattice-based, code-based, and multivariate-quadratic-equations (MQ) systems. The
study further investigates the challenges of implementing PQC in cloud environments, such as
computational overhead, backward compatibility with existing infrastructure, and scalability. By
conducting a detailed evaluation of both current and emerging PQC standards, we propose a
hybrid approach that combines traditional cryptography with quantum-resistant techniques to
enhance data security in cloud storage systems. This research aims to provide a roadmap for
migrating to secure, post-quantum cryptographic systems while maintaining performance and
compatibility in a cloud-based context.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2025 The journal retains copyright of all published articles, ensuring that authors have control over their work while allowing wide dissenmination.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Articles are published under the Creative Commons Attribution NonCommercial 4.0 License (CC BY NC 4.0), allowing others to distribute, remix, adapt, and build upon the work for non-commercial purposes while crediting the original author.