Quantum-resistant cryptographic protocols for securing cloud storage and data transmission in hybrid enterprise IT environments

Martha Masunda *

Department of Information Technology Services, Midlands State University, Zimbabwe.

 
Review Article
World Journal of Advanced Research and Reviews, 2022, 14(03), 826-847
Article DOI: 10.30574/wjarr.2022.14.3.0457
 
Publication history: 
Received on 16 April 2022; revised on 24 June 2022; accepted on 29 June 2022
 
Abstract: 
The exponential growth of cloud computing and hybrid enterprise IT infrastructures has significantly transformed how organizations store, process, and transmit data. As reliance on distributed systems deepens, ensuring the confidentiality, integrity, and availability of sensitive information has become a paramount concern especially in the face of emerging quantum computing capabilities. Quantum computers, once fully realized, will render many current public-key cryptographic systems such as RSA, ECC, and DH obsolete due to their vulnerability to quantum algorithms like Shor’s and Grover’s. This looming threat demands a paradigm shift toward quantum-resistant cryptographic protocols that can safeguard digital assets across dynamic and heterogeneous environments. This study presents a comprehensive analysis of quantum-resistant cryptographic schemes, focusing on lattice-based, hash-based, multivariate polynomial, and code-based approaches. These protocols are critically evaluated in terms of computational efficiency, scalability, resistance to side-channel attacks, and adaptability to multi-tenant cloud architectures. Special emphasis is placed on their integration into hybrid enterprise IT ecosystems, which often comprise on-premises servers, private clouds, and public cloud services each with unique security and compliance requirements. Additionally, the research proposes a layered security model that leverages post-quantum encryption for data-at-rest, hybrid key exchange mechanisms for secure data-in-transit, and secure bootstrapping protocols for cross-domain identity verification. Through simulations and policy analysis, this work demonstrates how quantum-resilient cryptography can be effectively deployed without compromising system performance or interoperability. Ultimately, the findings aim to guide enterprises, cloud providers, and cybersecurity professionals in building forward-compatible, future-proof data protection strategies.
 
Keywords: 
Post-Quantum Cryptography; Cloud Security; Hybrid It Infrastructure; Data Transmission; Lattice-Based Encryption; Quantum Threats
 
Full text article in PDF: 
Share this