Background of the Study
Cloud computing has become a cornerstone of modern computing infrastructures, offering scalable storage, computational power, and on-demand services to users. However, as more institutions, including Federal University of Technology, Minna, migrate to cloud-based systems, security has emerged as a significant concern. Data stored on the cloud is vulnerable to various types of cyberattacks, including unauthorized access, data breaches, and data tampering. Traditional encryption methods used to secure cloud data, such as RSA and AES, are still vulnerable to quantum computing’s potential to break them faster than classical computers (Shor, 2023). As a result, there is a growing need for new encryption methods that are resistant to quantum attacks, such as quantum cryptography.
Quantum cryptography offers a promising solution for enhancing cloud computing security by leveraging quantum key distribution (QKD) and other quantum techniques to secure data transmission and storage. At Federal University of Technology, Minna, the application of quantum cryptography could provide a higher level of security for cloud-based services, ensuring that sensitive academic, financial, and personal data remains protected from quantum-enabled threats. This research will explore the use of quantum cryptography to secure cloud computing systems at the university and evaluate its potential to enhance the university’s overall cybersecurity posture.
Statement of the Problem
While cloud computing offers numerous benefits, its security remains a significant concern due to vulnerabilities in traditional encryption methods. Federal University of Technology, Minna, faces challenges in securing its cloud infrastructure, especially as quantum computing advancements threaten to break existing encryption techniques. The university requires a robust and future-proof solution to protect sensitive data stored in the cloud. Quantum cryptography offers an opportunity to enhance cloud security by providing more secure encryption methods that are resistant to quantum-based attacks. However, its practical application and implementation in cloud systems at the university are yet to be explored.
Objectives of the Study
To explore the use of quantum cryptography to enhance the security of cloud computing systems at Federal University of Technology, Minna.
To evaluate the effectiveness of quantum key distribution (QKD) in securing cloud-based data storage and transmission.
To assess the feasibility of integrating quantum cryptography into the university’s existing cloud infrastructure.
Research Questions
How can quantum cryptography enhance the security of cloud computing systems at Federal University of Technology, Minna?
How effective is quantum key distribution (QKD) in securing cloud data against quantum-enabled cyberattacks?
What challenges exist in implementing quantum cryptography for cloud security at the university?
Significance of the Study
This study will provide valuable insights into the application of quantum cryptography in enhancing the security of cloud computing systems at Federal University of Technology, Minna. The findings will help the university strengthen its cybersecurity defenses against emerging threats, ensuring that sensitive data remains protected in the cloud. Additionally, this research will contribute to the broader understanding of how quantum cryptography can be used to address the evolving cybersecurity challenges in higher education institutions.
Scope and Limitations of the Study
The study will focus on the application of quantum cryptography for enhancing the security of cloud computing systems at Federal University of Technology, Minna, Niger State. The research will not address other cybersecurity measures or the broader use of quantum cryptography outside cloud computing systems.
Definitions of Terms
Quantum Cryptography: A method of encryption that uses the principles of quantum mechanics to secure communication and data from cyberattacks.
Quantum Key Distribution (QKD): A quantum technique used to securely exchange encryption keys over potentially insecure channels.
Cloud Computing Security: The protection of data, applications, and services in cloud computing environments from unauthorized access, cyberattacks, and data breaches.
Background of the Study:
Digital repositories serve as centralized platforms where scholarly works, including research pape...
BACKGROUND OF THE STUDY
When compared to other modes of transportation such as air, train, and water, road transportatio...
Background of the Study
Traditional Birth Attendants (TBAs) play a significant role in maternal and chi...
Background of the Study
The COVID-19 pandemic has had far-reaching impacts on global economies, and Nigeria is no exception. The outbreak...
Background of the Study
Participatory budgeting (PB) is a democratic process that involves citizens in decision-making o...
Background of the Study
Thromboembolic events (TEEs), including deep vein thrombosis (DVT) and pulmonary embolism (PE), are significant comp...
Background of the study
Integrated corporate communications involve the harmonious coordination of all internal and external messaging to...
Background of the study
In the face of mass casualty incidents (MCIs), effective triaging stands as a c...
ABSTRACT:- This study was carried out to examine the information seeking behaviour and utilization of information...
Background of the Study
Rural development programs are essential in promoting economic growth and improving living stand...