secure cloud. The results reveal the possibility of
deploying PQC algorithms in cloud environments and
show their capacity to protect confidential
information against technology threats and future
developments. Developing such solutions will
become increasingly important as quantum
computing progresses and is a crucial first step
toward long-term cloud security that is resistant to
quantum attacks.
REFERENCES
Ashok, S. (2024). Post-Quantum Cryptography for AI-
Driven Cloud Security Solutions. International Journal
for Multidisciplinary Research (IJFMR), 6(5).
ResearchGate+1IJFMR+1
CIO Influence. (2024). Post-Quantum Cryptography
Migration: What CIOs and CISOs Need to Know.
https://cioinfluence.com/security/post-quantum-
cryptography-migration-what-cios-and-cisos-need-to-
know/CIO Influence
Cloud Security Alliance. (2025). Practical Preparations for
the Post Quantum Worldhttps://cloudsecurityalliance.o
rg/artifacts/practical-preparations-for-the-post-
quantum-worldLatest news & breaking
headlines+2Home | CSA+2The Futurum Group+2
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021).
Differential area analysis for ransomware attack
detection within mixed file datasets. Computers &
Security, 108, 102377. Wikipedia
Futurum Group. (2025). Secure Data Infrastructure in a
Post Quantum Cryptographic World.https://futurumgr
oup.com/research-reports/secure-data-infrastructure-
in-a-post-quantum-cryptographic-world/The Futurum
Group
Google. (2025). Google Expands Post-Quantum
Cryptography Support with Quantum-Safe Digital
Signatureshttps://thequantuminsider.com/2025/02/24/g
oogle-expands-post-quantum-cryptography-support-
with-quantum-safe-digital-signatures/The Quantum
Insider+1Wikipedia+1
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N.,
Ghaleb, B., Ullah, A., ... & Buchanan, W. J. (2024).
Chaotic quantum encryption to secure image data in
post quantum consumer technology. IEEE Transaction
s on Consumer Electronics. Wikipedia
Kumar, G., Saha, R., Rai, M. K., Buchanan, W. J., Thomas,
R., Geetha, G., ... & Rodrigues, J. J. (2020). A privacy-
preserving secure framework for electric vehicles in
IoT using matching market and signcryption. IEEE
Transactions on Vehicular Technology, 69(7), 7707-
7722.Wikipedia
Lienau, B. (2025). As Simple as Quantum Physics! The
Future of Post-Quantum Cryptography in the Absence
of a Comprehensive Federal Data Privacy Framework.
Kentucky Law Journal Online, 113. https://www.kentu
ckylawjournal.org/blog/as-simple-as-quantum-
physics-the-future-of-post-quantum-cryptography-in-
the-absence-of-a-comprehensive-federal-data-privacy-
frameworkKentucky Law Journal
Moody, D. (2024). Status Report on the Third Round of the
NIST Post-Quantum Cryptography Standardization
Process. National Institute of Standards and
Technology. https://csrc.nist.gov/projects/post quantu
m cryptographyLatest news & breakingheadlines+3Wi
kipedia+3Wikipedia+3
National Institute of Standards and Technology. (2024).
Module-Lattice-Based Digital Signature Algorithm
Standard [FIPS 204]. U.S. Department of Commerce.
Wikipedia
National Institute of Standards and Technology. (2024).
Module-Lattice-Based Key-Encapsulation Mechanism
Standard [FIPS 203]. U.S. Department of Commerce.
Wikipedia+1Wikipedia+1
National Institute of Standards and Technology. (2024).
Stateless Hash-Based Digital Signature Algorithm
Standard [FIPS 205]. U.S. Department of Commerce.
Wikipedia
Popov, S., & Buchanan, W. J. (2021). FPC-BI: Fast
probabilistic consensus within Byzantine infrastructur
es. Journal of Parallel and Distributed Computing, 147,
77-86.Wikipedia
ResearchGate. (2025). Quantum Cybersecurity: Preparing
Cloud Infrastructures for Post-Quantum Threats.
Saha, R., Kumar, G., Devgun, T., Buchanan, W. J.,
Thomas, R., Alazab, M., ... & Rodrigues, J. J. (2021).
A blockchain framework in post-quantum
decentralization. IEEE Transactions on Services
Computing, 16(1), 1-12.Wikipedia
Saha, R., Kumar, G., Geetha, G., Conti, M., & Buchanan,
W. J. (2024). Application of randomness for security
and privacy in multi-party computation. IEEE
Transactions on Dependable and Secure Computing.
Wikipedia
SGNL. (2025). How Quantum Computing Will Redefine
Cloud Identity Security https://sgnl.ai/2025/02/quantu
m-computing-identity-
security/ Modern privileged identity management+1to
msguide.com+1
Sreerangapuri, A. (2024). Post Quantum Cryptography for
AI- Driven Cloud Security Solutions. International Jo
urnal for Multidisciplinary Research (IJFMR), 6(5). ht
tps://www.ijfmr.com/papers/2024/5/29032.pdf
ResearchGate+1IJFMR+1
Tuta. (2024). Tuta Mail Adds Quantum-Resistant
Encryption via TutaCrypt. https://www.e spincorp.co
m/the-importance-of-post-quantum-cryptography-in-
data-protection/Wikipedia+1E-SPIN Corp+1
Versa Networks. (2025). Post-Quantum Cryptography
(PQC) and Versa: Future-Proofing Enterprise Security
Against Quantum Threats. https://versanetworks.com/
blog/post-quantum-cryptography-pqc-and-versa-
future-proofing-enterprise-security-against-quantum-
threats/Versa Networks