Scientists Demonstrate Perfectly Secure Cloud Computing Through Quantum Computing

Scientists Demonstrate Perfectly Secure Cloud Computing Through Quantum Computing

Recent research has demonstrated the perfect marriage of the hottest computing technology today – cloud computing – and the hottest computing technology of tomorrow – quantum computing. Now, readers of this website are well aware of what cloud computing is; however, quantum computing may be something new for them.

In simplest terms, unlike traditional transistor-based computing that depends on the basic units (bits) existing in any one of two possible values, quantum computing makes use of qubits that can exist in a superposition of multiple states at the same time. Although in its infancy, quantum computing is expected to far surpass the computers of today in speed of operation. However, that is not the only advantage of quantum computing.

Because of the logistics involved, quantum computers are expected to be present only in a few specialized facilities around the world – much like today’s supercomputers. Users would be able to access these computers remotely and outsource their calculating tasks. As is evident, this distributed structure is also followed by cloud computing. It is also well known than the latter suffers from security concerns, some of them on genuine grounds. Now, as a result of an experiment conducted at the Vienna Center for Quantum Science and Technology (VCQ) at the University of Vienna and the Institute for Quantum Optics and Quantum Information (IQOQI), scientists believe that quantum computing may be used to address this drawback of going on the cloud.

Quantum physics solves one of the key challenges in distributed computing. It can preserve data privacy when users interact with remote computing centers,” said Stefanie Barz, lead author of the study.

Here’s how the technique, called “blind quantum computing,” works: the user can prepare qubits in a state known only to the host machine, and then send a set of instructions to the computer in the cloud. The remote computer blindly entangles the unknown qubits, carries out the steps in the instructions, and sends the results back down the line, solving the problem without ever decoding the content – an event impossible with traditional computers. So while the cloud computer can determine an accurate set of ones and zeros as output, it cannot interpret the values, thereby making the process extremely secure.

According to an official statement, “Researchers have succeeded in combining the power of quantum computing with the security of quantum cryptography and have shown that perfectly secure cloud computing can be achieved using the principles of quantum mechanics. They have performed an experimental demonstration of quantum computation in which the input, the data processing, and the output remain unknown to the quantum computer.”

However, don’t start the countdown to the quantum cloud computer. Getting blind-based quantum security into the real world “is a highly complex task,” Barz said, with one University of California researcher suggesting a possible timeframe of 10 to 20 years. At the same time, there have been reports that HP, which recently organized Master the Cloud in Canada (See: HP ‘Master The Cloud’ Event (Montreal) – Part 3 ), is already working on this innovation. Exciting times lie ahead!

By Sourya Biswas

sourya

Sourya Biswas is a former risk analyst who has worked with several financial organizations of international repute, besides being a freelance journalist with several articles published online. After 6 years of work, he has decided to pursue further studies at the University of Notre Dame, where he has completed his MBA. He holds a Bachelors in Engineering from the Indian Institute of Information Technology. He is also a member of high-IQ organizations Mensa and Triple Nine Society and has been a prolific writer to CloudTweaks over the years... http://www.cloudtweaks.com/author/sourya/

Sorry, comments are closed for this post.

Recent

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

Popular Archives

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising