Scientists Demonstrate Perfectly Secure Cloud Computing Through Quantum Computing

Scientists Demonstrate Perfectly Secure Cloud Computing Through Quantum Computing

Recent research has demonstrated the perfect marriage of the hottest computing technology today – cloud computing – and the hottest computing technology of tomorrow – quantum computing. Now, readers of this website are well aware of what cloud computing is; however, quantum computing may be something new for them.

In simplest terms, unlike traditional transistor-based computing that depends on the basic units (bits) existing in any one of two possible values, quantum computing makes use of qubits that can exist in a superposition of multiple states at the same time. Although in its infancy, quantum computing is expected to far surpass the computers of today in speed of operation. However, that is not the only advantage of quantum computing.

Because of the logistics involved, quantum computers are expected to be present only in a few specialized facilities around the world – much like today’s supercomputers. Users would be able to access these computers remotely and outsource their calculating tasks. As is evident, this distributed structure is also followed by cloud computing. It is also well known than the latter suffers from security concerns, some of them on genuine grounds. Now, as a result of an experiment conducted at the Vienna Center for Quantum Science and Technology (VCQ) at the University of Vienna and the Institute for Quantum Optics and Quantum Information (IQOQI), scientists believe that quantum computing may be used to address this drawback of going on the cloud.

Quantum physics solves one of the key challenges in distributed computing. It can preserve data privacy when users interact with remote computing centers,” said Stefanie Barz, lead author of the study.

Here’s how the technique, called “blind quantum computing,” works: the user can prepare qubits in a state known only to the host machine, and then send a set of instructions to the computer in the cloud. The remote computer blindly entangles the unknown qubits, carries out the steps in the instructions, and sends the results back down the line, solving the problem without ever decoding the content – an event impossible with traditional computers. So while the cloud computer can determine an accurate set of ones and zeros as output, it cannot interpret the values, thereby making the process extremely secure.

According to an official statement, “Researchers have succeeded in combining the power of quantum computing with the security of quantum cryptography and have shown that perfectly secure cloud computing can be achieved using the principles of quantum mechanics. They have performed an experimental demonstration of quantum computation in which the input, the data processing, and the output remain unknown to the quantum computer.”

However, don’t start the countdown to the quantum cloud computer. Getting blind-based quantum security into the real world “is a highly complex task,” Barz said, with one University of California researcher suggesting a possible timeframe of 10 to 20 years. At the same time, there have been reports that HP, which recently organized Master the Cloud in Canada (See: HP ‘Master The Cloud’ Event (Montreal) – Part 3 ), is already working on this innovation. Exciting times lie ahead!

By Sourya Biswas

Sorry, comments are closed for this post.

The True Power And Potential Of Wearables

The True Power And Potential Of Wearables

The Power of Wearables The potential of wearable computing for efficiency and innovation is enormous. For business leaders and CIOs, wearable technology represents an opportunity to find more intelligent solutions to real problems and to leverage these devices for the benefit of the organization. But before wearables can successfully realize these expectations, there remain basic…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Methodically Plan Your Cloud Design First

Methodically Plan Your Cloud Design First

Are You Sure You Are Ready For The Cloud: Design For the last few months, we have been discussing getting ready to go to the cloud. We have covered topics such as Financial and Business Security reasons. We have even discussed the type of knowledge you should obtain. This month, we are going to take…

Basic Cloud Risk Assessment Tips

Basic Cloud Risk Assessment Tips

Basic Cloud Risk Assessment You should worry about the risks of cloud computing. But don’t get too scared. With a few simple steps you can easily get a basic understanding of your risks in the cloud and even have a good start in managing these risks. If you are a large corporation in a regulated…

The Evolution Of The Connected Cloud

The Evolution Of The Connected Cloud

The Connected Cloud Cloud computing is interesting first, but not only, because of the prevalence of cloud projects. There are many of them launched every day. Some have lofty expectations for business benefits (cost saving of 20 percent or more) and others carry even more intriguing goals. In 2005 “the cloud” was new. Shared computing…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor