Scientists Demonstrate Perfectly Secure Cloud Computing Through Quantum Computing

Scientists Demonstrate Perfectly Secure Cloud Computing Through Quantum Computing

Recent research has demonstrated the perfect marriage of the hottest computing technology today – cloud computing – and the hottest computing technology of tomorrow – quantum computing. Now, readers of this website are well aware of what cloud computing is; however, quantum computing may be something new for them.

In simplest terms, unlike traditional transistor-based computing that depends on the basic units (bits) existing in any one of two possible values, quantum computing makes use of qubits that can exist in a superposition of multiple states at the same time. Although in its infancy, quantum computing is expected to far surpass the computers of today in speed of operation. However, that is not the only advantage of quantum computing.

Because of the logistics involved, quantum computers are expected to be present only in a few specialized facilities around the world – much like today’s supercomputers. Users would be able to access these computers remotely and outsource their calculating tasks. As is evident, this distributed structure is also followed by cloud computing. It is also well known than the latter suffers from security concerns, some of them on genuine grounds. Now, as a result of an experiment conducted at the Vienna Center for Quantum Science and Technology (VCQ) at the University of Vienna and the Institute for Quantum Optics and Quantum Information (IQOQI), scientists believe that quantum computing may be used to address this drawback of going on the cloud.

Quantum physics solves one of the key challenges in distributed computing. It can preserve data privacy when users interact with remote computing centers,” said Stefanie Barz, lead author of the study.

Here’s how the technique, called “blind quantum computing,” works: the user can prepare qubits in a state known only to the host machine, and then send a set of instructions to the computer in the cloud. The remote computer blindly entangles the unknown qubits, carries out the steps in the instructions, and sends the results back down the line, solving the problem without ever decoding the content – an event impossible with traditional computers. So while the cloud computer can determine an accurate set of ones and zeros as output, it cannot interpret the values, thereby making the process extremely secure.

According to an official statement, “Researchers have succeeded in combining the power of quantum computing with the security of quantum cryptography and have shown that perfectly secure cloud computing can be achieved using the principles of quantum mechanics. They have performed an experimental demonstration of quantum computation in which the input, the data processing, and the output remain unknown to the quantum computer.”

However, don’t start the countdown to the quantum cloud computer. Getting blind-based quantum security into the real world “is a highly complex task,” Barz said, with one University of California researcher suggesting a possible timeframe of 10 to 20 years. At the same time, there have been reports that HP, which recently organized Master the Cloud in Canada (See: HP ‘Master The Cloud’ Event (Montreal) – Part 3 ), is already working on this innovation. Exciting times lie ahead!

By Sourya Biswas

Sorry, comments are closed for this post.

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…