An Enhanced Cloud Security using Quantum Teleportation

Author(s):  
D. Sowmya ◽  
S. Sivasankaran

In the cloud environment, it is difficult to provide security to the monolithic collection of data as it is easily accessed by breaking the algorithms which are based on mathematical computations and on the other hand, it takes much time for uploading and downloading the data. This paper proposes the concept of implementing quantum teleportation i.e., telecommunication + transportation in the cloud environment for the enhancement of cloud security and also to improve speed of data transfer through the quantum repeaters. This technological idea is extracted from the law of quantum physics where the particles say photons can be entangled and encoded to be teleported over large distances. As the transfer of photons called qubits allowed to travel through the optical fiber, it must be polarized and encoded with QKD (Quantum Key Distribution) for the security purpose. Then, for the enhancement of the data transfer speed, qubits are used in which the state of quantum bits can be encoded as 0 and 1 concurrently using the Shors algorithm. Then, the Quantum parallelism will help qubits to travel as fast as possible to reach the destination at a single communication channel which cannot be eavesdropped at any point because, it prevents from creating copies of transmitted quantum key due to the implementation of no-cloning theorem so that the communication parties can only receive the intended data other than the intruders.

2013 ◽  
Vol 791-793 ◽  
pp. 1646-1650
Author(s):  
Qiu Yu Zhao ◽  
Xiao Yu Li

In this paper we provide a high-capacity information delay scheme based on eantangled states and quantum teleportation technology. By sharing EPR (Einstain-Rosen-Podolsky) pairs, one person can give the other person some information which cannot be read until he or she lets the latter do. By virtue of quantum teleportation technology, no one can gain more information about the key than guessing the key at random. So the scheme can gain high security. The fundamental principles of quantum physics guarantee its unconditional security. When the one decides to let the other get the information, he or she need only to send some dictates through a public classical channel. So the scheme is easier to carry out and more robust in practice.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Ignazio Pedone ◽  
Andrea Atzeni ◽  
Daniele Canavese ◽  
Antonio Lioy

2021 ◽  
Vol 27 (1) ◽  
pp. 124-144
Author(s):  
Thomas Studer

Standard epistemic modal logic is unable to adequately deal with the FrauchigerRenner paradox in quantum physics. We introduce a novel justification logic CTJ, in which the paradox can be formalized without leading to an inconsistency. Still CTJ is strong enough to model traditional epistemic reasoning. Our logic tolerates two different pieces of evidence such that one piece justifies a proposition and the other piece justifies the negation of that proposition. However, our logic disallows one piece of evidence to justify both a proposition and its negation. We present syntax and semantics for CTJ and discuss its basic properties. Then we give an example of epistemic reasoning in CTJ that illustrates how the different principles of CTJ interact. We continue with the formalization of the Frauchiger–Renner thought experiment and discuss it in detail. Further, we add a trust axiom to CTJ and again discuss epistemic reasoning and the paradox in this extended setting.


Author(s):  
Kenneth Mølbjerg Jørgensen ◽  
Anete M. Camille Strand

Material storytelling is used here to denote a material-discursive understanding of technology, and how technology works in organizations in terms of story performance. The idea is that technology configures organizations in spatial, temporal and material terms. We are inspired by Karen Barad’s work in quantum physics in developing the term material storytelling, which relies on a material-discursive understanding of storytelling. By introducing material storytelling we resituate the hegemonic relationship of discourse and language over matter. As such technology regains a central space in both understanding and managing organizations. It implies that attention is relocated to the petty and lowly everyday routines, techniques and material artifacts, which are implicit in what we do in everyday life but govern the agential possibilities for acting in this world. We frame the chapter as a story of material storytelling of a change project in a bank. We experiment with the writing style by going back and forth between two different layers of text. The first layer tells the stories of material storytelling, while the other draws out the theoretical/methodological implications of this approach in terms understanding and managing technology.


2009 ◽  
Vol 6 (2) ◽  
pp. 23
Author(s):  
Siti Arpah Ahmad ◽  
Mohamed Faidz Mohamed Said ◽  
Norazan Mohamed Ramli ◽  
Mohd Nasir Taib

This paper focuses on the performance of basic communication primitives, namely the overlap of message transfer with computation in the point-to-point communication within a small cluster of four nodes. The mpptest has been implemented to measure the basic performance of MPI message passing routines with a variety of message sizes. The mpptest is capable of measuring performance with many participating processes thus exposing contention and scalability problems. This enables programmers to select message sizes in order to isolate and evaluate sudden changes in performance. Investigating these matters is interesting in that non-blocking calls have the advantage of allowing the system to schedule communications even when many processes are running simultaneously. On the other hand, understanding the characteristics of computation and communication overlap is significant, because high- performance kernels often strive to achieve this, since it is both advantageous with respect to data transfer and latency hiding. The results indicate that certain overlap sizes utilize greater node processing power either in blocking send and receive operations or non-blocking send and receive operations. The results have elucidated a detailed MPI characterization of the performance regarding the overlap of message transfer with computation in a small cluster system. 


Author(s):  
В.А. ОСАНОВ ◽  
С.М. КОНДРАТЬЕВ ◽  
О.С. КОНЯЕВА

Рассмотрена автоматизированная система мониторинга воздушной среды с использованием технологий беспилотных летательных аппаратов, оснащенных датчиками для выявления вредных веществ. Представлены алгоритм функционирования системы и программно-аппаратная часть решения. Показано, что канал связи на основе методов шифрования обеспечивает безопасную передачу данных с беспилотного аппарата на сервер. Результаты исследования найдут практическое применение в мониторинге уровня загрязнения воздуха в городах. An automated system for monitoring the air environment using technologies of unmanned aerial vehicles equipped with sensors for detecting harmful substances is considered. The algorithm of the system functioning and the software and hardware part of the solution are presented. It is shown that a communication channel based on encryption methods ensures secure data transfer from an unmanned vehicle to a server. The results of the study will find practical application in monitoring the level of air pollution in cities and in predicting the direction of movement of polluting air masses.


Author(s):  
Baldev Singh ◽  
Surya Narayan Panda

Cloud computing environment is very much malicious intrusion prone hence cloud security is very vital. Existing network security mechanisms face new challenges in the cloud such as DDOS attacks, virtual machine intrusion attacks and malicious user activities. This chapter includes brief introduction about cloud computing, concept of virtualization, cloud security, various DDOS attacks, tools to run these attacks & various techniques to detect these attacks, review of threshold methods used for detection of DDOS attacks & abnormal network behavior and proposed dynamic threshold based algorithmic approach. Although various cloud security measures are prevailing to avoid virtual machine attacks and malicious user activities but these are not foolproof. Hence, new security methods are required to increase users' level of trust in clouds. By scrubbing traffic at major Internet points and backbone connection, a defense line is created for mitigation of DDOS attacks. Dynamic threshold algorithm based approach is proposed as a proactive approach to detect DDOS attacks for achieving secure cloud environment.


Author(s):  
Chandu Thota ◽  
Revathi Sundarasekar ◽  
Gunasekaran Manogaran ◽  
Varatharajan R ◽  
Priyan M. K.

This chapter proposes an efficient centralized secure architecture for end to end integration of IoT based healthcare system deployed in Cloud environment. The proposed platform uses Fog Computing environment to run the framework. In this chapter, health data is collected from sensors and collected sensor data are securely sent to the near edge devices. Finally, devices transfer the data to the cloud for seamless access by healthcare professionals. Security and privacy for patients' medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. The main focus of this work is to secure Authentication and Authorization of all the devices, Identifying and Tracking the devices deployed in the system, Locating and tracking of mobile devices, new things deployment and connection to existing system, Communication among the devices and data transfer between remote healthcare systems. The proposed system uses asynchronous communication between the applications and data servers deployed in the cloud environment.


2018 ◽  
pp. 102-131
Author(s):  
Heather Hinton

Despite a rocky start in terms of perceived security, cloud adoption continues to grow. Users are more comfortable with the notion that cloud can be secure but there is still a lack of understanding of what changes when moving to cloud, how to secure a cloud environment, and most importantly, how to demonstrate compliance of these cloud environment for regulatory purposes. This chapter reviews the basics of cloud security and compliance, including the split of security responsibility across Cloud provider and Client, considerations for the integration of cloud deployed workloads with on-premises systems and most importantly, how to demonstrate compliance with existing internal policies and workload required regulatory standards.


Sign in / Sign up

Export Citation Format

Share Document