Open Access Open Access  Restricted Access Subscription Access

An Enhanced Cloud Security Using Quantum Teleportation


Affiliations
1 Department of Computer Applications, IFET College of Engineering, Villupuram, Tamil Nadu, India
 

   Subscribe/Renew Journal


In the cloud environment, it is difficult to provide security to the monolithic collection of data as it is easily accessed by breaking the algorithms which are based on mathematical computations and on the other hand, it takes much time for uploading and downloading the data. This paper proposes the concept of implementing quantum teleportation i.e., telecommunication + transportation in the cloud environment for the enhancement of cloud security and also to improve speed of data transfer through the quantum repeaters. This technological idea is extracted from the law of quantum physics where the particles say photons can be entangled and encoded to be teleported over large distances. As the transfer of photons called qubits allowed to travel through the optical fiber, it must be polarised and encoded with QKD (Quantum Key Distribution) for the security purpose. Then, for the enhancement of the data transfer speed, qubits are used in which the state of quantum bits can be encoded as 0 and 1 concurrently using the Shor's algorithm. Then, the Quantum parallelism will help qubits to travel as fast as possible to reach the destination at a single communication channel which cannot be eavesdropped at any point because, it prevents from creating copies of transmitted quantum key due to the implementation of no-cloning theorem so that the communication parties can only receive the intended data other than the intruders.

Keywords

Qubits, Quantum Key Distribution, Quantum Repeaters, No-Cloning Algorithm, Quantum Parallelism.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Aaronson, S. (2007). The limits of quantum computers. In Proceedings of the 2nd International Conference on Computer Science: Theory and Applications.
  • Butler, B. (2012). Cloud security: Outages are bigger risk than breaches. Retrieved from http://www.infoworld. com/article/2613560/cloud-security/cloudsecurity9-top-threats-to-cloud-computing-security.html
  • Buzek, V., & Hillery, M. (2001). Quantum cloning. Physics World, 14(11), 25-29. Retrieved from http:// www.quantiki.org/wiki/The_no-cloning_theorem
  • Dieks, D. (1982). Communication by EPR devices. Physics Letters A, 92(6), 271-272.
  • Harrison, D. M. (2001). Quantum Teleportation, Information and Cryptography. Retrieved from http://www.upscale.utoronto.ca/PVB/Harrison/ QuantTeleport/QuantTeleport.html
  • Lovgren, S. (April 18, 2004). Teleportation Takes Quantum Leap, National Geographic News. Retrieved from http://news.nationalgeographic.com/ news/2004/08/0818_040818_teleportation_2.html
  • Matson, J. (2012). Quantum Teleportation achieved over Record Distances. Retrieved from http://www.sott.net/article/249799-Quantum-TeleportationAchieved-over-Record-Distances
  • Moore, S. K. (2012). Computing’s power limit demonstrated. Spectrum, 49(5),14.
  • Moorhouse, G. E., & Math, U. W. (1998). Shor’s algorithm for factorizing large integers. Retrieved from http://www.google.co.in/url?sa=t&rct=j&q=&esrc;= s&source=web&cd=6&ved=0CEcQFjAF&url=http ://www.uwyo.edu/moorhouse/slides/talk2.pdf&ei=j3gdVYnpPMGvsAHa3YG YAw&usg=AFQjCNHZyWj6CTG3nxCHS7p3pZggrCu5Qg&bvm=bv.89744112,d.bGg
  • Ouellette, J. (2013). How Quantum Computers and Machine Learning Will Revolutionize Big Data. Retrieved from http://www.wired.com/2013/10/ computers-big-data/all/
  • Quantum Key Distribution. Retrieved from http:// en.wikipedia.org/wiki/Quantum_key_distribution
  • Russell, J. (2008). Application of quantum key distribution. In IEEE Military Communications Conference.
  • Sharbaf, M. S. (2009). Quantum cryptography: A new generation of information technology security system. In 6th International Conference on Information Technology: New Generations.
  • Singh, H., & Sachdev, A. (2014). The quantum way of cloud computing. International Conference on Optimization, Reliability, and Information Technology, (pp. 397-400).
  • Singhal, S., Jain, A., Gankotiya, A. K., & Aggarwal, K. (2012). An investigation on quantum teleportation. 2nd International Conference on Advanced Computing Communication Technologies, (pp. 132-137).
  • Watrous, J. (2006). Quantum Key Distribution. Retrieved from https://cs.uwaterloo.ca/~watrous/CPSC519/ LectureNotes/18.pdf
  • Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802-803.

Abstract Views: 389

PDF Views: 160




  • An Enhanced Cloud Security Using Quantum Teleportation

Abstract Views: 389  |  PDF Views: 160

Authors

D. Sowmya
Department of Computer Applications, IFET College of Engineering, Villupuram, Tamil Nadu, India
S. Sivasankaran
Department of Computer Applications, IFET College of Engineering, Villupuram, Tamil Nadu, India

Abstract


In the cloud environment, it is difficult to provide security to the monolithic collection of data as it is easily accessed by breaking the algorithms which are based on mathematical computations and on the other hand, it takes much time for uploading and downloading the data. This paper proposes the concept of implementing quantum teleportation i.e., telecommunication + transportation in the cloud environment for the enhancement of cloud security and also to improve speed of data transfer through the quantum repeaters. This technological idea is extracted from the law of quantum physics where the particles say photons can be entangled and encoded to be teleported over large distances. As the transfer of photons called qubits allowed to travel through the optical fiber, it must be polarised and encoded with QKD (Quantum Key Distribution) for the security purpose. Then, for the enhancement of the data transfer speed, qubits are used in which the state of quantum bits can be encoded as 0 and 1 concurrently using the Shor's algorithm. Then, the Quantum parallelism will help qubits to travel as fast as possible to reach the destination at a single communication channel which cannot be eavesdropped at any point because, it prevents from creating copies of transmitted quantum key due to the implementation of no-cloning theorem so that the communication parties can only receive the intended data other than the intruders.

Keywords


Qubits, Quantum Key Distribution, Quantum Repeaters, No-Cloning Algorithm, Quantum Parallelism.

References