量子计算的网络保护应用:回顾

Ummar Ahmed, Tuomo Sipola, Jari Hautamäki
{"title":"量子计算的网络保护应用:回顾","authors":"Ummar Ahmed, Tuomo Sipola, Jari Hautamäki","doi":"arxiv-2406.13259","DOIUrl":null,"url":null,"abstract":"Quantum computing is a cutting-edge field of information technology that\nharnesses the principles of quantum mechanics to perform computations. It has\nmajor implications for the cyber security industry. Existing cyber protection\napplications are working well, but there are still challenges and\nvulnerabilities in computer networks. Sometimes data and privacy are also\ncompromised. These complications lead to research questions asking what kind of\ncyber protection applications of quantum computing are there and what potential\nmethods or techniques can be used for cyber protection? These questions will\nreveal how much power quantum computing has and to what extent it can\noutperform the conventional computing systems. This scoping review was\nconducted by considering 815 papers. It showed the possibilities that can be\nachievedif quantum technologies are implemented in cyber environments. This\nscoping review discusses various domains such as algorithms and applications,\nbioinformatics, cloud and edge computing, the organization of complex systems,\napplication areas focused on security and threats, and the broader quantum\ncomputing ecosystem. In each of these areas, there is significant scope for\nquantum computing to be implemented and to revolutionize the working\nenvironment. Numerous quantum computing applications for cyber protection and a\nnumber of techniques to protect our data and privacy were identified. The\nresults are not limited to network security but also include data security.\nThis paper also discusses societal aspects, e.g., the applications of quantum\ncomputing in the social sciences. This scoping review discusses how to enhance\nthe efficiency and security of quantum computing in various cyber security\ndomains. Additionally, it encourages the reader to think about what kind of\ntechniques and methods can be deployed to secure the cyber world.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"54 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Protection Applications of Quantum Computing: A Review\",\"authors\":\"Ummar Ahmed, Tuomo Sipola, Jari Hautamäki\",\"doi\":\"arxiv-2406.13259\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Quantum computing is a cutting-edge field of information technology that\\nharnesses the principles of quantum mechanics to perform computations. It has\\nmajor implications for the cyber security industry. Existing cyber protection\\napplications are working well, but there are still challenges and\\nvulnerabilities in computer networks. Sometimes data and privacy are also\\ncompromised. These complications lead to research questions asking what kind of\\ncyber protection applications of quantum computing are there and what potential\\nmethods or techniques can be used for cyber protection? These questions will\\nreveal how much power quantum computing has and to what extent it can\\noutperform the conventional computing systems. This scoping review was\\nconducted by considering 815 papers. It showed the possibilities that can be\\nachievedif quantum technologies are implemented in cyber environments. This\\nscoping review discusses various domains such as algorithms and applications,\\nbioinformatics, cloud and edge computing, the organization of complex systems,\\napplication areas focused on security and threats, and the broader quantum\\ncomputing ecosystem. In each of these areas, there is significant scope for\\nquantum computing to be implemented and to revolutionize the working\\nenvironment. Numerous quantum computing applications for cyber protection and a\\nnumber of techniques to protect our data and privacy were identified. The\\nresults are not limited to network security but also include data security.\\nThis paper also discusses societal aspects, e.g., the applications of quantum\\ncomputing in the social sciences. This scoping review discusses how to enhance\\nthe efficiency and security of quantum computing in various cyber security\\ndomains. Additionally, it encourages the reader to think about what kind of\\ntechniques and methods can be deployed to secure the cyber world.\",\"PeriodicalId\":501168,\"journal\":{\"name\":\"arXiv - CS - Emerging Technologies\",\"volume\":\"54 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Emerging Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2406.13259\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2406.13259","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

量子计算是利用量子力学原理进行计算的尖端信息技术领域。它对网络安全行业具有重大影响。现有的网络保护应用运行良好,但计算机网络仍存在挑战和漏洞。有时,数据和隐私也会受到损害。这些复杂情况引发了一些研究问题:量子计算有哪些网络保护应用,有哪些潜在方法或技术可用于网络保护?这些问题将揭示量子计算有多强大,以及在多大程度上可以超越传统计算系统。本次范围界定审查共审议了 815 篇论文。它展示了量子技术在网络环境中的应用所能带来的可能性。本范围综述讨论了多个领域,如算法和应用、生物信息学、云计算和边缘计算、复杂系统的组织、关注安全和威胁的应用领域,以及更广泛的量子计算生态系统。在上述每个领域,量子计算都有很大的应用空间,并将彻底改变工作环境。我们发现了大量量子计算在网络保护方面的应用,以及大量保护数据和隐私的技术。本文还讨论了社会方面的问题,例如量子计算在社会科学中的应用。本范围综述讨论了如何在各种网络安全领域提高量子计算的效率和安全性。此外,它还鼓励读者思考可以采用什么样的技术和方法来确保网络世界的安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cyber Protection Applications of Quantum Computing: A Review
Quantum computing is a cutting-edge field of information technology that harnesses the principles of quantum mechanics to perform computations. It has major implications for the cyber security industry. Existing cyber protection applications are working well, but there are still challenges and vulnerabilities in computer networks. Sometimes data and privacy are also compromised. These complications lead to research questions asking what kind of cyber protection applications of quantum computing are there and what potential methods or techniques can be used for cyber protection? These questions will reveal how much power quantum computing has and to what extent it can outperform the conventional computing systems. This scoping review was conducted by considering 815 papers. It showed the possibilities that can be achievedif quantum technologies are implemented in cyber environments. This scoping review discusses various domains such as algorithms and applications, bioinformatics, cloud and edge computing, the organization of complex systems, application areas focused on security and threats, and the broader quantum computing ecosystem. In each of these areas, there is significant scope for quantum computing to be implemented and to revolutionize the working environment. Numerous quantum computing applications for cyber protection and a number of techniques to protect our data and privacy were identified. The results are not limited to network security but also include data security. This paper also discusses societal aspects, e.g., the applications of quantum computing in the social sciences. This scoping review discusses how to enhance the efficiency and security of quantum computing in various cyber security domains. Additionally, it encourages the reader to think about what kind of techniques and methods can be deployed to secure the cyber world.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Pennsieve - A Collaborative Platform for Translational Neuroscience and Beyond Analysing Attacks on Blockchain Systems in a Layer-based Approach Exploring Utility in a Real-World Warehouse Optimization Problem: Formulation Based on Quantun Annealers and Preliminary Results High Definition Map Mapping and Update: A General Overview and Future Directions Detection Made Easy: Potentials of Large Language Models for Solidity Vulnerabilities
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1