You are on page 1of 11

NAME-SAURABH PATEL

ADMISSION NO.-16SCSE105032

SUBJECT- INTRODUCTION TO
VIRTUALIZTION AND CLOUD COMPUTING
PBL

BATCH – CLOUD 2

SUBMITTED TO-DR. ABHINEET


ANAND

TOPIC-QUANTUM CLOUD COMPUTING


ABSTRACT

Quantum cloud computing runs on theory concepts but still there are
experiment reviews. Cloud computing is popular worldwide. Where the cloud
facing problems backup, security, processing and locality. So quantum
computing shown ultimate growth in these areas. Most propel who working on
quantum says that it will overcome the cloud services problems. Quantum cloud
computing is deploying the sources of quantum computation in a cloud
environment to provide solution of the following challenges and problems faced
by present model of simple cloud computation But to combine physics based
atomic computing with software based cloud computing is not everyone cup of
tea. Our paper will show all the possible advantages and disadvantages of
quantum computing with respect to combine with cloud system and review
some of the following update with some doubtful future prospective of quantum
as a cloud service. Also we will review on the reality of quantum services with
other fields at present time.

INTRODUCTION
Cloud computing is named as globalizations for internet, computer and services.
As per NIST cloud computing is an unable for continent, on demand network
accessed by the shared pool of configured computer resources that must be
rapidly increased with minimum efforts in management and man power or can
be less interaction it the service provider. In this area implementation of
quantum cloud computing theory concentrates on the principles for
development about the concept on computer based technology is called as
Quantum computing. The main focus is to define the nature and character of
energy and matter on the level of quantum. There is always required a lot of
development in the quantum computing from the last million area in increasing
the capacity of quantum computer in the same way how the development from
simple CPU to today’s super computer. Quantum computing can be easily
understand by learning the concepts of quantum laws of physics by which there
has high processing power is achieved and the capacity will be developed to
several states and these will multiple helps in executing the tasks in terms of
parallel combinations. Generally quantum computing depends on the quantum
laws of physics because there are several advantages from the quantum physics
atoms and nucleus properties which are defines as the quantum physics laws
and quantum computing are permitted by these properties to work mutually as
quantum bits or simply as qubits, to be the processor or memory of a computer.
There is always advantage of qubits is particular calculation are made faster
exponentially when compared to the normal computers. The computations on
usual binary characters is not the base for qubits always, because by using the
usual computers the information is encoded using the binary characters
particularly into bits is encoded into ‘1’ or ‘0’ and also the calculations for only
one set of number can only done at a time and in case of the quantum
computers data is encode into a series of quantum states like electrons in spin
direction, magnetic field or arrangement of photon polarization which can be
represented with ‘0’ or ‘1’, or can also be represented as superposition of many
numbers which are not similar and sometimes represented as a number that
express the state of qubits represented among ‘1’ or ‘0’ anywhere or may also
represented as orientation of both. In daily life we are using cloud computer
directly or indirectly. In short, cloud computing is a definition of keeping,
accessing and processing the process and data over the internet instead of
computers. Cloud computing includes many levels and terms. As system has
some problems same for cloud computing has dependencies over the weakness.
So the new service involves as Quantum Cloud as a Service. Our main concern
about to show a summarize over secured and encrypted data and processing
through computing. Let us talk about physics quantum first! Consider a system
contain 28 particles. We have variables in superposition equation to tell about
the state of. Consider that two variables are combined with each particle then,
with the system of 28 particles we can describe that state which value includes 2
to the power of 28 variables that means a machine is in a state given by the
combination of these variables. This much amount of data can be stored in
classical computer but if we talk about more than 100 powers then that amount
of data can’t take by classical computer because of unavailability of memory
and space. As few terms about the quantum cryptography:-
1. Qubit
Simple computer works on the principle of binary digits (0/1) but in quantum
system the unit are called qubits (0 or 1 || 0 and 1). As per theorem of Bloch
sphere if measure 0 as south pole and 1 as a north pole then qubits reach into the
potential state at which combination of 0 and 1 often called as a superposition.
2. Photon Polarization
This is about a photon passing through a filter to get a specific spin.
3. Quantum Entanglement
This particle reaction states that two photons are entangled pairs which means if
one photon has an opposite spin of another one not having no physical
connection with them. Sending photon in process of polarisation filter as only
sender and receiver know about the encryption and decryptions.
Major drawbacks of cloud computing
1. Downtime
2. Security and Privacy
3. Vulnerability to attack
4. Limited control and flexibility
5. Cloud Computing platform dependencies

Two Quantum Approach

The recent experiments reviews about the quantum principles that show the
two different ways to secure cloud system. One is called blind computing
where all the input, data processing, will remain unknown to the quantum
processed computer itself. As per blind computing says that the cloud user
generates Qubit and he only knows about initial states. Sending these Qubit
to the quantum computer, the computer combine the Qubit using a standard
system. The actual computation is based on measurement. The user takes
the guidelines of these measures to the specific state of each quantum bit.
And he sends them to a quantum server. A bit seconds after there are
successful processing the user gets back to his result and he can receive the
final result. The whole process is “blind” because if the quantum computer
or an eavesdropper tries to decipher the Qubit, they will not get any
beneficial information. It’s because they don’t know the initial states. [2]
Another approaches is quantum cryptography with quantum internet
system, where information is encrypted and decrypted using photon
polarization filters.
Quantum Computation in Cloud System & Some Major
Concerns
At present there are two types of cryptography (symmetric cryptography,
asymmetric cryptography) both has advantages and disadvantages. Let has
an example in asymmetric cryptography if someone’s lost their private key
and disclose then he must generate a new pair of public and private keys.
These cryptography always use 128-bit key that makes any hacker take
large amount of time to crack password even if we use supercomputer. Now
a day’s physics has shown a new direction towards the quantum mechanics
where a quantum computer has unexpected power to calculate in short
period. From last discussion each time a single Qubit is added to a quantum
computer its computational power gets double. Using only 256 Qubits we
can get 2256 combination of input/output at a time. As per Grover’s
quantum algorithm o(√ n) using superposition of Qubits anyone can search
from 250000 data using only √ 256000 = 160 steps where classical
computer need at least n/2 = 128000 steps. This means quantum computer
can reduce the no of steps of processing of any operation of years into
milliseconds. So once quantum computer is developed completely our
present 128-bit cryptography system can be easily hacked within few
milliseconds. There are many fields in which securing the data is the
necessary steps for government agencies, banks, security companies,
defense because one day this quantum technology might hack any system at
any time. So we need new strong encryption and secured communication
system. And there comes quantum computation for fast processing and
quantum cryptography for security issues
Processing and quantum cryptography used for security issues. These
technique also applies for Quantum internet system to secure the cloud
communication for the end-users. Quantum internet is totally based on
photon transmission, when we send any encrypted information on the cloud
if someone eavesdrop it then the data can be instantly changed. Finally
when the data is received by end user he will able to find out that someone
eavesdrop on the communication during transmission. So if we want to
build an internet using quantum physics or then the security system will
improve drastically. A team of researchers from the Massachusetts Institute
of Technology (MIT) and Northwestern University (NU) developed a
system for long-distance, high-fidelity Qubit teleportation. Such a system
will be required if future quantum computers are to be linked together into a
quantum Internet. [10] Also no cloning criteria of quantum computation
ensures us that, we cannot achieve an identical copy of any quantum state in
the middle of computation. This means no eavesdropper can able to get a
copy of transferred quantum cryptography keys. If someone is able to clone
any state then he could make many identical copies of it. At the same time
he can measure each dynamical variable with random precision; that will
avoid the uncertainty principle. But due to the non-cloning theorem this fear
is prevented. [3] So what are the major difficulties of quantum
cryptography? Firstly most of the quantum issues are in theories. Some of
them are proved and some are in experimental process. Beside this major
concern for quantum computations are:
1. Generating a Qubit and synchronize multiple Qubits at a time is
extremely difficult.
2. The length of quantum cryptology transmission capability is too short
because of interference. Recently a team of Boris Korzh, Charles ci wen
Lim and many other demonstrated an acceptable practical and secure
quantum key distribution (QKD) over 307 km of optical fiber.[4]
3. Hardest fact for quantum communication is quantum distributed
networks, where we must convert multiple Qubits into photons based on
which matter we are using. It is essential for long distance communication
to convert any quantum states from atomic system to photonic system.
4. We cannot amplify the quantum key carrier signal to transmit long
distance because an optical amplifier could corrupt the Qubits. Even a
single particle effect can corrupt the polarized photon. It’s too sensitive.
5. A photon’s spin can be changed when it bounces off other particles, and
so when it's received, it may no longer be polarized the way it was
originally intended to be.
6. Most of the quantum computation is based on law of physics; there are
several complexities on developing quantum code compilation or software
controlled system.
7. What if the eavesdropper also has a quantum computer?
8. The whole process is expensive, sensitive and not yet fruitful. But the
unpleasant true is there is still no full featured quantum computation system
with proper advanced technologies. Finally we have to remember that, an
inside unethical attack in cloud system is irresistible. According to Seth
Lloyd, an expert in quantum computation at the Massachusetts institutes of
technology “treachery is the primary way, “there’s nothing quantum
mechanics can do about that.” [5]
Limitations of Quantum Clouds Quantum
Clouds inherit their limitations from the basic principles of Quantum
mechanics. Some limitations are intrinsic to the nature of Quantum
paradigm itself, for instance, No cloning theorem, Heisenberg’s uncertainty
principle and others are practical or constraints of our present technology
such as decoherence. Other limitations are induced by some present
quantum algorithms, for instance, not all quantum algorithms are
exponentially superior to classical ones as expected but some like searching
the database with Grover’s algorithm can provide quadratic speedup over
the classical at the most [1]. Quantum decoherence If the quantum
processor is not perfectly isolated from the environment, it couples with the
latter one and the quantum states are modified or stating it otherwise,
original superposition of states is adulterated leading to the phenomenon
known as quantum decoherence. [10] We avoid the intrinsic decoherence
properties of the circuit by getting rid of the junk bits generated in quantum
circuits by deploying a similar reversible circuit and copying the required
bits to workspace using the CNOT gate. This forms the basic step of some
very prominent quantum algorithms, for instance, Simon’s algorithm,
Shor’s factoring algorithm and Grover’s algorithm. Therefore, Quantum
dynamics of the environment surrounding the processor are quite
significant and relevant to quantum cloud as they tend to entangle the qubits
of the system to the environmental quantum states thereby irreversibly
destroying the information in the superposition of quantum processor states
hence, making decoherence as one of the fundamental limitation kin the
quantum realm [10]. Heisenberg’s uncertainty principle it states that
accurate measurement of one observable makes the value of another
observable less certain. In terms of qubits this principle can be stated as the
product of spread of a qubit in sign basis and in standard basis cannot be
less then square root of 2.This implies that we cannot determine the sign
value and the bit value of a qubit accurately simultaneously. No cloning
theorem it states that an unknown quantum state cannot be cloned. Owing
to this theorem, quantum error correcting codes seem infeasible, though it
also presents an advantage that due to the improbable nature of copying of
quantum information, we have quantum key generation systems which are
unconditionally secure. The use of this limitation is indispensable in
quantum clouds. Holevo theorem it limits the amount of quantum
information that we can extract from a quantum state due to the
measurement principle of the quantum mechanics. We are only able to
access that state of the superposition 9 of the corresponding qubits which
result as the outcome of measurement and rest all are destroyed. According
to Holevo theorem, corresponding to n qubit state register we can encode
and decode safely only n bits though using dense coding we can encode n
bits in m(less than n) qubits [10]. To deal with such limitations, Quantum
fault tolerance (topological or brute force) and Quantum error correction
methods are deployed and these are still under research arena.
Research challenges in Quantum Clouds
Quantum technology is in working stage, therefore it has a large amount of
challenges which need to be identified before we use it on the large scale
into the machine. [10] Quantum Measurement The measurement dimension
of quantum reveals that a similar part of the state which is a complete
superposition of the probable states of the corresponding qubits involved
with normalized amplitudes with various probabilities. Thus exact state of a
system cannot be determined. The evaluation of the cost of quantum
computations in accordance with the quantum complexity theory is
hindered by this limitation [10]. Its significance can increase as the number
of required measuring devices increase for some polynomial time quantum
algorithms. Despite it being a research challenge, it can be used to battle
another quantum cloud limitation of decoherence. Entanglement protection
scheme makes use of the quantum measurement and can effectively
circumvent even entanglement sudden death (ESD). Multipartite
Entanglement Understanding and manipulation of multipartite entangled
states is indispensable for distributed quantum computing and networks and
therefore, plays an important role in quantum error correcting codes [10].
Since, entanglement cannot be shared among different particles in
accordance with [10], therefore it’s a flamboyant research challenge to
ascertain the limitations and possibilities of multipartite entanglement.
Quantum Information Processing The challenge in this domain is to
discover what is actually beyond” shor’s and Grover’s”. How to find
quantum algorithms for the problems like graph isomorphism, approximate
shortest vectors well as no abelian hidden subgroup problem. The challenge
is to address a rudimentary question of whether “fundamentally new”
quantum algorithms remain to be discovered. In the area of computation
theory, the challenge remains to determine the computation power of
quantum cellular automata as compared to quantum Turing machine.
Quantum clouds need to address these challenges for the 10 efficient
implications of a quantum infrastructure in cloud environment. Quantum
cloud processors Processors that could carry out quantum computation on a
wider and reliable scale have been under the scanner of immense
technological research We have experimentally demonstrated the
entanglement, teleportation and implementation of quantum algorithms on
2 to 7 qubit processors Amon which only superposition have been
demonstrated on 7 qubit processors. Various techniques proposed and used
in developing these qubit processors are trapped ions, liquid state NMR,
electron spin transistors, but the adversities associated which challenge
further development are setting up of an initial state, stabilizing quantum
memory, performing measurement readouts, battling decoherence. The
scope of qubit processors needs to be enlarged for its practical
implementation in Quantum clouds so that they can shoulder the burden of
the information to be processed. Quantum-classical Interface protocols this
challenge is yet a novice considering the fact that once we have
implemented a basic quantum computer and devised the requisite quantum
algorithms, next step would be to create an interface between classical and
quantum infrastructure as with quantum clouds, the client will be having
classical infrastructure. Networking protocols that could incorporate
quantum levels along with classical levels along with the implementation of
concepts of blind quantum computing and quantum cryptography need to
be developed.

Recent Progress to Overcome These Problems


Whenever the problem arise in classical cloud computing or quantum cloud
computing so the progress is still ongoing. All we need that advanced
quantum computer that generates multiple qubits, quantum protocols and
proper medium at once generates for communication. Google has already
discovered their first quantum computer will build on d-wave’s approaches.
They are going to design Qubits in different way by improving d-wave’s
hardware. The recent d-wave’s main machine chip contains 512 Qubits.
Also Google’s quantum researcher believed that they and d-wave will build
a new 1000 Qubit processor and make it become available. [6] As we say
about blind computing recently in 2012, s. Bars, e. Kashefi, a. Broadbent, j.
F. Fitzsimons, a. Zeilinger and p. Walther demonstrate an experimental
blind quantum computing for secured cloud computing. They achieved the
theoretical framework of measurement-based quantum computation that
enables a user to represent a computation to a quantum server. [7] Also in
27 September 2013 a quantum-cloud system has already been demonstrated
by a group of scientist of Bristol University, United Kingdom. This
initiative has been named as Qcloud. The Qcloud quantum computer placed
at the center for quantum photonics in the Bristol University. The idea is to
establish a practical aspect of quantum computing as a service (QCaaS).
This quantum processor would be remotely accessed and controlled by
anyone in the world. It would allow people to run an experiment, and test
the real experimental data against their simulations. However, they are only
using two Qubits. This shows a practical example of application of the
quantum computing-cloud computing in recent time. [8] In the case of
quantum key‟s long distance transmission, we need some kinds of quantum
repeater. We can take the advantage of photon’s “spooky action at
distance”. Because of link between two pairs of entangled An Overview on
Quantum Computing as a Service (QCaaS): Probability or Possibility 21
photons any information could „teleport‟ across a huge distance. In this
way quantum keys could be teleported anywhere in the world. In august 19,
2004 at the institute of experimental physics in Vienna scientist Anton
Zeilinger and his team took an initial pace to demonstrate a repeater.
Zeilinger and his team took the advantage of entanglement and “teleport”
an information over 600 meters distance carried by a 3rd photon across the
Danube. If this system could extend into multiple relays then the Qubits in a
key could be transmitted across continents or oceans. [9]
Certain and uncertain future
Cloud computing always doubtable if there is no guarantee of security and
the reliability for the end user, We have already seen the concepts of
quantum computing can remove all the problem faced by cloud and only if
the the quantum cloud computing is completely developed for future. At
Census IBM claimed a new supercomputing chip to build for the cloud
computers. But in wired magazine still has doubt on quantum computation.
Many companies tell about the demerits of quantum computations. The
major concerns are: Is the big black box: d wave a quantum computer? Can
we control the subatomic level? How to build a new gate to operate Qubits?
How we will prevent noise effect on photon? If a little noise disentangles
the Qubits then the whole quantum computer will act like a classical
computer. Also how to integrate large scale (1000) Qubits in parallel? How
much portability it contains? Another crucial paradox is that even we
successfully run a calculation we can’t find every single step of it (for
further use or error checking) rather than we will find only single state of
all possible superposition of photon. There are yet many questions yet to
answer. This makes it quantum cloud computing.
Conclusions

In this paper we try to tell how quantum based cloud is more efficient than basic
computing. Quantum cloud is better in terms of security, processing and
working than normal cloud computing. We are putting all possible approach
with suitable examples to show the development of quantum clouds computing.
The new approach coming for future as Quantum cloud as a service (Qcaas) .As
quantum arrives we have still to learn and develop for flexible enterprise and
companies for best services. We hope in future it will continuously develop and
bring a new revolution and make the best future.

References
[1] “https://en.wikipedia.org/wiki/Qubit” Wikimedia Foundation, 2001.Web. 17 March, 2015

[2] “http://phys.org/news/2012-01-quantum-mechanics enables-perfectly-cloud.html”. Web.


19 January 2012

[3] “http://www.quantiki.org/wiki/The_nocloning theorem” Web. 9 June, 2010.

[4] Boris Korzh, Charles Ci Wen Lim, Raphael Houlmann, Nicolas Gisin, Ming Jun Li,
Daniel Nolan, Bruno Sanguinetti, Rob Thew and Hugo Zbinden. “Provably Secure and
Practical Quantum Key Distribution Over 307 Km of Optical Fibre”, Nature Photonics 9
(2015): 163–168.

[5] Stix, Gary. “Best-Kept Secrets”, Scientific American, 20 December 2004: 83

[6] “http://www.technologyreview.com/news/530516/google-launches-effort-to-build-its-
own-quantum computer/” Web. 3 September 2014.

[7] S. Barz, E. Kashefi, A. Broadbent, J. F. Fitzsimons, A. Zeilinger And P. Walther.


“Demonstration of Blind Quantum Computing”, Science Journal Vol. 335 No. 6066 (2012):
303-308.

[8] Harpreet Singh, Abha Sachdev. “The Quantum Way of Cloud Computing”, IEEE (2014):
397 - 400.

[9] Stix, Gary. “Best-Kept Secrets”, Scientific American, 20 December 2004: 83.
[10] Seth Lloyd, Jeffrey H. Shapiro, Prem Kumar and Selim M. Shahriar. “Infrastructure for
the Quantum Internet”. ACM SIGCOMM Computer Communications Review. Vol. 34,
Number 5. October, 2004

[11] http://www.mecs-press.org/ijmsc/ijmsc-v2-n1/IJMSC-V2-N1-2.pdf

You might also like