Cloud Security in the Age of Quantum Computing: Risks and Countermeasures

Main Article Content

Arun Singla*

Abstract

While quantum computing has the potential to greatly enhance processing capability, it also presents serious concerns regarding the security of cloud computing. Threatening the security of cloud-based systems are the sophisticated algorithms made possible by quantum computers, which are able to crack traditional encryption methods. cloud security and the possible dangers posed by quantum computing, with an emphasis on the weaknesses of popular cryptography methods like RSA and ECC. It delves into the idea of encryption algorithms that are resistant to quantum computing as well as various countermeasures that businesses might implement to protect their cloud infrastructures in the age of quantum computing. The paper delves further into the subject, including topics such as post-quantum cryptography, developing protocols that are quantum-safe, and the significance of taking the initiative to update security frameworks. To help enterprises prepare for the difficulties of quantum computing and guarantee long-term security in cloud environments, this article analyzes current research and prospective solutions. The results offer actionable insights.

Article Details

How to Cite
Singla, A. (2024). Cloud Security in the Age of Quantum Computing: Risks and Countermeasures. Shodh Sagar Journal of Artificial Intelligence and Machine Learning, 1(3), 10–13. https://doi.org/10.36676/ssjaiml.v1.i3.18
Section
Original Research Articles

References

Charu Jain. (2024). Survey of Cloud Computing Security and Privacy Issues. Darpan International Research Analysis, 12(3), 160–171. https://doi.org/10.36676/dira.v12.i3.63

Vijay Bhasker Reddy Bhimanapati, Dr. Punit Goel, & Anshika Aggarwal. (2024). Integrating Cloud Services with Mobile Applications for Seamless User Experience. Darpan International Research Analysis, 12(3), 252–268. https://doi.org/10.36676/dira.v12.i3.81

Sowmith Daram, Dr. Shakeb Khan, & Er. Om Goel. (2024). Network Functions in Cloud: Kubernetes Deployment Challenges. Global International Research Thoughts, 12(2), 34–46. https://doi.org/10.36676/girt.v12.i2.118

Tangudu, A., Jain, S., & Aggarwal, A. (2024). Best Practices for Ensuring Salesforce Application Security and Compliance. Journal of Quantum Science and Technology, 1(2), 88–101. https://doi.org/10.36676/jqst.v1.i2.18

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.