[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Revolutionizing Military Technology: How the Fusion of BlockChain and Quantum Computing is Driving in Defense Application

  • Chapter
  • First Online:
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications

Abstract

Blockchain is a cutting-edge innovation that has reformed the manner in which society connects and exchanges. It very well may be characterized as a chain of blocks that stores data with computerized marks in a circulated and decentralized network. Many years of hacking and taking advantage of digital protection frameworks have more than once demonstrated how a decided digital assailant might think twice and regular citizen organizations. The danger of refined weapon frameworks being hurt or debilitated by non-dynamic effects has constrained militaries to foster a long haul and unmistakably savvy safeguard for military frameworks. Blockchain, and it’s at this point untested military purposes, can move the security weaknesses of some digital frameworks from a weak link weakness model, in which an aggressor just has to think twice about hub to disregard the framework, to a greater part compromised weakness model, in which a noxious entertainer can’t take advantage of a weak link. Quantum innovation interprets the standards of quantum physical science into mechanical applications. As a general rule, quantum innovation has not yet arrived at development; be that as it may, it could hold critical ramifications for the fate of military detecting, encryption, and correspondences, as well as concerning legislative oversight, approvals, and assignments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 103.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Alrawais A, et al. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput 21(2):34–42

    Google Scholar 

  • Antonopoulos AM (2014) Mastering Bitcoin: “Unlocking Digital Cryptocurrencies” O’Reilly Media, Inc.

    Google Scholar 

  • Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing. ACM, pp 13–16

    Google Scholar 

  • Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things characterization of fog computing. In: Proc. first Ed. MCC Work. Mob. cloud Comput, pp 13–15

    Google Scholar 

  • Carbonneau R, Laframboise K, Vahidov R (2008) Application of machine learning techniques for supply chain demand forecasting. Eur J Oper Res 184(3):1140–1154

    Article  Google Scholar 

  • Casavant TL, Kuhl JG (1988) A taxonomy of scheduling in general-purpose distributed computing systems. IEEE Trans Software Eng 14(2):141–154

    Article  Google Scholar 

  • Chen M, Hao Y, Hwang K, Wang L, Wang L (2017) Disease prediction by machine learning over big data from healthcare communities. IEEE Access 5:8869–8879

    Article  Google Scholar 

  • Compton K, Hauck S (2002) Reconfigurable computing: a survey of systems and software. ACM Comput Survey 34(2):171–210

    Article  Google Scholar 

  • Eshratifar AE, Pedram M (2018) Energy and performance efficient computation offloading for deep neural networks in a mobile cloud computing environment. In: Proceedings of the 2018 on Great Lakes Symposium on VLSI. ACM, pp 111–116

    Google Scholar 

  • Eshratifar AE, Esmaili A, Pedram M (2019) BottleNet: a deep learning architecture for intelligent mobile cloud computing services. arXiv preprint arXiv:1902.01000

  • Fang X, Member S, Misra S, Xue G, Yang D (2011) Smart grid – the new and improved power grid, pp 1–37

    Google Scholar 

  • Flynn MJ (1966) Very high-speed computing systems. Proc IEEE 54(12):1901–1909

    Article  Google Scholar 

  • Gill SS, Chana I, Singh M, Buyya R (2019) RADAR: self‐configuring and self‐healing in resource management for enhancing quality of cloud services. Concurr Comput Pract Exp 31(1):e4834

    Google Scholar 

  • Gill SS, Garraghan P, Buyya R (2019) ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices. J Syst Soft

    Google Scholar 

  • Gill SS, Garraghan P, Stankovski V, Casale G, Thulasiram RK, Ghosh SK, Ramamohanarao K, Buyya R (2019) Holistic resource management for sustainable and reliable cloud computing: an innovative solution to global challenge. J Syst Software

    Google Scholar 

  • Glikson A, Nastic S, Dustdar S (2017) Deviceless edge computing: extending serverless computing to the edge of the network. In: Proceedings of the 10th ACM international systems and storage conference. ACM, p 28

    Google Scholar 

  • Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things ( IoT ): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  • Han KH, Kim JH (2002) Quantum-inspired evolutionary algorithm for a class of combinatorial optimization. IEEE Trans Evol Comput 6(6):580–593

    Article  Google Scholar 

  • Iorga M, Feldman L, Barton R, Martin MJ, Goren N, Mahmoudi C (2018) Fog computing conceptual model: recommendations of the national institute of standards and technology. NIST Spec Publ, pp 500–325

    Google Scholar 

  • Jia L, Zhao Q, Tong L (2013) Retail pricing for stochastic demand with unknown parameters: an online machine learning approach. In: 2013 51st Annual Allerton conference on communication, control, and computing (Allerton). IEEE, pp 1353–1358

    Google Scholar 

  • Jordan MI, Mitchell TM (2015) Machine learning: trends, perspectives, and prospects. Science 349(6245):255–260, 29

    Google Scholar 

  • Kosba A, Miller A, Shi E, Wen Z (2016) Papamanthou C. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. Security and Privacy (SP). In: 2016 IEEE Symposium on, San Jose, CA, USA, IEEE, pp 839–858

    Google Scholar 

  • Leuenberger MN, Loss D (2001) Quantum computing in molecular magnets. Nature 410(6830):789

    Article  CAS  Google Scholar 

  • Li X, Jiang P, Chen T, Luo X, Wen Q (2017) A survey on the security of blockchain systems. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2017.08.020

    Article  Google Scholar 

  • Lin J, Yu W, Yang X (2016) Towards multistep electricity prices in smart grid electricity markets. IEEE Trans Parallel Distrib Syst 27(1):286–302

    Article  Google Scholar 

  • Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142

    Article  Google Scholar 

  • Lloyd S, Mohseni M, Rebentrost P (2013) Quantum algorithms for supervised and unsupervised machine learning. arXiv preprint arXiv:1307.0411

  • Madsen H, Albeanu G, Burtschy B, Popentiu-Vladicescu F (2013) Reliability in the utility computing era: Towards reliable fog computing. Int Conf Syst Signals, Image Process, pp 43–46

    Google Scholar 

  • Michie D, Spiegelhalter DJ, Taylor CC (1994) Machine learning. Neural Stat Class 13

    Google Scholar 

  • Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system

    Google Scholar 

  • Nguyen KK, Hoang DT, Niyato D, Wang P, Nguyen D, Dutkiewicz E (2018) Cyberattack detection in mobile cloud computing: A deep learning approach. In: 2018 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1–6

    Google Scholar 

  • Osia SA, Shamsabadi AS, Taheri A, Katevas K, Sajadmanesh S, Rabiee HR, Lane ND, Haddadi H (2017) A hybrid deep learning architecture for privacy-preserving mobile analytics. arXiv preprint arXiv:1703.02952

  • Rahmani AM et al (2018) Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: a fog computing approach. Futur Gener Comput Syst 78:641–658

    Article  Google Scholar 

  • Reyna A, et al. (2018) On blockchain and its integration with IoT. Challenges and opportunities. Futur Gener Comput Syst 88:173–190

    Google Scholar 

  • Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. In: INC, IMS and IDC, 2009. NCM'09. Fifth International Joint Conference on IEEE, pp 44–51

    Google Scholar 

  • Samaniego M, Deters R (2016) Blockchain as a Service for IoT. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE

    Google Scholar 

  • Schuld M, Sinayskiy I, Petruccione F (2015) An introduction to quantum machine learning. Contemp Phys 56(2):172–185

    Article  Google Scholar 

  • Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Sel Areas Commun 35(11):2586–2595

    Article  Google Scholar 

  • Singh S, Chana I, Buyya R (2017) STAR: SLA-aware autonomic management of cloud resources. IEEE Trans Cloud Comput

    Google Scholar 

  • Singh S, Chana I (2015) Q-aware: quality of service based cloud resource provisioning. Comput Electr Eng 47:138–160

    Article  Google Scholar 

  • Singh S, Chana I (2016a) QoS-aware autonomic resource management in cloud computing: a systematic review. ACM Comput Survey 48(3):42

    Article  Google Scholar 

  • Singh S, Chana I (2016b) A survey on resource scheduling in cloud computing: Issues and challenges. J Grid Comput 14(2):217–264

    Article  Google Scholar 

  • Singh I, Singh S (2016) Model for targeting customers based on analytics in telecom domain. Int J Modern Educ Comput Sci 8(11):43

    Article  Google Scholar 

  • Singh I, Singh S (2017) Framework for targeting high value customers and potential churn customers in telecom using Big Data Analytics. Int J Educ Manag Eng 7(1):36–45

    Google Scholar 

  • Singh S, Chana I, Singh M (2017a) The journey of QoS-aware autonomic cloud computing. IT Professional 19(2):42–49

    Article  Google Scholar 

  • Singh S, Chana I (2013) Consistency verification and quality assurance (CVQA) traceability framework for SaaS. In: 2013 3rd IEEE international advance computing conference (IACC). IEEE, pp 1–6

    Google Scholar 

  • Singh I, Singh KV, Singh S (2017) Big data analytics based recommender system for value added services (VAS). In: Proceedings of sixth international conference on soft computing for problem solving. Springer, Singapore, pp 142–150

    Google Scholar 

  • Stanciu A (2017) Blockchain based distributed control system for edge computing. In: 2017 21st international conference on control systems and computer science (CSCS). IEEE

    Google Scholar 

  • Steane A (1998) Quantum computing. Rep Prog Phys 61(2):117

    Article  CAS  Google Scholar 

  • Teerapittayanon S, McDanel B, Kung HT (2017) Distributed deep neural networks over the cloud, the edge and end devices. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 328–339

    Google Scholar 

  • The evolution of Distributed Systems. Available Online: https://medium.com/microservices-learning/the-evolution-of-distributedsystems-fec4d35beffd

  • Tordera EM, et al. (2016) What is a fog node a tutorial on current concepts towards a common definition

    Google Scholar 

  • Tuli, Shreshth, Redowan Mahmud, Shikhar Tuli, and Rajkumar Buyya. “FogBus: A blockchain-based lightweight framework for edge and fog computing.“ Journal of Systems and Software (2019). Volume 154, August 2019, Pages 22–36

    Google Scholar 

  • Wang Y, Uehara T, Sasaki R (2015) Fog computing: Issues and challenges in security and forensics. In: 2015 IEEE 39th annual computer software and applications conference, Vol 3. IEEE

    Google Scholar 

  • Yu J, Buyya R (2005) A taxonomy of workflow management systems for grid computing. J Grid Comput 3(3–4):171–2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vinay Aseri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Aseri, V., Chowdhary, H., Chaudhary, N.K., Pandey, S.K., Kumar, V. (2024). Revolutionizing Military Technology: How the Fusion of BlockChain and Quantum Computing is Driving in Defense Application. In: Kumar, A., Ahuja, N.J., Kaushik, K., Tomar, D.S., Khan, S.B. (eds) Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Contributions to Environmental Sciences & Innovative Business Technology. Springer, Singapore. https://doi.org/10.1007/978-981-97-0088-2_10

Download citation

Publish with us

Policies and ethics