Abstract
Blockchain is a cutting-edge innovation that has reformed the manner in which society connects and exchanges. It very well may be characterized as a chain of blocks that stores data with computerized marks in a circulated and decentralized network. Many years of hacking and taking advantage of digital protection frameworks have more than once demonstrated how a decided digital assailant might think twice and regular citizen organizations. The danger of refined weapon frameworks being hurt or debilitated by non-dynamic effects has constrained militaries to foster a long haul and unmistakably savvy safeguard for military frameworks. Blockchain, and it’s at this point untested military purposes, can move the security weaknesses of some digital frameworks from a weak link weakness model, in which an aggressor just has to think twice about hub to disregard the framework, to a greater part compromised weakness model, in which a noxious entertainer can’t take advantage of a weak link. Quantum innovation interprets the standards of quantum physical science into mechanical applications. As a general rule, quantum innovation has not yet arrived at development; be that as it may, it could hold critical ramifications for the fate of military detecting, encryption, and correspondences, as well as concerning legislative oversight, approvals, and assignments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alrawais A, et al. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput 21(2):34–42
Antonopoulos AM (2014) Mastering Bitcoin: “Unlocking Digital Cryptocurrencies” O’Reilly Media, Inc.
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing. ACM, pp 13–16
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things characterization of fog computing. In: Proc. first Ed. MCC Work. Mob. cloud Comput, pp 13–15
Carbonneau R, Laframboise K, Vahidov R (2008) Application of machine learning techniques for supply chain demand forecasting. Eur J Oper Res 184(3):1140–1154
Casavant TL, Kuhl JG (1988) A taxonomy of scheduling in general-purpose distributed computing systems. IEEE Trans Software Eng 14(2):141–154
Chen M, Hao Y, Hwang K, Wang L, Wang L (2017) Disease prediction by machine learning over big data from healthcare communities. IEEE Access 5:8869–8879
Compton K, Hauck S (2002) Reconfigurable computing: a survey of systems and software. ACM Comput Survey 34(2):171–210
Eshratifar AE, Pedram M (2018) Energy and performance efficient computation offloading for deep neural networks in a mobile cloud computing environment. In: Proceedings of the 2018 on Great Lakes Symposium on VLSI. ACM, pp 111–116
Eshratifar AE, Esmaili A, Pedram M (2019) BottleNet: a deep learning architecture for intelligent mobile cloud computing services. arXiv preprint arXiv:1902.01000
Fang X, Member S, Misra S, Xue G, Yang D (2011) Smart grid – the new and improved power grid, pp 1–37
Flynn MJ (1966) Very high-speed computing systems. Proc IEEE 54(12):1901–1909
Gill SS, Chana I, Singh M, Buyya R (2019) RADAR: self‐configuring and self‐healing in resource management for enhancing quality of cloud services. Concurr Comput Pract Exp 31(1):e4834
Gill SS, Garraghan P, Buyya R (2019) ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices. J Syst Soft
Gill SS, Garraghan P, Stankovski V, Casale G, Thulasiram RK, Ghosh SK, Ramamohanarao K, Buyya R (2019) Holistic resource management for sustainable and reliable cloud computing: an innovative solution to global challenge. J Syst Software
Glikson A, Nastic S, Dustdar S (2017) Deviceless edge computing: extending serverless computing to the edge of the network. In: Proceedings of the 10th ACM international systems and storage conference. ACM, p 28
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things ( IoT ): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660
Han KH, Kim JH (2002) Quantum-inspired evolutionary algorithm for a class of combinatorial optimization. IEEE Trans Evol Comput 6(6):580–593
Iorga M, Feldman L, Barton R, Martin MJ, Goren N, Mahmoudi C (2018) Fog computing conceptual model: recommendations of the national institute of standards and technology. NIST Spec Publ, pp 500–325
Jia L, Zhao Q, Tong L (2013) Retail pricing for stochastic demand with unknown parameters: an online machine learning approach. In: 2013 51st Annual Allerton conference on communication, control, and computing (Allerton). IEEE, pp 1353–1358
Jordan MI, Mitchell TM (2015) Machine learning: trends, perspectives, and prospects. Science 349(6245):255–260, 29
Kosba A, Miller A, Shi E, Wen Z (2016) Papamanthou C. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. Security and Privacy (SP). In: 2016 IEEE Symposium on, San Jose, CA, USA, IEEE, pp 839–858
Leuenberger MN, Loss D (2001) Quantum computing in molecular magnets. Nature 410(6830):789
Li X, Jiang P, Chen T, Luo X, Wen Q (2017) A survey on the security of blockchain systems. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2017.08.020
Lin J, Yu W, Yang X (2016) Towards multistep electricity prices in smart grid electricity markets. IEEE Trans Parallel Distrib Syst 27(1):286–302
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142
Lloyd S, Mohseni M, Rebentrost P (2013) Quantum algorithms for supervised and unsupervised machine learning. arXiv preprint arXiv:1307.0411
Madsen H, Albeanu G, Burtschy B, Popentiu-Vladicescu F (2013) Reliability in the utility computing era: Towards reliable fog computing. Int Conf Syst Signals, Image Process, pp 43–46
Michie D, Spiegelhalter DJ, Taylor CC (1994) Machine learning. Neural Stat Class 13
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system
Nguyen KK, Hoang DT, Niyato D, Wang P, Nguyen D, Dutkiewicz E (2018) Cyberattack detection in mobile cloud computing: A deep learning approach. In: 2018 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1–6
Osia SA, Shamsabadi AS, Taheri A, Katevas K, Sajadmanesh S, Rabiee HR, Lane ND, Haddadi H (2017) A hybrid deep learning architecture for privacy-preserving mobile analytics. arXiv preprint arXiv:1703.02952
Rahmani AM et al (2018) Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: a fog computing approach. Futur Gener Comput Syst 78:641–658
Reyna A, et al. (2018) On blockchain and its integration with IoT. Challenges and opportunities. Futur Gener Comput Syst 88:173–190
Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. In: INC, IMS and IDC, 2009. NCM'09. Fifth International Joint Conference on IEEE, pp 44–51
Samaniego M, Deters R (2016) Blockchain as a Service for IoT. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE
Schuld M, Sinayskiy I, Petruccione F (2015) An introduction to quantum machine learning. Contemp Phys 56(2):172–185
Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Sel Areas Commun 35(11):2586–2595
Singh S, Chana I, Buyya R (2017) STAR: SLA-aware autonomic management of cloud resources. IEEE Trans Cloud Comput
Singh S, Chana I (2015) Q-aware: quality of service based cloud resource provisioning. Comput Electr Eng 47:138–160
Singh S, Chana I (2016a) QoS-aware autonomic resource management in cloud computing: a systematic review. ACM Comput Survey 48(3):42
Singh S, Chana I (2016b) A survey on resource scheduling in cloud computing: Issues and challenges. J Grid Comput 14(2):217–264
Singh I, Singh S (2016) Model for targeting customers based on analytics in telecom domain. Int J Modern Educ Comput Sci 8(11):43
Singh I, Singh S (2017) Framework for targeting high value customers and potential churn customers in telecom using Big Data Analytics. Int J Educ Manag Eng 7(1):36–45
Singh S, Chana I, Singh M (2017a) The journey of QoS-aware autonomic cloud computing. IT Professional 19(2):42–49
Singh S, Chana I (2013) Consistency verification and quality assurance (CVQA) traceability framework for SaaS. In: 2013 3rd IEEE international advance computing conference (IACC). IEEE, pp 1–6
Singh I, Singh KV, Singh S (2017) Big data analytics based recommender system for value added services (VAS). In: Proceedings of sixth international conference on soft computing for problem solving. Springer, Singapore, pp 142–150
Stanciu A (2017) Blockchain based distributed control system for edge computing. In: 2017 21st international conference on control systems and computer science (CSCS). IEEE
Steane A (1998) Quantum computing. Rep Prog Phys 61(2):117
Teerapittayanon S, McDanel B, Kung HT (2017) Distributed deep neural networks over the cloud, the edge and end devices. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 328–339
The evolution of Distributed Systems. Available Online: https://medium.com/microservices-learning/the-evolution-of-distributedsystems-fec4d35beffd
Tordera EM, et al. (2016) What is a fog node a tutorial on current concepts towards a common definition
Tuli, Shreshth, Redowan Mahmud, Shikhar Tuli, and Rajkumar Buyya. “FogBus: A blockchain-based lightweight framework for edge and fog computing.“ Journal of Systems and Software (2019). Volume 154, August 2019, Pages 22–36
Wang Y, Uehara T, Sasaki R (2015) Fog computing: Issues and challenges in security and forensics. In: 2015 IEEE 39th annual computer software and applications conference, Vol 3. IEEE
Yu J, Buyya R (2005) A taxonomy of workflow management systems for grid computing. J Grid Comput 3(3–4):171–2005
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Aseri, V., Chowdhary, H., Chaudhary, N.K., Pandey, S.K., Kumar, V. (2024). Revolutionizing Military Technology: How the Fusion of BlockChain and Quantum Computing is Driving in Defense Application. In: Kumar, A., Ahuja, N.J., Kaushik, K., Tomar, D.S., Khan, S.B. (eds) Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Contributions to Environmental Sciences & Innovative Business Technology. Springer, Singapore. https://doi.org/10.1007/978-981-97-0088-2_10
Download citation
DOI: https://doi.org/10.1007/978-981-97-0088-2_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0087-5
Online ISBN: 978-981-97-0088-2
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)