Cyber Protection Applications of Quantum Computing: A Review

Authors

DOI:

https://doi.org/10.34190/eccws.23.1.2182

Keywords:

Cyber Security, Quantum Computing Applications, Cyber Protection, Quantum Algorithms

Abstract

Quantum computing is a cutting-edge field of information technology that harnesses the principles of quantum mechanics to perform computations. It has major implications for the cyber security industry. Existing cyber protection applications are working well, but there are still challenges and vulnerabilities in computer networks. Sometimes data and privacy are also compromised. These complications lead to research questions asking what kind of cyber protection applications of quantum computing are there and what potential methods or techniques can be used for cyber protection? These questions will reveal how much power quantum computing has and to what extent it can outperform the conventional computing systems. This scoping review was conducted by considering 815 papers. It showed the possibilities that can be achieved if quantum technologies are implemented in cyber environments. This scoping review discusses various domains such as algorithms and applications, bioinformatics, cloud and edge computing, the organization of complex systems, application areas focused on security and threats, and the broader quantum computing ecosystem. In each of these areas, there is significant scope for quantum computing to be implemented and to revolutionize the working environment. Numerous quantum computing applications for cyber protection and a number of techniques to protect our data and privacy were identified. The results are not limited to network security but also include data security. This paper also discusses societal aspects, e.g., the applications of quantum computing in the social sciences. This scoping review discusses how to enhance the efficiency and security of quantum computing in various cyber security domains. Additionally, it encourages the reader to think about what kind of techniques and methods can be deployed to secure the cyber world.

Author Biographies

Ummar Ahmed, Jamk University of Applied Sciences, Jyväskylä, Finland

Ummar Ahmed studies Information and Communication Technology at Jamk University of Applied Sciences, and intends to continue specializing in Software Engineering. Before these studies, he worked as an iOS software developer at ReadySols. He also has served as a senior subject teacher of computer science for the Government of Punjab, Pakistan.

Tuomo Sipola, Jamk University of Applied Sciences, Jyväskylä, Finland

Tuomo Sipola works as a senior researcher at the Institute of Information Technology at Jamk University of Applied Sciences, Jyväskylä, Finland. He completed his PhD in mathematical information technology (University of Jyväskylä) in 2013. He has also worked as a CEO. His interests include machine learning, data analytics and cybersecurity.

Jari Hautamäki, Jamk University of Applied Sciences, Jyväskylä, Finland

Jari Hautamäki, PhL works as a Principal Lecturer of ICT Programmes in Jamk University of Applied Sciences, Jyväskylä, Finland. He has more than 30 years experience of University education and its management. His research interests include Data Networks, IT Service Management, Security Information Sharing and Information Security Management.

Downloads

Published

2024-06-21