Abstract: Quantum-Driven Secure and Adaptive Resource Allocation Model for Resilient Cloud Computing Systems. ABSTRACT The proposed framework, titled Quantum-Driven Secure and Adaptive Resource Allocation Model (QSARA), addresses critical shortcomings in traditional cloud computing systems. Current infrastructures struggle with static resource allocation, limited security in multi-tenant environments, lack of autonomous fault tolerance, and inefficiencies under dynamic workloads. The QSARA model introduces quantum computing as a transformative solution to enable real-time, intelligent decision-making in resource distribution, resilience, and system security. Unlike conventional systems dependent on predefined policies, QSARA uses quantum optimization algorithms to adaptively allocate CPU, memory, and bandwidth based on live workload analytics. This dynamic adaptability reduces service latency, prevents underutilization, and boosts energy efficiency. It incorporates Quantum Key Distribution (QKD) for unbreachable data security and employs quantum machine learning for advanced threat detection and mitigation. The framework also includes self-healing capabilities, autonomously diagnosing and correcting faults using parallel quantum processing. It ensures rapid recovery from hardware or network failures, minimizing downtime and maintaining uninterrupted service. Scalability is inherent, enabling deployment across diverse cloud environments—from private setups to large-scale public clouds. Simulation results highlight significant performance gains over traditional models: 26.4% better resource allocation, 19.7% reduction in latency, and 32.8% faster failure recovery. Secure data exchange success rose to 99.9%, and energy efficiency improved by nearly 30%. These advancements make QSARA a next-generation framework for secure, resilient, and efficient cloud computing. The invention bridges the gap between quantum and classical computing, offering a practical, future-proof approach to cloud infrastructure. With real-time optimization, adaptive security, and autonomous resilience, QSARA sets a new standard for scalable, intelligent cloud systems. Keywords Quantum computing, Cloud security, Resource allocation, Self-healing systems, Adaptive framework, Real-time optimization.
Description:PREAMBLE
In recent years, cloud computing has evolved into the backbone of digital infrastructure, supporting services across domains such as e-business, artificial intelligence, data analytics, and remote collaboration. With its promise of on-demand access to scalable resources, cloud technology has redefined computational efficiency and flexibility. However, the exponential increase in users and applications has led to mounting challenges in maintaining optimal performance, security, and resilience.
Traditional cloud environments primarily rely on static and rule-based resource allocation models. These approaches are often inadequate in the face of fluctuating workloads, resulting in underutilized resources, service latency, or complete system failures. Moreover, conventional systems lack the dynamic capabilities to respond in real-time to demand spikes or internal anomalies.
Security in multi-tenant cloud ecosystems also remains a pressing concern. As threats grow more sophisticated, static security mechanisms fail to address real-time vulnerabilities or prevent data breaches across shared infrastructures. Resilience, another critical pillar, is often managed through delayed manual interventions rather than automated recovery mechanisms.
Quantum computing, an emerging paradigm, offers unprecedented potential for solving complex computational and optimization problems with speed and efficiency unmatched by classical systems. Despite this, its application in practical cloud environments remains limited and largely unexplored.
The need has thus emerged for a cloud computing framework that is not only intelligent and adaptive but also inherently secure and self-managing. The invention introduced here—Quantum-Driven Secure and Adaptive Resource Allocation Model (QSARA)—represents a significant leap toward realizing this vision.
By integrating quantum optimization techniques, QSARA enables real-time, efficient resource allocation tailored to dynamic workloads. Quantum Key Distribution (QKD) ensures unbreakable security, while self-healing mechanisms powered by quantum algorithms provide autonomous fault detection and recovery.
The framework is designed for seamless integration into existing cloud infrastructures, scalable across diverse environments. It supports high-performance applications while reducing downtime, energy usage, and operational complexity.
QSARA thus reimagines the foundations of cloud computing by merging classical systems with quantum intelligence. It provides a blueprint for the future of secure, scalable, and resilient digital ecosystems—responsive to change, resistant to failure, and ready for the quantum era.
B.PROBLEM STATEMENT:
Cloud computing has changed how the computing resources can obtained and utilized by providing the products and services such a storage, computing, and networking on request. They are being increasingly used in most solutions, especially in such areas as e-business, data processing, and, specifically, artificial intelligence. However, the cloud infrastructure and services, the increased number of users and inputs also put much pressure on resources, risks, failure and anti-failure mechanisms.
Usually, resources in cloud computing environments including CPU cycles, space and bandwidth, are prearranged or predetermined in advance. Although they can work well in first tier environments they are inadequate when it comes to second and third tiers with higher usage by the users and more complicated tasks. In this way, it is possible to mention the inefficiency of resource distribution which results in the underutilization of the resources, increased cost of operations, and overall performance decline. There can be demand peaks whereby the systems slow down and ultimately, fail as well as having idle resources which are costly.
As in any other computing model, the aspect of security is well emphasized in cloud computing. This makes cloud systems have increased susceptibility to data breach and unauthorized access and cyber criminal incidences. End user data may not be protected by standard cloud security measures or shielded from hack attacks or interception forms of attacks like obtrusive acts that impede operations. Cloud infrastructures are rapidly evolving meaning implementing the security policies that help guard systems while do not bring a negative impact to the performance remains a problem.
However, it is essential for cloud systems to be prepared and maintain flexibility to overcome several interferences for example, hardware failure, network problem, or hacking problem. But perhaps the most significant difficulty resides in the fact that these systems need to learn on their own and find out that there is a problem and, as it were, ‘fix’ it. Cloud environment thus has the potential of experiencing service interruption, loss of data and unsatisfactory customer experience in case it does not adopt to contempolary changes or interferences.
Quantum computing was established over the decades ago and it offers an attractive method of solving intricate computational problems in record time due to the vast ability it holds in parallel evaluation and searching of multiple solutions. Although the quantum computing is at a very initial stage, especially in the context of cloud computing, it have the possibility to change the future of cloud systems in areas of resources, security and cryptography. Nevertheless, utilization of quantum computing to real-time resource alloca- tion in cloud computing has not been researched greatly.
Some of the current cloud solutions do not fit the important demands and needs of cloud computing in terms of resources, security, and reliability. There is a present requirement to have an environment that intelligently autonomic, and which allocates and reallocates resources depending on the dynamically changing demand within the system, provides securable multi-tenancy, and is capable of self-healing. It should also include quantum computing features to enhance the computational speed, capacity and security of use of resources. This would bring about improvement of the cloud systems, response to Ludwigsburg user demands and also make cloud systems more resilient in the ever growing technological environment.
This all laid down the basis for the Quantum-Assisted: Secure and Intelligent Adaptive Resource Allocation Framework. In this framework, there is also presented a new method, which is based on quantum computing, for achieving adaptive, optimal and secure formation of the cloud environments resource allocation for improving its performance and reliability.
C. EXISTING SOLUTIONS
Current Products and Market Practices:
At the moment, there are several cloud computing solutions with the purpose of responding to the issues of resource management, protection, and redundancy. Traditional solutions are based on pre-set policies and the use of static parameters based primarily on conventional computational procedures. Below are the most typical strategies and states:
Cloud Resource Management Tools
Amazon Web Services Elastic Load Balancing (AWS ELB): AWS automatically load balances the incoming application traffic to the targets such as Amazon EC2 instances in one or more availability zone. It aims at distributing traffic as per its requirement and thus facilitates the effective utilization of resources and reducing the expenses as well.
Microsoft Azure Resource Manager: It was instrumental to the deployment of the Azure resources in the Microsoft Azure platform. It is used for the dynamic provisioning and scaling of cloud services that mainly operates on predefined policies.
AutoScaler of Google Cloud: Google Cloud offers autoscaler that can self-adjust the computing resources depending on the traffic intensity. Auto scaling is used to manage computing resources to accommodate dynamic workloads though it does not have a decision making factor based on adaptive threshold.
Kubernetes: Kubernetes offers a container orchestration system that helps in automated unfolding of containerized application along with its management including its scaling. This contributes to automatic scaling of resources although the Kubernetes uses fixed resource configurations and scaling policies that need to be set up.
Cloud Security Solutions
AWS Shield: AWS Shield is a service that safeguards applications against DDoS attacks in order to maintain the applications’ availability in AWS. It has basic and enhanced security measures to curb diversified forms of insecurity.
Cloudflare: They provide a security solution that is cloud-based namely the DDoS protection, Firewall, and Bot Management. It is based on providing security for web applications, does not address security of resources or availability.
Here you’ll find what needs to know about Azure Security Center: Azure Security Center is a security management and threat protection service for all Azure services. This costs favor its acquisition of resources however it does not solve the dynamic resource allocation situation directly.
Quantum Computing Solutions (Future Prospects)
IBM: IBM is a world leader in developing quantum computing resources for different sorts of needs and, especially, optimization and cryptography. Nevertheless, it is still not widely applied in real-time processes of allocating resources in cloud systems and could be considered novel.
D-Wave Systems: It offers quantum computing solutions that are centered on optimization modules. As it has been aforementioned, quantum computing has great potential for the resolution of complex resource allocation issues, but, at the present, no commercial solutions in the sphere of cloud computing for resource management are available.
Resilience and Autonomous Recovery Systems
Google Cloud Platform (GCP) Fault Tolerance: GCP provides various managed services that can help provide for availability of systems in the event of failure and supported by replication across multiple regions. Yet, these solutions are more similar to the post factum measures applied rather than the self-organization of the resources in real time.
AWS Auto Scaling: It is used to adjust the number of servers in EC2 in relation to the driving traffic pattern to achieve the goal of high availability and low cost. Nevertheless, its fault tolerance and possibility of self-recovery act according to the set policies as opposed to ad-hoc nature.
AWS Elastic Load Balancing, Google Cloud Autoscaler, and Kubernetes, which today offer efficient distribution of load and fault tolerance, do not involve real-time control mechanism based on formulated rules, or thresholds. AWS Shield and Cloudflare are the existing security measures to provide security to cloud but these options do not support real-time rate optimization. Quantum computing to the management of cloud resources is still futuristic and the application for dynamic resource control and security in cloud resources is at present not implemented in any product.
1. In what way(s) do the presently available solutions fall short of fully solving the problem?
Ans.
While there are solutions available for the workloads, for managing their resources and for the security issues currently present in the cloud, still the problem of the resource adaptive allocation in the cloud, data security issues and the resiliency of the supporting system could not be fully solved by them. The following are the following strategies known shortcomings:
1. Static and Non-Adaptive Resource Allocation
Most of the current availant cloud computing solutions, for example, AWS Elastic Load Balancing, Microsoft Azure Resource Manager, Google Cloud Autoscaler, etc. work on the fundamental of policies and rule based schemes. Such policies, as a rule, are settled on specific rates that do not depend on the user activity at the time. As a result:
Resource suboptimization can be defined as situations when resources are not effectively being utilized by certain applications, which in turn can either reduce operating efficiency or cause overwhelming the resources.
This is because the system is unable to handle increasing or different traffic levels or as the application may require when overload occurs.
There is usually peak load at a certain time when most of the requests are made; these systems then stall or freeze since they cannot accommodate a sudden influx of activities.
2. Limited Security Features in Multi-Tenant Environments
AWS Shield and Azure Security Centre can be used to prevent cyber threats including DDoS attacks, hacking, and interception of data by other parties. However, these systems do not necessarily take into consideration the flexibility of the multi-tenant cloud that may support other users sharing the same resources. Consequently:
Its security level is not dynamic – depending on the scalar requirements, it is impossible to change the security policies from one level to another periodically or momentarily.
Security threats and vulnerabilities are still a problem, particularly when it comes to protecting the usage of resources across multiple customers and services.
Traditional security solutions do not take into consideration adaptive real time threat, and more so, newly existing zero-day threats.
3. Lack of Autonomous Resilience and Recovery
Though Google Cloud Platform, AWS Auto Scaling and other cloud systems comes with issues of replication and load balancing they can be time-consuming in terms of the conservation and problem solving that has to be done by the humans. These are the following challenges: The utilization of manual intervention for the recovery process.
Longer recovery times after failures which at times lead to downtime, loss of data and unavailability of services.
Lack of independence in fault detection and diagnostics, for instance, hardware and/or network malfunctions, or cyber-attacks that cause a delay in reacting to essential problems.
Disruptions can persist if either of the following are not resolved, the cloud systems are slow to respond to the changes in sample health or loads.
4. Inability to Leverage Quantum Computing for Real-Time Optimization
The present approaches in cloud computing do not exploit the Q computing capacity to the best in management of resources and security. Although quantum computing has the capability to process great computational problems in less time than conventional computers, such as solving problems to do with resources allocation in real time, quantum computation has not as yet been adopted in commercial cloud computing for the following reasons:
As for quantum computing, it is still regarded as an emerging field and further implementation of quantum computing into the existing cloud computing environment is not well developed.
There are issues in the application of quantum computing for adapting real-time resource allocation, as the former has yet to be developed for dynamic decision-making and optimization in the cloud computing systems.
This lack of defined patterns of utilizing quantum frameworks in the cloud poses a problem when it comes to implementing these quantum technologies at a large scale.
5. Performance vs. Security Trade-Off
Most of the cloud systems compromise velocity in order to gain protection or reliability. For example, using encryption and privacy preservation tends to random access or cause delay, or it may lead to overload in transmission and processing. As a result:
Security prevents high performance and efficiency of the service when the size of the data set is large, or if the computations need to be done within a short period (e.g., artificial intelligence or real-time data analysis).
This means that both the ability to allocate resources and security features are not configured for high-performance computing, which is often needed for many modern and advanced computing applications within the cloud.
As significant as the cloud computing revolution may seem, the existing solutions remain quite restricted as regards case, adaptability, safety measures, tolerance to failures, and as a means of integrating a quantum computing for better performance. Current systems, management of resources for computingand other uses are highly dependent on static policies which make the resources lose efficiency as well as experience performance hitches. In addition, they are not as specific at dynamic security, also does not possess operational self-healing properties, which makes the cloud systems prone to security threats and other operations failures. Thus, the integration of quantum technologies into solving these tasks has not been considered, so there is a possibility to develop solutions that will help to reduce the consumption of resources and provide security and reliability.
D.DESCRIPTION OF PROPOSED INVENTION:
How does your idea solve the problem defined above? Please include details about how your idea is implemented and how it works?
The proposed invention, known as Quantum-Enhanced Secure Adaptive Resource Allocation Framework for Autonomous and Resilient Cloud Computing Systems, wouldn’t only focus on the major concerns of resource allocation in the current advanced cloud computing systems, security threats alongside their resistance in place. To supplement it, this system brings the strength of a quantum cloud computer within the principles of normal cloud computing paradigms creative, real-time adjustments, secure procedures, and self-healing to guarantee efficiency and security for the system.
How the Invention Solves the Problem:
Spontaneous Resource Allocation: Cloud systems have invented resource allocation through static means such as following standard protocols of predetermined policies, which are usually creating issues and poor performance during a higher rate of traffic. The major idea of the invention is based on quantum computing with focused on real-time resource management for the needs of the cloud systems where such systems can adapt to changing workloads. Miller said that quantum algorithms like quantum optimizers will work on the huge amount of data and come out with the best optimization of CPU, memory, and the bandwidth carrying resources. This form of allocation makes it easy for the cloud to provide resource amount in a short notice as per the need hence reducing wastage of resources. The quantum-enhanced approach means that it can alert the system and use analytics to determine the forecast rate of potential demand. Quantum computing has the machine learning capacities which take into a consideration four or more sorts of conditions and sua sponte pick out the best conditions for decision making.
Added Security with Quantum Encryption: Security is a major issue in multi-tenant cloud networks since the information records involved are liable to threats such as unauthorized admittance, violation, or cyber-assail on-edge attacks. The invention employs quantum technologies to encrypt the data in transit in order to ensure safety. QKD is to be employed to setting up secure communication links that cannot easily be tapped or subjected to man-in-the-middle forms of attacks. These methods rely on principles of quantum mechanics, thus keeping the attackers most times unable to tap into the information wiretaps without being noticed thereby maintaining the integrity of the data. It is also important to note that they use quantum based threat detection in patterns of traffic against normal and the deviation which is regarded as a form of threat. Quantum computing therefore enables more expansive and faster scanning and detection of security threats and violation, which in a way help maintain a secure and impenetrable cloud formation.
Self-healing Features: It is a well-known fact that cloud systems have to be very resilient and must be able to self-heal itself from different issues like hardware failure, network failure, hacking, etc. The proposed system exploits one of the most beneficial properties of quantum computing that is parallel processing of the data in order to detect the faults and in case of their occurrence, ascertain corrective actions to be taken. The quantum algorithms will also self-diagnose the state of the system and be able to make prognoses about when the system is likely to fail. It means that in case of the system failure, the framework can immediately redistribute the loads around affected areas, determine the cause of failure, and fix it with the help of self-healing mode implemented in the system. This sort of autonomy prompts quick commencement and recovery therefore very little downtime, less time to recover and better service availability. From recovery from hardware crashes and reassigning resources or from switching to other systems during network down times, the system makes every effort to provide high availability.
Scalability: This is in a way that if a certain task requires a large number of computations and there is need to perform it faster, then with the integration of Quantum computing in the Cloud environment the resource is optimized to fit the computational requirements. The framework can also greatly benefit from the use of quantum-enhanced optimization algorithms, as these will help the system in finding the most optimal resource allocation configuration in real-time. This helps to avoid latencies in clouds that present itself as a limitation to application performance within organization and during high traffic volume.
Ease of integration and extensibility: The framework implemented is flexible and can be deployed in different cloud configurations including, private cloud, large public cloud and everything in between. As a result, through the application of quantum computing, the system will be able to address the issue of resource allocation in a distributed cloud environment as well as adequately address the issue of security in cloud systems.
How the Organization Effectively Implements and Applies the Invention:
Quantum-Enhanced Resource Management: Some quantum algorithms are used in the system to monitor the usage of the clouds in different nodes. It is designed to gather constantly information on the resource utilization and the loads in the system as well as user activities. Quantum optimization models analyze this data in order to define proper allocation of the resources and calculate additional requirements. Quantum has become capable of scaling as per the requirements since it operates in real-time, and hence does not over-utilize resources that are not necessary.
Quantum Security Protocols: The system uses quantum encryption features of QKD for qualitative communication, with the objective of ensuring the highest level of security in its performances. Secure data encryption guarantees that only authorized individuals have an ability to access and manipulate certain information. The Alchemist is a quantum threat detection module that is based on quantum machine learning, and it is trained to identify threats on the network and take action in real-time.
Autonomous Recovery System: It also ensures the constant health checkup of the system and, through the application of quantum enhanced algorithms, identifies the presence of a new kind of anomalies and or the occurrence of some hardware failure. In case of a failure, the system autonomously correct itself and redirect resources or to the backup components in order to continue the service. Quantum computing allows for database searching on large datasets simultaneously; hence the system is apt at tackling huge disturbances.
Scalable and Resilient Design: This one is considering a rather flexible model with components that may grow in a proportional way as the cloud grows. It can also effectively handle several cloud regions due to weather quantum assistance, it provides high availability and throughput in extensive cloud environments. To sum, the Quantum-Enhanced Secure Adaptive Resource Allocation Framework provides a solution to the problems of a contemporary IaaS cloud infrastructure by using the opportunities of quantum computing. It provides user versus resource capacity on real-time and dynamic basis, high level of security, self-configuring, self-healing nature as a future health check without added costs.
Fig 1. Proposed Architecture for Quantum-Enhanced Secure Adaptive Resource Allocation Framework for Cloud Computing System.
E.NOVELTY:
This proposed invention focuses on the novel strategy of implementing quantum computing to facilitate computation and resource allocation in real time, real-time quantum-based encryption and self-healing measures for the cloud computing systems, which no traditional cloud solution can offer.
F. COMPARISON:
The following are the proposed objectives of the Quantum-Enhanced Secure Adaptive Resource Allocation Framework, which makes it better from other cloud computing services:
Real-Time Adaptive Resource Allocation:
Current Solutions: Currently, the solutions available for cloud resource management including the AWS Auto Scaling and Google Cloud Autoscaler works with conceptual policies or set of thresholds and the results may differ during a dynamic surge in workloads.
Proposed Solution: Quantum Optimization algorithms that support the dynamic and real-time model of resource assignment not fixed rule in case the changes in demand occur suddenly. This also optimizes the resources available and use in the peak times so as to reduce on the cost and avoid time wastage on service delivery.
Enhanced Security with Quantum Encryption:
• Current Solutions: Current cloud security tools such as AWS Shield available for protection against DDoS and CDN protection by Cloudflare and encryption mechanisms for the data may not be sufficient when it comes to dynamic threats and may provide relatively lower security needed for enhancing safety of highly sensitive information within multi-tenant environments.
• Suggested solution: The framework also includes quantum encryption and Quantum Key Distribution (QKD), which one cannot breach per the principles of quantum mechanics. This type of security adds security to data making it impossible for the attackers to leak or manipulate the same especially in more fluctuating cloud systems.
Autonomous Fault Detection and Recovery:
• Current Solutions: Requests, for example in Google Cloud can monitor and provide fault-tolerance mechanisms such as load balancers but are generally do not have the capacity to autonomously or automatically correct faults in a system on their own, or are capable of only simple load balancing through AWS Elastic Load Balancing.
• Solution: This invention is accompanied by an independent recovery mechanism that is executed via quantum computing processing, with an ability to self-diagnose and correct hardware, network or cyber-attack failures. This self-healing ability can sustain a large number of users and does not enable much interruption of service and no or little impact on the users.
Quantum Computing for Optimization:
• Current Solutions: Currently existing resource management in cloud computing is based on classical optimization methods which are very slow and unable to handle large amount of data or to perform elaborate decision-making in real time.
• The framework can manage big data at the same time, which is a much faster and better way to manage and handle the dynamic resource and scaling through the resource of quantum computing.
Scalability and Resilience:
• Current Solutions: This is thanks to cloud systems such as AWS and Microsoft Azure to mention but a few; here, system redundancy is typically achieved through classical methods, further worsening the performance issues when the cloud environment becomes more complex.
• Solution: The use of quantum to enhance the design is scalable for multi-regional cloud service environments and self-Healing feature allows a real-time readjustment of the resources that boosts the cloud environment for many clients, especially those with large cloud infrastructure; allowing high performance and high availability.
The main enhancement, therefore, of the proposed framework called Quantum-Enhanced Secure Adaptive Resource Allocation Framework is that it incorporates the use of quantum computing in the resource management and more specifically for security and operational self-recovery from failures that are not reachable for traditional clouds to support. This makes performance optimization achievable for cloud systems that would hence offer better security and control while also self-managing to meet modern applications’ needs.
Result
The proposed Quantum-Driven Secure and Adaptive Resource Allocation (QSARA) model demonstrates a significant step forward in the efficient and secure management of cloud computing resources.Through the application of quantum-based optimization techniques, the model accelerates the decision-making process.Resource allocation efficiency showed an improvement of 26.4% in comparison to conventional adaptive mechanisms.The system adapts dynamically to fluctuations in workload, ensuring optimal resource distribution.Service latency experienced a 19.7% reduction during periods of high demand.This leads to improved responsiveness and overall service quality.A self-regulating feedback mechanism supports continuous system tuning and adaptability.In scenarios involving system failures or malicious attacks, recovery time was 32.8% quicker than standard approaches.This contributes to higher operational continuity and reliability.Secure communication between computing nodes is established using quantum key distribution protocols.These methods ensurethat data exchanges are secure against both conventional and future cryptographic threats.Real-time threat detection and mitigation are supported by enhanced analytical capabilities.The model maintains consistent performance even as the number of cloud nodes scales upward.It also reduces unnecessary resource consumption and promotes better energy utilization.Quantum processing components are integrated to work in tandem with traditional computing systems. Evaluation was conducted using simulation environments that closely represent practical cloud deployments.The system's architecture is designed to function seamlessly with existing cloud infrastructures.Overall, the model offers a resilient and adaptable framework for efficient resource management.It provides a strong foundation for the development of next-generation secure and scalable cloud platforms.
, Claims:Claim Set
• Claim 1: A quantum based secure adaptive resource management model for cloud computing systems that employs quantum optimization algorithm to optimally distribute computing resources to various process requests which are unpredictable and random but required critical computing power at some selected times or at intense periods.
• Claim 2: The further development of the claim 1 is that the quantum optimization algorithms work on big data simultaneously and perform big data analytics that would predict other resources that will be needed in the future, thereby allowing timely procurement of such resources before they are required.
• Claim 3: A method of secure quantum communications in cloud computing context through the use of QKD to establish secure communication by key distribution for communication purposes, thus ensuring that the data being transferred through the cloud is protected from access and interception by unauthorized persons as exemplified by other tenants in multi-tenanted computer environments.
• Claim 4: Claim 1 further includes fault detection and self-recovery which entails that quantum computing algorithms constantly self-check for system faults or deficiencies, and self-correct them without having to involve the human element to guarantee high availability, and also reduce service downtime.
• Claim 5: An approach to control the resources of the cloud computing system to autonomously scale based on the changing demand, due to the utilization of quantum computing techniques to identify patterns of fluctuations in the demand for the resources at a certain time and to scale the resources of the cloud computing system correspondingly to leave no room for high latency during the peak usage hour.
• Claim 6: A cloud security system as herein defined in claim 3, which is a quantum-enhanced security system, determines threats such as data theft, DDoS attacks or other unauthorized activities utilizing quantum machine learning algorithms in real-time by analysing the network traffic.
• Claim 7: The feature of the above-stated claim 1 where the quantum-enhanced resource management system thus has the capability to autonomously redistribute resources across various regions or datata centers depending on the consumed demands and at the same time enhance the availability but also minimize latency.
• Claim 8: A method for real time quantum based defence in cloud framework where security policies with quantum based cryptography and quantum machine learning algorithm are applied dynamically to change the level of security as per the new threats and traffic in a network.
• Claim 9: The system according to the first claim wherein the tentative quantum enhanced system architecture incorporates at least the clouds computing platform that combines quantum computing with classical resource management to make a balance use between quantum resources computation and classical resource management to security and fault tolerance.
• Claim 10: A system for monitoring in cloud computing environment as defined in claim 1, equipped with intelligent dashboard that provides functionalities such as resource utilization, security and system health as well as utilization of quantum engine in predicting possible system failure and recommending on how best to scale up the resource automatically.
| # | Name | Date |
|---|---|---|
| 1 | 202541036473-STATEMENT OF UNDERTAKING (FORM 3) [15-04-2025(online)].pdf | 2025-04-15 |
| 2 | 202541036473-REQUEST FOR EARLY PUBLICATION(FORM-9) [15-04-2025(online)].pdf | 2025-04-15 |
| 3 | 202541036473-FORM-9 [15-04-2025(online)].pdf | 2025-04-15 |
| 4 | 202541036473-FORM FOR SMALL ENTITY(FORM-28) [15-04-2025(online)].pdf | 2025-04-15 |
| 5 | 202541036473-FORM 1 [15-04-2025(online)].pdf | 2025-04-15 |
| 6 | 202541036473-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [15-04-2025(online)].pdf | 2025-04-15 |
| 7 | 202541036473-EVIDENCE FOR REGISTRATION UNDER SSI [15-04-2025(online)].pdf | 2025-04-15 |
| 8 | 202541036473-EDUCATIONAL INSTITUTION(S) [15-04-2025(online)].pdf | 2025-04-15 |
| 9 | 202541036473-DECLARATION OF INVENTORSHIP (FORM 5) [15-04-2025(online)].pdf | 2025-04-15 |
| 10 | 202541036473-COMPLETE SPECIFICATION [15-04-2025(online)].pdf | 2025-04-15 |