A Security Approach for Data Migration in Cloud Computing Based on Human Genetics

被引:1
|
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Brahmi, Imen [1 ]
Ben Yahia, Sadok [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
来源
INFORMATION SYSTEMS, EMCIS 2017 | 2017年 / 299卷
关键词
Cloud computing; Cost effective; Security; Confidentiality; Integrity; Cryptographic; Human genetics; Protein biosynthesis;
D O I
10.1007/978-3-319-65930-5_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing technology is flexible, cost effective and reliable for the provision of IT services to businesses and individuals through means of internet. Clearly beneficial in terms of costs, this technology has gained immediate popularity. However, security concerns have slowed its expansion. It is possible that the full adoption of cloud computing is not appropriate in some cases, for security reasons related to confidentiality and data integrity. Cryptographic methods that could reduce these risks to acceptable levels, however, were developed. In this article, we introduce a method implementing encryption based on human genetics, more particularly on protein biosynthesis. The attractive coupling between the encryption of content and biosynthesis protects data against unauthorized access. The experiments show that our proposal provides a good balance between the integrity and confidentiality of data.
引用
收藏
页码:384 / 396
页数:13
相关论文
共 50 条
  • [1] Cloud Computing, Security and Data Concealment
    Delettre, Christian
    Boudaoud, Karima
    Riveill, Michel
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [2] A Short Review on Data Security and Privacy Issues in Cloud Computing
    Arjun, U.
    Vinay, S.
    2016 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC), 2016,
  • [3] Security Issues In Cloud Computing
    Tianfield, Huaglory
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1082 - 1089
  • [4] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [5] A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
    Can, Ozgu
    Thabit, Fursan
    Aljahdali, Asia Othman
    Al-Homdy, Sharaf
    Alkhzaimi, Hoda A.
    CYBERNETICS AND SYSTEMS, 2023,
  • [6] Modeling of Data Security in Cloud Computing
    Balogh, Zoltan
    Turcani, Milan
    2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 940 - 945
  • [7] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [8] Exploring Data Security Issues and Solutions in Cloud Computing
    Kumar, P. Ravi
    Raj, P. Herbert
    Jelciana, P.
    6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 691 - 697
  • [9] A Study in Data Security in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    Majid, Mazlina Binti Abdul
    Khan, Nusrat Ullah
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 367 - 371
  • [10] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611