A Security Approach for Data Migration in Cloud Computing Based on Human Genetics

被引:1
|
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Brahmi, Imen [1 ]
Ben Yahia, Sadok [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
来源
INFORMATION SYSTEMS, EMCIS 2017 | 2017年 / 299卷
关键词
Cloud computing; Cost effective; Security; Confidentiality; Integrity; Cryptographic; Human genetics; Protein biosynthesis;
D O I
10.1007/978-3-319-65930-5_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing technology is flexible, cost effective and reliable for the provision of IT services to businesses and individuals through means of internet. Clearly beneficial in terms of costs, this technology has gained immediate popularity. However, security concerns have slowed its expansion. It is possible that the full adoption of cloud computing is not appropriate in some cases, for security reasons related to confidentiality and data integrity. Cryptographic methods that could reduce these risks to acceptable levels, however, were developed. In this article, we introduce a method implementing encryption based on human genetics, more particularly on protein biosynthesis. The attractive coupling between the encryption of content and biosynthesis protects data against unauthorized access. The experiments show that our proposal provides a good balance between the integrity and confidentiality of data.
引用
收藏
页码:384 / 396
页数:13
相关论文
共 50 条
  • [21] Cloud Computing Security, Data, And Performance Issues
    Sinha, Neelu
    Khreisat, Laila
    2014 23RD WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2014,
  • [22] A Comparative Study of Trends in Security in Cloud Computing
    Khan, Abdul Muttalib
    Ahmad, Shish
    Haroon, Mohd.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 586 - 590
  • [23] Data Classification for achieving Security in cloud computing
    Shaikh, Rizwana
    Sasikumar, M.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 493 - 498
  • [24] Security of Big Data Based on the Technology of Cloud Computing
    Zhou, Xiaojun
    Lin, Ping
    Li, Zhiyong
    Wang, Yunpeng
    Tan, Wei
    Huang, Meng
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 703 - 706
  • [25] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [26] Security Techniques for Data Protection in Cloud Computing
    Jakimoski, Kire
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (01): : 49 - 56
  • [27] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [28] Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review
    Sahmim, Syrine
    Gharsellaoui, Hamza
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 1516 - 1522
  • [29] Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
    Abolghasemi, Meer Soheil
    Sefidab, Mandi Mokarrami
    Atani, Reza Ebrahimi
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 261 - 265
  • [30] Enhancing Data Security of Cloud Based LMS
    Paramita Chatterjee
    Rajesh Bose
    Subhasish Banerjee
    Sandip Roy
    Wireless Personal Communications, 2023, 130 : 1123 - 1139