A Security Approach for Data Migration in Cloud Computing Based on Human Genetics

被引:1
|
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Brahmi, Imen [1 ]
Ben Yahia, Sadok [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
来源
INFORMATION SYSTEMS, EMCIS 2017 | 2017年 / 299卷
关键词
Cloud computing; Cost effective; Security; Confidentiality; Integrity; Cryptographic; Human genetics; Protein biosynthesis;
D O I
10.1007/978-3-319-65930-5_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing technology is flexible, cost effective and reliable for the provision of IT services to businesses and individuals through means of internet. Clearly beneficial in terms of costs, this technology has gained immediate popularity. However, security concerns have slowed its expansion. It is possible that the full adoption of cloud computing is not appropriate in some cases, for security reasons related to confidentiality and data integrity. Cryptographic methods that could reduce these risks to acceptable levels, however, were developed. In this article, we introduce a method implementing encryption based on human genetics, more particularly on protein biosynthesis. The attractive coupling between the encryption of content and biosynthesis protects data against unauthorized access. The experiments show that our proposal provides a good balance between the integrity and confidentiality of data.
引用
收藏
页码:384 / 396
页数:13
相关论文
共 50 条
  • [31] Enhancing Data Security of Cloud Based LMS
    Chatterjee, Paramita
    Bose, Rajesh
    Banerjee, Subhasish
    Roy, Sandip
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 1123 - 1139
  • [32] An Overview on Data Security in Cloud Computing
    Kacha, Lynda
    Zitouni, Abdelhafid
    CYBERNETICS APPROACHES IN INTELLIGENT SYSTEMS: COMPUTATIONAL METHODS IN SYSTEMS AND SOFTWARE 2017, VOL. 1, 2018, 661 : 250 - 261
  • [33] Improving Database Security in Cloud Computing by Fragmentation of Data
    Alsirhani, Amjad
    Bodorik, Peter
    Sampalli, Srinivas
    2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 43 - 49
  • [34] Using data taxonomy to achieve security in cloud computing
    Ennajjar, Ibtissam
    Tabii, Youness
    Benkaddour, Abdelhamid
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2019, 60 (04) : 333 - 338
  • [35] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [36] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [37] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [38] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [39] The Security Issue of WSNs Based on Cloud Computing
    Xie, Yuanpeng
    Zhang, Jinsong
    Fu, Ge
    Wen, Hong
    Han, Qiyi
    Zhu, Xiping
    Jiang, Yixin
    Guo, Xiaobin
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 383 - +
  • [40] Efficient way to ensure the data security in cloud computing
    Pallikonda, Anil Kumar
    Chaduvula, Kavitha
    Markapudi, Baburao
    Jyothi, Ch Rathna
    Indira, D. N. V. S. L. S.
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2022, 15 (01): : 1 - 12