A Security Approach for Data Migration in Cloud Computing Based on Human Genetics

被引:1
|
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Brahmi, Imen [1 ]
Ben Yahia, Sadok [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
来源
INFORMATION SYSTEMS, EMCIS 2017 | 2017年 / 299卷
关键词
Cloud computing; Cost effective; Security; Confidentiality; Integrity; Cryptographic; Human genetics; Protein biosynthesis;
D O I
10.1007/978-3-319-65930-5_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing technology is flexible, cost effective and reliable for the provision of IT services to businesses and individuals through means of internet. Clearly beneficial in terms of costs, this technology has gained immediate popularity. However, security concerns have slowed its expansion. It is possible that the full adoption of cloud computing is not appropriate in some cases, for security reasons related to confidentiality and data integrity. Cryptographic methods that could reduce these risks to acceptable levels, however, were developed. In this article, we introduce a method implementing encryption based on human genetics, more particularly on protein biosynthesis. The attractive coupling between the encryption of content and biosynthesis protects data against unauthorized access. The experiments show that our proposal provides a good balance between the integrity and confidentiality of data.
引用
收藏
页码:384 / 396
页数:13
相关论文
共 50 条
  • [41] Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing
    Corpuz, Reynaldo R.
    Gerardo, Bobby D.
    Medina, Ruji P.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 157 - 162
  • [42] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225
  • [43] Research on Security of the Client Based on Cloud Computing
    Xu Xiaoping
    Yan Junhu
    2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 1 - 6
  • [44] Towards DNA based data security in the cloud computing environment
    Namasudra, Suyel
    Devi, Debashree
    Kadry, Seifedine
    Sundarasekar, Revathi
    Shanthini, A.
    COMPUTER COMMUNICATIONS, 2020, 151 : 539 - 547
  • [45] Security and privacy aware data aggregation on cloud computing
    Silva, Leandro V.
    Barbosa, Pedro
    Marinho, Rodolfo
    Brito, Andrey
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9
  • [46] Issues And Challenges of Data Security In A Cloud Computing Environment
    Sharma, Pradeep Kumar
    Kaushik, Prem Shankar
    Agarwal, Prerna
    Jain, Payal
    Agarwal, Shivangi
    Dixit, Kamlesh
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 560 - 566
  • [47] Improved End-to-End Data Security Approach for Cloud Computing
    Ghosh, Soumalya
    Verma, Shiv Kumar
    Ghosh, Uttam
    Al-Numay, Mohammed
    SUSTAINABILITY, 2023, 15 (22)
  • [48] Virtual Machine Migration: A Green Computing Approach in Cloud Data Centers
    Bala, Minu
    Devanand
    PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2015, VOL 2, 2016, 439 : 161 - 168
  • [49] Security analysis of public cloud computing
    Idziorek, Joseph
    Tannian, Mark
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 9 (1-2) : 4 - 20
  • [50] A computational and analytical approach for cloud computing security with user data management
    Sasubilli, Satya Murthy
    Dubey, Ashutosh Kumar
    Kumar, Abhishek
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING (ICACCE-2020), 2020,