Skip to main content
Top

2017 | OriginalPaper | Chapter

A Security Approach for Data Migration in Cloud Computing Based on Human Genetics

Authors : Hamza Hammami, Hanen Brahmi, Imen Brahmi, Sadok Ben Yahia

Published in: Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing technology is flexible, cost effective and reliable for the provision of IT services to businesses and individuals through means of internet. Clearly beneficial in terms of costs, this technology has gained immediate popularity. However, security concerns have slowed its expansion. It is possible that the full adoption of cloud computing is not appropriate in some cases, for security reasons related to confidentiality and data integrity. Cryptographic methods that could reduce these risks to acceptable levels, however, were developed. In this article, we introduce a method implementing encryption based on human genetics, more particularly on protein biosynthesis. The attractive coupling between the encryption of content and biosynthesis protects data against unauthorized access. The experiments show that our proposal provides a good balance between the integrity and confidentiality of data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ballet, P.: Intérêts mutuels des systèmes multi-agents et de l’immunologie: applications \`A l’immunologie et au traitement d’images. Ph.D. thesis, L’Université de Bretagne Occidentale (2000) Ballet, P.: Intérêts mutuels des systèmes multi-agents et de l’immunologie: applications \`A l’immunologie et au traitement d’images. Ph.D. thesis, L’Université de Bretagne Occidentale (2000)
2.
go back to reference Brohi, S.N.: Secure cloud storage model to preserve confidentiality and integriy. Ph.D. thesis, University of Technology Malaysia, Advanced Informatics School (2015) Brohi, S.N.: Secure cloud storage model to preserve confidentiality and integriy. Ph.D. thesis, University of Technology Malaysia, Advanced Informatics School (2015)
3.
go back to reference Brohi, S.N., Bamiah, M.A., Chuprat, S., Ab Manan, J.-L.: Design and implementation of a privacy preserved off-premises cloud storage. J. Comput. Sci. 10(2), 210–223 (2014)CrossRef Brohi, S.N., Bamiah, M.A., Chuprat, S., Ab Manan, J.-L.: Design and implementation of a privacy preserved off-premises cloud storage. J. Comput. Sci. 10(2), 210–223 (2014)CrossRef
4.
go back to reference Chen, D., He, Y.: A Study on Secure Data Storage Strategy in Cloud Computing Chen, D., He, Y.: A Study on Secure Data Storage Strategy in Cloud Computing
5.
go back to reference Ishiguro, A., Watanabe, Y., Kondo, T., Uchikawa, Y.: Decentralized consensus-making mechanisms based on immune system-application to a behavior arbitration of an autonomous mobile robot. In: Proceedings of IEEE International Conference on Evolutionary Computation, pp. 82–87 (1996) Ishiguro, A., Watanabe, Y., Kondo, T., Uchikawa, Y.: Decentralized consensus-making mechanisms based on immune system-application to a behavior arbitration of an autonomous mobile robot. In: Proceedings of IEEE International Conference on Evolutionary Computation, pp. 82–87 (1996)
6.
go back to reference Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: Proceedings of the IEEE International Conference on Cloud Computing, CLOUD 2009, Bangalore, India, pp. 109–116 (2009) Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: Proceedings of the IEEE International Conference on Cloud Computing, CLOUD 2009, Bangalore, India, pp. 109–116 (2009)
7.
go back to reference Kaaniche, N., Boudguiga, A., Laurent, M.: ID based cryptography for cloud data storage. In: Proceedings of the IEEE 6th International Conference on Cloud Computing, CLOUD 2013, Santa Clara Marriott, CA, USA, pp. 375–382 (2013) Kaaniche, N., Boudguiga, A., Laurent, M.: ID based cryptography for cloud data storage. In: Proceedings of the IEEE 6th International Conference on Cloud Computing, CLOUD 2013, Santa Clara Marriott, CA, USA, pp. 375–382 (2013)
8.
go back to reference Kaaniche, N., Laurent, M., El Barbori, M.: CloudaSec : a novel public-key based framework to handle data sharing security in clouds. In: Proceedings of the 11th International Conference on Security and Cryptography, SECRYPT 2014, Vienna, Austria, pp. 5–18 (2014a) Kaaniche, N., Laurent, M., El Barbori, M.: CloudaSec : a novel public-key based framework to handle data sharing security in clouds. In: Proceedings of the 11th International Conference on Security and Cryptography, SECRYPT 2014, Vienna, Austria, pp. 5–18 (2014a)
9.
go back to reference Kaaniche, N., El Moustaine, E., Laurent, M.: A novel zero-knowledge scheme for proof of data possession in cloud storage applications. In: Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2014, Chicago, IL, USA, pp. 522–531 (2014b) Kaaniche, N., El Moustaine, E., Laurent, M.: A novel zero-knowledge scheme for proof of data possession in cloud storage applications. In: Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2014, Chicago, IL, USA, pp. 522–531 (2014b)
10.
go back to reference Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Global J. Comput. Sci. Technol. Netw. Web Secur. 13(15), 14–22 (2013) Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Global J. Comput. Sci. Technol. Netw. Web Secur. 13(15), 14–22 (2013)
11.
go back to reference Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop on Quality of Service, IWQoS 2009, Charleston, South Carolina, pp. 1–9 (2009) Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop on Quality of Service, IWQoS 2009, Charleston, South Carolina, pp. 1–9 (2009)
12.
go back to reference Anamika, S., Vishal, S.: Implementing data storage in cloud computing with HMAC encryption algorithm to improve data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(8) (2015) Anamika, S., Vishal, S.: Implementing data storage in cloud computing with HMAC encryption algorithm to improve data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(8) (2015)
13.
go back to reference Rameshwari, M., Pramod, K.: Cloud computing security improvement using Diffie Hellman and AES. Int. J. Comput. Appl. 118(1), 0975–8887 (2015) Rameshwari, M., Pramod, K.: Cloud computing security improvement using Diffie Hellman and AES. Int. J. Comput. Appl. 118(1), 0975–8887 (2015)
14.
go back to reference Li, J., Li, J., Liu, Z., Jia, C.: Enabling efficient and secure data sharing in cloud computing. Concurrency Comput.:Pract. Exper. (2013). Wiley Li, J., Li, J., Liu, Z., Jia, C.: Enabling efficient and secure data sharing in cloud computing. Concurrency Comput.:Pract. Exper. (2013). Wiley
15.
go back to reference Mohamed, E.M., EI-Etriby, S.: Randomness testing of modem encryption techniques in cloud environment. In: 8th International Conference on Informatics and Systems (2012) Mohamed, E.M., EI-Etriby, S.: Randomness testing of modem encryption techniques in cloud environment. In: 8th International Conference on Informatics and Systems (2012)
16.
go back to reference Xu, Z., Martin, K.M.: Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: International Conference on Trust, Security and Privacy in Computing and Communications. IEEE (2012) Xu, Z., Martin, K.M.: Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: International Conference on Trust, Security and Privacy in Computing and Communications. IEEE (2012)
17.
go back to reference Varalakshmi, P., Deventhiran, H.: Integrity Checking for Cloud Environment Using Encryption Algorithm. IEEE (2012) Varalakshmi, P., Deventhiran, H.: Integrity Checking for Cloud Environment Using Encryption Algorithm. IEEE (2012)
Metadata
Title
A Security Approach for Data Migration in Cloud Computing Based on Human Genetics
Authors
Hamza Hammami
Hanen Brahmi
Imen Brahmi
Sadok Ben Yahia
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-65930-5_31

Premium Partner