Skip to main content
Top
Published in:
Cover of the book

2020 | OriginalPaper | Chapter

Enhanced Security Mechanism in Cloud Based on DNA Excess 3 Codes

Authors : Manjot Kaur, Kiranbir Kaur

Published in: Inventive Communication and Computational Technologies

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Exchanging data over the system has generally utilized quick and solid hot spot for correspondence. Clients from wide devotion utilize this component for exchanging and retrieving the required data. Portability and operability inside cloud framework are achieved through disconnected and online mediums, which are persistently alluring, yet the issue of security emerges amid the transmission process. Security and unwavering quality are the key issues during the exchange process, which requires serious research consideration. Data security is achieved by utilizing the public and private key-enabled block-level DNA-based EX-3 code. The analysis is inferred on the disconnected information as well as on the online information, for example, Google Docs. Redundancy handling mechanism is utilized to guarantee space for the information storage supplier, which remains a minimum utilized characteristic as it considers the capacity utilization in DSP. With the proposed system, the overall space allocation for heavy documents is decreased and online data security has been improved by the utilization of byte-level DNA-based EX-3 code.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hwang K, Bai X, Shi Y, Li M, Chen W-G, Wu Y (2016) Cloud performance modeling with benchmark evaluation of elastic scaling strategies. IEEE Trans Parallel Distrib Syst 27(1):130–143CrossRef Hwang K, Bai X, Shi Y, Li M, Chen W-G, Wu Y (2016) Cloud performance modeling with benchmark evaluation of elastic scaling strategies. IEEE Trans Parallel Distrib Syst 27(1):130–143CrossRef
2.
go back to reference Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AHH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367–380CrossRef Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AHH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367–380CrossRef
3.
4.
go back to reference Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. In: Proceedings of 10th IEEE international conference on high performance computing and communications, HPCC 2008, pp 5–13 Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. In: Proceedings of 10th IEEE international conference on high performance computing and communications, HPCC 2008, pp 5–13
5.
go back to reference Nirmala SJ, Tajunnisha N, Bhanu SMS (2016) Service provisioning of flexible advance reservation leases in IaaS clouds, vol 3, no 3, pp 154–162 Nirmala SJ, Tajunnisha N, Bhanu SMS (2016) Service provisioning of flexible advance reservation leases in IaaS clouds, vol 3, no 3, pp 154–162
6.
go back to reference Marwan M, Kartit A, Ouahmane H (2016) Secure cloud-based medical image storage using secret share scheme. In: 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), IEEE, pp 366–371 Marwan M, Kartit A, Ouahmane H (2016) Secure cloud-based medical image storage using secret share scheme. In: 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), IEEE, pp 366–371
7.
go back to reference Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthc Inform Res 22(3):156–163CrossRef Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthc Inform Res 22(3):156–163CrossRef
8.
go back to reference Li J, Li J, Chen X, Jia C, Lou W (2013) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2): 425–437 Li J, Li J, Chen X, Jia C, Lou W (2013) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2): 425–437
9.
go back to reference Seo S, Nabeel M, Ding X, Bertino E (2013) An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9): 2107–2119 Seo S, Nabeel M, Ding X, Bertino E (2013) An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9): 2107–2119
10.
go back to reference Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6): 1265–1277. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6): 1265–1277.
11.
go back to reference Xu D, Fu C, Li G, Zou D, Zhang H, Liu XY (2017) Virtualization of the encryption card for trust access in cloud computing. IEEE Access 5, 20652–20667 Xu D, Fu C, Li G, Zou D, Zhang H, Liu XY (2017) Virtualization of the encryption card for trust access in cloud computing. IEEE Access 5, 20652–20667
12.
go back to reference Alabdulatif A, Kumarage H, Khalil I, Atiquzzaman M, Yi X (2017) Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure. IET Wirel Sens Syst 7(6):182–190CrossRef Alabdulatif A, Kumarage H, Khalil I, Atiquzzaman M, Yi X (2017) Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure. IET Wirel Sens Syst 7(6):182–190CrossRef
13.
go back to reference Li J, Lin X, Zhang Y, Han J (2016) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5): 715–725 Li J, Lin X, Zhang Y, Han J (2016) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5): 715–725
14.
go back to reference Jiang L, Guo D (2017) Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage. IEEE Access 5, 13336–13345. Jiang L, Guo D (2017) Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage. IEEE Access 5, 13336–13345.
15.
go back to reference Liu C, Zhu L, Chen J (2017) Graph encryption for top-k nearest keyword search queries on cloud. IEEE Trans Sustain Comput 2(4): 371–381 Liu C, Zhu L, Chen J (2017) Graph encryption for top-k nearest keyword search queries on cloud. IEEE Trans Sustain Comput 2(4): 371–381
16.
go back to reference Song C, Park Y, Gao J, Nanduri SK, Zegers W (2015) Favored encryption techniques for cloud storage. In: 2015 IEEE First International Conference on Big Data Computing Service and Applications, IEEE, pp. 267–274 Song C, Park Y, Gao J, Nanduri SK, Zegers W (2015) Favored encryption techniques for cloud storage. In: 2015 IEEE First International Conference on Big Data Computing Service and Applications, IEEE, pp. 267–274
17.
go back to reference Veeraragavan N, Arockiam L, Manikandasaran SS (2017) Enhanced encryption algorithm (EEA) for protecting users’ credentials in public cloud. In: 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), IEEE, pp. 1–6 Veeraragavan N, Arockiam L, Manikandasaran SS (2017) Enhanced encryption algorithm (EEA) for protecting users’ credentials in public cloud. In: 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), IEEE, pp. 1–6
18.
go back to reference Xu P, He S, Wang W, Susilo W, Jin H (2017) Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Trans Ind Inf XX(XX):1–12 Xu P, He S, Wang W, Susilo W, Jin H (2017) Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Trans Ind Inf XX(XX):1–12
19.
go back to reference Tsai KL et al (2016) Cloud encryption using distributed environmental keys. In: Proceedings of 2016 international conference on innovative mobile and internet services in ubiquitous computing, IMIS 2016, pp 476–481 Tsai KL et al (2016) Cloud encryption using distributed environmental keys. In: Proceedings of 2016 international conference on innovative mobile and internet services in ubiquitous computing, IMIS 2016, pp 476–481
20.
go back to reference El-Yahyaoui A, El Kettani MD (2017) A verifiable fully homomorphic encryption scheme to secure big data in cloud computing. In: 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), IEEE, pp. 1–5 El-Yahyaoui A, El Kettani MD (2017) A verifiable fully homomorphic encryption scheme to secure big data in cloud computing. In: 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), IEEE, pp. 1–5
Metadata
Title
Enhanced Security Mechanism in Cloud Based on DNA Excess 3 Codes
Authors
Manjot Kaur
Kiranbir Kaur
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0146-3_1