Skip to main content
Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

Enhanced Security Mechanism in Cloud Based on DNA Excess 3 Codes

verfasst von : Manjot Kaur, Kiranbir Kaur

Erschienen in: Inventive Communication and Computational Technologies

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Exchanging data over the system has generally utilized quick and solid hot spot for correspondence. Clients from wide devotion utilize this component for exchanging and retrieving the required data. Portability and operability inside cloud framework are achieved through disconnected and online mediums, which are persistently alluring, yet the issue of security emerges amid the transmission process. Security and unwavering quality are the key issues during the exchange process, which requires serious research consideration. Data security is achieved by utilizing the public and private key-enabled block-level DNA-based EX-3 code. The analysis is inferred on the disconnected information as well as on the online information, for example, Google Docs. Redundancy handling mechanism is utilized to guarantee space for the information storage supplier, which remains a minimum utilized characteristic as it considers the capacity utilization in DSP. With the proposed system, the overall space allocation for heavy documents is decreased and online data security has been improved by the utilization of byte-level DNA-based EX-3 code.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hwang K, Bai X, Shi Y, Li M, Chen W-G, Wu Y (2016) Cloud performance modeling with benchmark evaluation of elastic scaling strategies. IEEE Trans Parallel Distrib Syst 27(1):130–143CrossRef Hwang K, Bai X, Shi Y, Li M, Chen W-G, Wu Y (2016) Cloud performance modeling with benchmark evaluation of elastic scaling strategies. IEEE Trans Parallel Distrib Syst 27(1):130–143CrossRef
2.
Zurück zum Zitat Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AHH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367–380CrossRef Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AHH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367–380CrossRef
3.
Zurück zum Zitat Armbrust M et al (2010) A view of cloud computing. Commun ACM 53(4):50CrossRef Armbrust M et al (2010) A view of cloud computing. Commun ACM 53(4):50CrossRef
4.
Zurück zum Zitat Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. In: Proceedings of 10th IEEE international conference on high performance computing and communications, HPCC 2008, pp 5–13 Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. In: Proceedings of 10th IEEE international conference on high performance computing and communications, HPCC 2008, pp 5–13
5.
Zurück zum Zitat Nirmala SJ, Tajunnisha N, Bhanu SMS (2016) Service provisioning of flexible advance reservation leases in IaaS clouds, vol 3, no 3, pp 154–162 Nirmala SJ, Tajunnisha N, Bhanu SMS (2016) Service provisioning of flexible advance reservation leases in IaaS clouds, vol 3, no 3, pp 154–162
6.
Zurück zum Zitat Marwan M, Kartit A, Ouahmane H (2016) Secure cloud-based medical image storage using secret share scheme. In: 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), IEEE, pp 366–371 Marwan M, Kartit A, Ouahmane H (2016) Secure cloud-based medical image storage using secret share scheme. In: 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), IEEE, pp 366–371
7.
Zurück zum Zitat Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthc Inform Res 22(3):156–163CrossRef Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthc Inform Res 22(3):156–163CrossRef
8.
Zurück zum Zitat Li J, Li J, Chen X, Jia C, Lou W (2013) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2): 425–437 Li J, Li J, Chen X, Jia C, Lou W (2013) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2): 425–437
9.
Zurück zum Zitat Seo S, Nabeel M, Ding X, Bertino E (2013) An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9): 2107–2119 Seo S, Nabeel M, Ding X, Bertino E (2013) An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9): 2107–2119
10.
Zurück zum Zitat Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6): 1265–1277. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6): 1265–1277.
11.
Zurück zum Zitat Xu D, Fu C, Li G, Zou D, Zhang H, Liu XY (2017) Virtualization of the encryption card for trust access in cloud computing. IEEE Access 5, 20652–20667 Xu D, Fu C, Li G, Zou D, Zhang H, Liu XY (2017) Virtualization of the encryption card for trust access in cloud computing. IEEE Access 5, 20652–20667
12.
Zurück zum Zitat Alabdulatif A, Kumarage H, Khalil I, Atiquzzaman M, Yi X (2017) Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure. IET Wirel Sens Syst 7(6):182–190CrossRef Alabdulatif A, Kumarage H, Khalil I, Atiquzzaman M, Yi X (2017) Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure. IET Wirel Sens Syst 7(6):182–190CrossRef
13.
Zurück zum Zitat Li J, Lin X, Zhang Y, Han J (2016) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5): 715–725 Li J, Lin X, Zhang Y, Han J (2016) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5): 715–725
14.
Zurück zum Zitat Jiang L, Guo D (2017) Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage. IEEE Access 5, 13336–13345. Jiang L, Guo D (2017) Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage. IEEE Access 5, 13336–13345.
15.
Zurück zum Zitat Liu C, Zhu L, Chen J (2017) Graph encryption for top-k nearest keyword search queries on cloud. IEEE Trans Sustain Comput 2(4): 371–381 Liu C, Zhu L, Chen J (2017) Graph encryption for top-k nearest keyword search queries on cloud. IEEE Trans Sustain Comput 2(4): 371–381
16.
Zurück zum Zitat Song C, Park Y, Gao J, Nanduri SK, Zegers W (2015) Favored encryption techniques for cloud storage. In: 2015 IEEE First International Conference on Big Data Computing Service and Applications, IEEE, pp. 267–274 Song C, Park Y, Gao J, Nanduri SK, Zegers W (2015) Favored encryption techniques for cloud storage. In: 2015 IEEE First International Conference on Big Data Computing Service and Applications, IEEE, pp. 267–274
17.
Zurück zum Zitat Veeraragavan N, Arockiam L, Manikandasaran SS (2017) Enhanced encryption algorithm (EEA) for protecting users’ credentials in public cloud. In: 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), IEEE, pp. 1–6 Veeraragavan N, Arockiam L, Manikandasaran SS (2017) Enhanced encryption algorithm (EEA) for protecting users’ credentials in public cloud. In: 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), IEEE, pp. 1–6
18.
Zurück zum Zitat Xu P, He S, Wang W, Susilo W, Jin H (2017) Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Trans Ind Inf XX(XX):1–12 Xu P, He S, Wang W, Susilo W, Jin H (2017) Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Trans Ind Inf XX(XX):1–12
19.
Zurück zum Zitat Tsai KL et al (2016) Cloud encryption using distributed environmental keys. In: Proceedings of 2016 international conference on innovative mobile and internet services in ubiquitous computing, IMIS 2016, pp 476–481 Tsai KL et al (2016) Cloud encryption using distributed environmental keys. In: Proceedings of 2016 international conference on innovative mobile and internet services in ubiquitous computing, IMIS 2016, pp 476–481
20.
Zurück zum Zitat El-Yahyaoui A, El Kettani MD (2017) A verifiable fully homomorphic encryption scheme to secure big data in cloud computing. In: 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), IEEE, pp. 1–5 El-Yahyaoui A, El Kettani MD (2017) A verifiable fully homomorphic encryption scheme to secure big data in cloud computing. In: 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), IEEE, pp. 1–5
21.
Metadaten
Titel
Enhanced Security Mechanism in Cloud Based on DNA Excess 3 Codes
verfasst von
Manjot Kaur
Kiranbir Kaur
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0146-3_1

Neuer Inhalt