A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing

被引:4
|
作者
Can, Ozgu [1 ]
Thabit, Fursan [1 ,2 ]
Aljahdali, Asia Othman [3 ]
Al-Homdy, Sharaf [2 ]
Alkhzaimi, Hoda A. [4 ]
机构
[1] Ege Univ, Fac Engn, Dept Comp Engn, Izmir, Turkiye
[2] Sanaa Univ, Fac Comp & Informat Technol, Sanaa, Yemen
[3] Univ Jeddah, Cybersecur Dev, Jeddah, Saudi Arabia
[4] New York Univ Abu Dhabi, Cybersecur Dev, Abu Dhabi, U Arab Emirates
关键词
Cloud computing; cryptography; data security; genetics cryptography; DATA-STORAGE; DNA CRYPTOGRAPHY; ENCRYPTION; SYSTEM; SCHEME; IMAGE;
D O I
10.1080/01969722.2023.2175117
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has revolutionized the world, opening up new horizons with bright potential due to its performance, accessibility, low cost, and many other benefits. Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computational power. Cloud computing refers to data centers accessible to numerous customers over the Internet. It has the ability to utilize computing resources at a low cost and fast speed. Cloud data security is becoming increasingly important as we shift our devices, data centers, business processes, and other assets to the cloud. Comprehensive security policies, corporate security culture, and cloud security solutions are used to ensure the level of cloud data security. Many techniques exist to protect data communication in the cloud environment, including encryption, which is the primary component of data security and the mechanism by which data or message transmission confidentiality and integrity are achieved. Current researchers have focused on genetics-based cryptography; genetics has been implemented in cryptography for data computation, storage, and transmission. This survey paper analyzes the new type of cryptographic approaches based on genetic science to generate robust sub-keys and robust cryptographic techniques based on homologous genetics (DNA, RNA, and mRNA) to improve security in the cloud. This work reviews several approaches based on genetic cryptography and their applications and drawbacks. In addition, the paper introduces the architecture of cloud computing along with the fundamental challenges of cloud computing applications.
引用
收藏
页数:35
相关论文
共 50 条
  • [21] Improving the Security by using Various Cryptographic Techniques in Cloud Computing
    Jain, Gaurav
    Sejwar, Vikas
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 23 - 28
  • [22] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [23] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [24] Data security in cloud computing
    Meng, Du
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [25] Secure Data Storage in Cloud using Cryptographic Algorithms
    Kodumru, Nagasai Lohitha
    Supriya, M.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [26] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques
    Pardeshi, Suraj R.
    Pawar, Vikul J.
    Kharat, Kailash D.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515
  • [27] Mobile Cloud Computing Security Using Cryptographic Hash Function Algorithm
    Arfan, M.
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 403 - 407
  • [28] In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security
    Khan, Najeeb Ahmad
    Panchal, V. K.
    Tanweer, Safdar
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 27 - 41
  • [29] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225
  • [30] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64