A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing

被引:4
|
作者
Can, Ozgu [1 ]
Thabit, Fursan [1 ,2 ]
Aljahdali, Asia Othman [3 ]
Al-Homdy, Sharaf [2 ]
Alkhzaimi, Hoda A. [4 ]
机构
[1] Ege Univ, Fac Engn, Dept Comp Engn, Izmir, Turkiye
[2] Sanaa Univ, Fac Comp & Informat Technol, Sanaa, Yemen
[3] Univ Jeddah, Cybersecur Dev, Jeddah, Saudi Arabia
[4] New York Univ Abu Dhabi, Cybersecur Dev, Abu Dhabi, U Arab Emirates
关键词
Cloud computing; cryptography; data security; genetics cryptography; DATA-STORAGE; DNA CRYPTOGRAPHY; ENCRYPTION; SYSTEM; SCHEME; IMAGE;
D O I
10.1080/01969722.2023.2175117
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has revolutionized the world, opening up new horizons with bright potential due to its performance, accessibility, low cost, and many other benefits. Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computational power. Cloud computing refers to data centers accessible to numerous customers over the Internet. It has the ability to utilize computing resources at a low cost and fast speed. Cloud data security is becoming increasingly important as we shift our devices, data centers, business processes, and other assets to the cloud. Comprehensive security policies, corporate security culture, and cloud security solutions are used to ensure the level of cloud data security. Many techniques exist to protect data communication in the cloud environment, including encryption, which is the primary component of data security and the mechanism by which data or message transmission confidentiality and integrity are achieved. Current researchers have focused on genetics-based cryptography; genetics has been implemented in cryptography for data computation, storage, and transmission. This survey paper analyzes the new type of cryptographic approaches based on genetic science to generate robust sub-keys and robust cryptographic techniques based on homologous genetics (DNA, RNA, and mRNA) to improve security in the cloud. This work reviews several approaches based on genetic cryptography and their applications and drawbacks. In addition, the paper introduces the architecture of cloud computing along with the fundamental challenges of cloud computing applications.
引用
收藏
页数:35
相关论文
共 50 条
  • [31] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [32] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [33] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [34] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [35] Modeling of Data Security in Cloud Computing
    Balogh, Zoltan
    Turcani, Milan
    2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 940 - 945
  • [36] An Overview on Data Security in Cloud Computing
    Kacha, Lynda
    Zitouni, Abdelhafid
    CYBERNETICS APPROACHES IN INTELLIGENT SYSTEMS: COMPUTATIONAL METHODS IN SYSTEMS AND SOFTWARE 2017, VOL. 1, 2018, 661 : 250 - 261
  • [37] Cryptography and Data Security in Cloud Computing
    Yan, Zheng
    Deng, Robert H.
    Varadharajan, Vijay
    INFORMATION SCIENCES, 2017, 387 : 53 - 55
  • [38] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [39] A Study in Data Security in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    Majid, Mazlina Binti Abdul
    Khan, Nusrat Ullah
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 367 - 371
  • [40] Cloud Computing, Security and Data Concealment
    Delettre, Christian
    Boudaoud, Karima
    Riveill, Michel
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,