A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing

被引:4
|
作者
Can, Ozgu [1 ]
Thabit, Fursan [1 ,2 ]
Aljahdali, Asia Othman [3 ]
Al-Homdy, Sharaf [2 ]
Alkhzaimi, Hoda A. [4 ]
机构
[1] Ege Univ, Fac Engn, Dept Comp Engn, Izmir, Turkiye
[2] Sanaa Univ, Fac Comp & Informat Technol, Sanaa, Yemen
[3] Univ Jeddah, Cybersecur Dev, Jeddah, Saudi Arabia
[4] New York Univ Abu Dhabi, Cybersecur Dev, Abu Dhabi, U Arab Emirates
关键词
Cloud computing; cryptography; data security; genetics cryptography; DATA-STORAGE; DNA CRYPTOGRAPHY; ENCRYPTION; SYSTEM; SCHEME; IMAGE;
D O I
10.1080/01969722.2023.2175117
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has revolutionized the world, opening up new horizons with bright potential due to its performance, accessibility, low cost, and many other benefits. Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computational power. Cloud computing refers to data centers accessible to numerous customers over the Internet. It has the ability to utilize computing resources at a low cost and fast speed. Cloud data security is becoming increasingly important as we shift our devices, data centers, business processes, and other assets to the cloud. Comprehensive security policies, corporate security culture, and cloud security solutions are used to ensure the level of cloud data security. Many techniques exist to protect data communication in the cloud environment, including encryption, which is the primary component of data security and the mechanism by which data or message transmission confidentiality and integrity are achieved. Current researchers have focused on genetics-based cryptography; genetics has been implemented in cryptography for data computation, storage, and transmission. This survey paper analyzes the new type of cryptographic approaches based on genetic science to generate robust sub-keys and robust cryptographic techniques based on homologous genetics (DNA, RNA, and mRNA) to improve security in the cloud. This work reviews several approaches based on genetic cryptography and their applications and drawbacks. In addition, the paper introduces the architecture of cloud computing along with the fundamental challenges of cloud computing applications.
引用
收藏
页数:35
相关论文
共 50 条
  • [41] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [42] A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
    Ramakrishna, Donagani
    Shaik, Mohammed Ali
    IEEE ACCESS, 2025, 13 : 11576 - 11593
  • [43] A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment
    Mehmood, Muhammad Sheraz
    Shahid, Muhammad Rehman
    Jamil, Abid
    Ashraf, Rehan
    Mahmood, Toqeer
    Mehmood, Aatif
    2019 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT 2019), 2019, : 54 - 59
  • [44] A Review of Machine Learning Algorithms for Cloud Computing Security
    Butt, Umer Ahmed
    Mehmood, Muhammad
    Shah, Syed Bilal Hussain
    Amin, Rashid
    Shaukat, M. Waqas
    Raza, Syed Mohsan
    Suh, Doug Young
    Piran, Md. Jalil
    ELECTRONICS, 2020, 9 (09) : 1 - 25
  • [45] Integrated monitoring algorithms for software data security situation on private cloud computing platform
    Liu, Ying
    Liu, Hai Tao
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2021, 14 (01) : 1 - 9
  • [46] Analytical Method to Compute the Cloud Computing Data Security Issues by Using Encryption Algorithms
    Khan, Abdul Hannan
    Hasnain, Syed Anwer
    Siddiqui, Shahan Yamin
    Irshad, Muhammad Sohail
    Sajid, Muhammad
    Iqbal, Shahid
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (28) : 1 - 17
  • [47] A Comprehensive Security Strategy Applying to the Total Life Cycle of Cloud Computing Data Center
    Dong Zhaoyang
    Zhang Lin
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6259 - 6261
  • [48] A pairing-based cryptographic approach for data security in the cloud
    Morales-Sandoval, Miguel
    Luis Gonzalez-Compean, Jose
    Diaz-Perez, Arturo
    Sosa-Sosa, Victor J.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 441 - 461
  • [49] A pairing-based cryptographic approach for data security in the cloud
    Miguel Morales-Sandoval
    Jose Luis Gonzalez-Compean
    Arturo Diaz-Perez
    Victor J. Sosa-Sosa
    International Journal of Information Security, 2018, 17 : 441 - 461
  • [50] Cloud Computing USING DATA IN THE CLOUD—WHAT IT MEANS FOR DATA SECURITY
    Ward, Stuart
    Lab Manager, 2019, 14 (09): : 24 - 27