TOWARDS A SECURED DESIGN METHODOLOGY FOR CLOUD BASED BIOINFORMATICS APPLICATIONS

被引:0
|
作者
Nasir, A. [1 ]
Khan, M. U. G. [1 ]
机构
[1] Univ Engn & Technol, Al Khwarizmi Inst Comp Sci, Bioinformat Lab, Dept Comp Sci & Engn, Lahore, Pakistan
来源
JOURNAL OF ANIMAL AND PLANT SCIENCES | 2015年 / 25卷 / 04期
关键词
Cloud Computing; Bioinformatics; Evolutionary System; Secured Design Methodology; Software Engineering; Software Designs;
D O I
暂无
中图分类号
S [农业科学];
学科分类号
09 ;
摘要
The amount of molecular biology data currently being generated from the lab based testing and conventional computing techniques was not thought before. But at the same time the existing techniques remains incapable to cater this massive amount data sets to retrieve meaningful results in an efficient manner. With the exponential growth of computing applications and their corresponding users, many evolutionary systems have appeared in the current markets, such as cloud computing, grid computing, bioinformatics, and video surveillance systems. Though the discovery of such systems has brought fruitful changes in daily lives of their users, there are several severe problems associated with such computing environments and security is one of the most critical issues faced by the users and service providers of these applications. These security issues and problems may arise during the life span of any evolutionary domain i.e. they are dynamic in nature as they arise and need to be handled during their life span. In this paper, we have introduced a secured methodology for designing evolutionary computing applications. We further present a working system from bioinformatics domain for testing and evaluation of the proposed design methodology.
引用
收藏
页码:1176 / 1182
页数:7
相关论文
共 50 条
  • [31] Secured Data Storage and Error Tolerant Design in Cloud Computing
    Sumalatha, M. R.
    Selvakumar, C.
    Rathnam, G. Jeeva
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 301 - 305
  • [32] Applications domain driven data mining methodology in bioinformatics
    Li, Yadan
    Bai, Qinghua
    Chen, Zhicheng
    BioTechnology: An Indian Journal, 2014, 10 (09) : 3772 - 3779
  • [33] Towards Cloud-Based Architectures for Robotic Applications Provisioning
    Errounda, Fatima Zahra
    Belqasmi, Fatna
    Glitho, Roch
    2013 FOURTH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2013,
  • [34] Towards Model-Based Security Assessment of Cloud Applications
    Casola, Valentina
    De Benedictis, Alessandra
    Nardone, Roberto
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 773 - 785
  • [35] Methodology for Semi Automatic Development of Cloud-based Business Applications
    Benfenatki, Hind
    Ferreira Da Silva, Catarina
    Benharkat, Aicha-Nabila
    Ghodous, Parisa
    Biennier, Frederique
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 954 - 955
  • [36] Cloud based HPC for innovative virtual prototyping methodology: automotive applications
    el Khaldi, Fouad
    Ahouangonou, Christian
    Niess, Matthieu
    David, Olivier
    TRANSPORT RESEARCH ARENA TRA2016, 2016, 14 : 993 - 1002
  • [37] Self secured model for cloud based IOT systems
    Priyatharsini G.S.
    Babu A.J.
    Kiran M.G.
    Sathish Kumar P.J.
    Nelson Kennedy Babu C.
    Ali A.
    Measurement: Sensors, 2022, 24
  • [38] STUDY ON SECURED FRAMEWORK FOR CLOUD BASED ONLINE BANKING
    Tripathi, Satya Prakash
    Kumar, Aditya
    Astya, Rani
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 853 - 858
  • [39] Cloud Secured Protocol based on Partial Homomorphic Encryptions
    Derfouf, Mostapha
    Eleuldj, Mohsine
    2018 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2018,
  • [40] Science DMZ: SDN based Secured Cloud Testbed
    Chowdhary, Ankur
    Dixit, Vaibhav Hemant
    Tiwari, Naveen
    Kyung, Sukhwa
    Huang, Dijiang
    Ahn, Gail-Joon
    2017 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2017, : 198 - 199