Membrane computing inspired protocol to enhance security in cloud network
- 43 Downloads
The crucial threats and challenges prevailing in cloud computing are privacy and security. The main reason for these challenges encountered in cloud computing is its multi-tenancy nature and the subcontracting of infrastructures. Cloud services are widely recognized and approved in enterprises, educational institutions and government organizations for their businesses. In order to provide reliable, secure cloud services and enhance cloud services, enterprises should develop security in their businesses and should select pertinent vendor for their computing needs. Traditional cryptography computing models are not completely suitable for protecting cloud-based computing. Membrane computing, on the other hand, provides an explicit notion of region, namely the space enclosed by membranes.
KeywordsMembrane computing Cryptography Cloud computing Neural network
- 8.Teuscher C (2004) Amorphous membrane blending: from regular to irregular cellular computing machines. PhD Thesis, Swiss Federal Institute of Technology (EPFL), Lausanne, SwitzerlandGoogle Scholar
- 9.Teuscher C (2005) Outlining an unconventional, adaptive, and particle-based reconfigurable computer architecture. In: Banâtre JP et al (eds) UPP 2004. Volume 3566 of Lecture notes in computer science. Springer, pp 231–246Google Scholar
- 10.Teuscher C (2006) From membranes to systems: self-configuration and self-replication in membrane systems. BioSystems 87(2–3):101–110Google Scholar
- 12.Kaeo M (2004) Designing network security, 2nd edn. Cisco Press, IndianapolisGoogle Scholar