Skip to main content

A Security Approach for Data Migration in Cloud Computing Based on Human Genetics

  • Conference paper
  • First Online:
Book cover Information Systems (EMCIS 2017)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 299))

Abstract

Cloud computing technology is flexible, cost effective and reliable for the provision of IT services to businesses and individuals through means of internet. Clearly beneficial in terms of costs, this technology has gained immediate popularity. However, security concerns have slowed its expansion. It is possible that the full adoption of cloud computing is not appropriate in some cases, for security reasons related to confidentiality and data integrity. Cryptographic methods that could reduce these risks to acceptable levels, however, were developed. In this article, we introduce a method implementing encryption based on human genetics, more particularly on protein biosynthesis. The attractive coupling between the encryption of content and biosynthesis protects data against unauthorized access. The experiments show that our proposal provides a good balance between the integrity and confidentiality of data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ballet, P.: Intérêts mutuels des systèmes multi-agents et de l’immunologie: applications \`A l’immunologie et au traitement d’images. Ph.D. thesis, L’Université de Bretagne Occidentale (2000)

    Google Scholar 

  2. Brohi, S.N.: Secure cloud storage model to preserve confidentiality and integriy. Ph.D. thesis, University of Technology Malaysia, Advanced Informatics School (2015)

    Google Scholar 

  3. Brohi, S.N., Bamiah, M.A., Chuprat, S., Ab Manan, J.-L.: Design and implementation of a privacy preserved off-premises cloud storage. J. Comput. Sci. 10(2), 210–223 (2014)

    Article  Google Scholar 

  4. Chen, D., He, Y.: A Study on Secure Data Storage Strategy in Cloud Computing

    Google Scholar 

  5. Ishiguro, A., Watanabe, Y., Kondo, T., Uchikawa, Y.: Decentralized consensus-making mechanisms based on immune system-application to a behavior arbitration of an autonomous mobile robot. In: Proceedings of IEEE International Conference on Evolutionary Computation, pp. 82–87 (1996)

    Google Scholar 

  6. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: Proceedings of the IEEE International Conference on Cloud Computing, CLOUD 2009, Bangalore, India, pp. 109–116 (2009)

    Google Scholar 

  7. Kaaniche, N., Boudguiga, A., Laurent, M.: ID based cryptography for cloud data storage. In: Proceedings of the IEEE 6th International Conference on Cloud Computing, CLOUD 2013, Santa Clara Marriott, CA, USA, pp. 375–382 (2013)

    Google Scholar 

  8. Kaaniche, N., Laurent, M., El Barbori, M.: CloudaSec : a novel public-key based framework to handle data sharing security in clouds. In: Proceedings of the 11th International Conference on Security and Cryptography, SECRYPT 2014, Vienna, Austria, pp. 5–18 (2014a)

    Google Scholar 

  9. Kaaniche, N., El Moustaine, E., Laurent, M.: A novel zero-knowledge scheme for proof of data possession in cloud storage applications. In: Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2014, Chicago, IL, USA, pp. 522–531 (2014b)

    Google Scholar 

  10. Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Global J. Comput. Sci. Technol. Netw. Web Secur. 13(15), 14–22 (2013)

    Google Scholar 

  11. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop on Quality of Service, IWQoS 2009, Charleston, South Carolina, pp. 1–9 (2009)

    Google Scholar 

  12. Anamika, S., Vishal, S.: Implementing data storage in cloud computing with HMAC encryption algorithm to improve data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(8) (2015)

    Google Scholar 

  13. Rameshwari, M., Pramod, K.: Cloud computing security improvement using Diffie Hellman and AES. Int. J. Comput. Appl. 118(1), 0975–8887 (2015)

    Google Scholar 

  14. Li, J., Li, J., Liu, Z., Jia, C.: Enabling efficient and secure data sharing in cloud computing. Concurrency Comput.:Pract. Exper. (2013). Wiley

    Google Scholar 

  15. Mohamed, E.M., EI-Etriby, S.: Randomness testing of modem encryption techniques in cloud environment. In: 8th International Conference on Informatics and Systems (2012)

    Google Scholar 

  16. Xu, Z., Martin, K.M.: Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: International Conference on Trust, Security and Privacy in Computing and Communications. IEEE (2012)

    Google Scholar 

  17. Varalakshmi, P., Deventhiran, H.: Integrity Checking for Cloud Environment Using Encryption Algorithm. IEEE (2012)

    Google Scholar 

  18. Amazon Web Services.: Encrypting Data at Rest in AWS. https://aws.amazon.com/whitepapers

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamza Hammami .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hammami, H., Brahmi, H., Brahmi, I., Yahia, S.B. (2017). A Security Approach for Data Migration in Cloud Computing Based on Human Genetics. In: Themistocleous, M., Morabito, V. (eds) Information Systems. EMCIS 2017. Lecture Notes in Business Information Processing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-65930-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65930-5_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65929-9

  • Online ISBN: 978-3-319-65930-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics