Abstract
Cloud computing technology is flexible, cost effective and reliable for the provision of IT services to businesses and individuals through means of internet. Clearly beneficial in terms of costs, this technology has gained immediate popularity. However, security concerns have slowed its expansion. It is possible that the full adoption of cloud computing is not appropriate in some cases, for security reasons related to confidentiality and data integrity. Cryptographic methods that could reduce these risks to acceptable levels, however, were developed. In this article, we introduce a method implementing encryption based on human genetics, more particularly on protein biosynthesis. The attractive coupling between the encryption of content and biosynthesis protects data against unauthorized access. The experiments show that our proposal provides a good balance between the integrity and confidentiality of data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ballet, P.: Intérêts mutuels des systèmes multi-agents et de l’immunologie: applications \`A l’immunologie et au traitement d’images. Ph.D. thesis, L’Université de Bretagne Occidentale (2000)
Brohi, S.N.: Secure cloud storage model to preserve confidentiality and integriy. Ph.D. thesis, University of Technology Malaysia, Advanced Informatics School (2015)
Brohi, S.N., Bamiah, M.A., Chuprat, S., Ab Manan, J.-L.: Design and implementation of a privacy preserved off-premises cloud storage. J. Comput. Sci. 10(2), 210–223 (2014)
Chen, D., He, Y.: A Study on Secure Data Storage Strategy in Cloud Computing
Ishiguro, A., Watanabe, Y., Kondo, T., Uchikawa, Y.: Decentralized consensus-making mechanisms based on immune system-application to a behavior arbitration of an autonomous mobile robot. In: Proceedings of IEEE International Conference on Evolutionary Computation, pp. 82–87 (1996)
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: Proceedings of the IEEE International Conference on Cloud Computing, CLOUD 2009, Bangalore, India, pp. 109–116 (2009)
Kaaniche, N., Boudguiga, A., Laurent, M.: ID based cryptography for cloud data storage. In: Proceedings of the IEEE 6th International Conference on Cloud Computing, CLOUD 2013, Santa Clara Marriott, CA, USA, pp. 375–382 (2013)
Kaaniche, N., Laurent, M., El Barbori, M.: CloudaSec : a novel public-key based framework to handle data sharing security in clouds. In: Proceedings of the 11th International Conference on Security and Cryptography, SECRYPT 2014, Vienna, Austria, pp. 5–18 (2014a)
Kaaniche, N., El Moustaine, E., Laurent, M.: A novel zero-knowledge scheme for proof of data possession in cloud storage applications. In: Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2014, Chicago, IL, USA, pp. 522–531 (2014b)
Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Global J. Comput. Sci. Technol. Netw. Web Secur. 13(15), 14–22 (2013)
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop on Quality of Service, IWQoS 2009, Charleston, South Carolina, pp. 1–9 (2009)
Anamika, S., Vishal, S.: Implementing data storage in cloud computing with HMAC encryption algorithm to improve data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(8) (2015)
Rameshwari, M., Pramod, K.: Cloud computing security improvement using Diffie Hellman and AES. Int. J. Comput. Appl. 118(1), 0975–8887 (2015)
Li, J., Li, J., Liu, Z., Jia, C.: Enabling efficient and secure data sharing in cloud computing. Concurrency Comput.:Pract. Exper. (2013). Wiley
Mohamed, E.M., EI-Etriby, S.: Randomness testing of modem encryption techniques in cloud environment. In: 8th International Conference on Informatics and Systems (2012)
Xu, Z., Martin, K.M.: Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: International Conference on Trust, Security and Privacy in Computing and Communications. IEEE (2012)
Varalakshmi, P., Deventhiran, H.: Integrity Checking for Cloud Environment Using Encryption Algorithm. IEEE (2012)
Amazon Web Services.: Encrypting Data at Rest in AWS. https://aws.amazon.com/whitepapers
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Hammami, H., Brahmi, H., Brahmi, I., Yahia, S.B. (2017). A Security Approach for Data Migration in Cloud Computing Based on Human Genetics. In: Themistocleous, M., Morabito, V. (eds) Information Systems. EMCIS 2017. Lecture Notes in Business Information Processing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-65930-5_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-65930-5_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65929-9
Online ISBN: 978-3-319-65930-5
eBook Packages: Computer ScienceComputer Science (R0)