Bio Inspired Algorithm for Secure Cloud Storage: A Review
Keywords:Cloud Computing, Security, Confidentiality, Authentication, Bio-inspired algorithms, Genetic Algorithm, DNA Sequencing.
Cloud storage is one among the service provided by Cloud computing within which information is maintained, managed, secured remotely and created available to users over a network. Now a day’s cloud computing is being used in several areas like industry, medical, science and research, colleges etc for storage of huge amount of data. User can retrieve data files from cloud data center on request. While storing data files on cloud server several security issues may arise. To overcome from these security issues there are a number of techniques. Out of several security techniques Cryptography is more popular now a day’s for data security. Use of a traditional cryptography algorithm is not effective or sufficient for high level security to data in cloud computing. In this research work a study is presented for bio inspired cryptography technique. The SaaS (software as a service) demonstrates the security using the upload, download and sharing of files using the bio-inspired platform.
Abbasy, M. R. and Shanmugam, B, Enabling data hiding for resource sharing in cloud computing environments based on dna sequences. In 2011 IEEE World Congress on Services, pages 385390. IEEE,2011.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., and Brandic, I, Cloud com- puting and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6):599616, 2009.
Clark, A. J. (1998). Optimisation heuristics for cryptology.60 Dimovski, A. and Gligoroski, D., Attacks on the transposition ciphers using optimization heuristics. In International Scientific Conference on Information, Communication & Energy Systems & Technologies ICEST, 2003.
Jegadeeswari, S., Dinadayalan, P., and Gnanambigai, Enhanced data security using neural network in cloud environment. International Journal of Applied Engineering Research, 11(1):278285, 2016.
Negi, A., Singh, M., and Kumar, S, An efficent security framework design for cloud computing using artificial neural networks. International Journal of Computer Applications, 129(4):1721, 2015.
Phangal, S. and Kumar, M, A dual security scheme using dna key based dna cryptography. In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, page 37. ACM, 2014.
Spillman, R., Janssen, M., Nelson, B., and Kepner, M., Use of a genetic algo- rithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17(1):3144, 1993.
Naik, P. G. and Naik, G. R, Symmetric key encryption using genetic algorithm. International Journal of Latest Trends in Engineering and Technology (IJLTET), 3(3):118128,2014.
Ranalkar, R. and Phulpagar, B, Dna based cryptography in multi-cloud: Security strategy and analysis. pages 189192, 2014.
N. Hitaswi and K. Chandrasekaran, “A Bio-Inspired Model to Provide Data Security in Cloud Storage”, IEEE, 2016.
Shruti Goyal, Sourabh Jain, “A secure cryptographic cloud communication using DNA cryptographic technique”, ICICT, IEEE, 2016.
How to Cite
Copyright (c) 2017 Ms. Mona Vishwakarma, Mr. Umesh Lilhore
This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.