Bio Inspired Algorithm for Secure Cloud Storage: A Review


  • Ms. Mona Vishwakarma M.Tech Scholar, Department of CSE, NRI, Bhopal,M.P,India
  • Mr. Umesh Lilhore Professor, Department of CSE, NRI, Bhopal,M.P,India



Cloud Computing, Security, Confidentiality, Authentication, Bio-inspired algorithms, Genetic Algorithm, DNA Sequencing.


 Cloud storage is one among the service provided by Cloud computing within which information is maintained, managed, secured remotely and created available to users over a network. Now a day’s cloud computing is being used in several areas like industry, medical, science and research, colleges etc for storage of huge amount of data. User can retrieve data files from cloud data center on request. While storing data files on cloud server several security issues may arise. To overcome from these security issues there are a number of techniques. Out of several security techniques Cryptography is more popular now a day’s for data security. Use of a traditional cryptography algorithm is not effective or sufficient for high level security to data in cloud computing. In this research work a study is presented for bio inspired cryptography technique. The SaaS (software as a service) demonstrates the security using the upload, download and sharing of files using the bio-inspired platform.


Download data is not yet available.


Abbasy, M. R. and Shanmugam, B, Enabling data hiding for resource sharing in cloud computing environments based on dna sequences. In 2011 IEEE World Congress on Services, pages 385390. IEEE,2011.

Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., and Brandic, I, Cloud com- puting and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6):599616, 2009.

Clark, A. J. (1998). Optimisation heuristics for cryptology.60 Dimovski, A. and Gligoroski, D., Attacks on the transposition ciphers using optimization heuristics. In International Scientific Conference on Information, Communication & Energy Systems & Technologies ICEST, 2003.

Jegadeeswari, S., Dinadayalan, P., and Gnanambigai, Enhanced data security using neural network in cloud environment. International Journal of Applied Engineering Research, 11(1):278285, 2016.

Negi, A., Singh, M., and Kumar, S, An efficent security framework design for cloud computing using artificial neural networks. International Journal of Computer Applications, 129(4):1721, 2015.

Phangal, S. and Kumar, M, A dual security scheme using dna key based dna cryptography. In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, page 37. ACM, 2014.

Spillman, R., Janssen, M., Nelson, B., and Kepner, M., Use of a genetic algo- rithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17(1):3144, 1993.

Naik, P. G. and Naik, G. R, Symmetric key encryption using genetic algorithm. International Journal of Latest Trends in Engineering and Technology (IJLTET), 3(3):118128,2014.

Ranalkar, R. and Phulpagar, B, Dna based cryptography in multi-cloud: Security strategy and analysis. pages 189192, 2014.

N. Hitaswi and K. Chandrasekaran, “A Bio-Inspired Model to Provide Data Security in Cloud Storage”, IEEE, 2016.

Shruti Goyal, Sourabh Jain, “A secure cryptographic cloud communication using DNA cryptographic technique”, ICICT, IEEE, 2016.




How to Cite

Vishwakarma, M. M., & Lilhore, M. U. (2017). Bio Inspired Algorithm for Secure Cloud Storage: A Review. SMART MOVES JOURNAL IJOSCIENCE, 3(9), 13–16.