当前位置: X-MOL 学术Cybern. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
Cybernetics and Systems ( IF 1.7 ) Pub Date : 2023-02-15 , DOI: 10.1080/01969722.2023.2175117
Ozgu Can 1 , Fursan Thabit 1, 2 , Asia Othman Aljahdali 3 , Sharaf Al-Homdy 2 , Hoda A. Alkhzaimi 4
Affiliation  

Abstract

Cloud computing has revolutionized the world, opening up new horizons with bright potential due to its performance, accessibility, low cost, and many other benefits. Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computational power. Cloud computing refers to data centers accessible to numerous customers over the Internet. It has the ability to utilize computing resources at a low cost and fast speed. Cloud data security is becoming increasingly important as we shift our devices, data centers, business processes, and other assets to the cloud. Comprehensive security policies, corporate security culture, and cloud security solutions are used to ensure the level of cloud data security. Many techniques exist to protect data communication in the cloud environment, including encryption, which is the primary component of data security and the mechanism by which data or message transmission confidentiality and integrity are achieved. Current researchers have focused on genetics-based cryptography; genetics has been implemented in cryptography for data computation, storage, and transmission. This survey paper analyzes the new type of cryptographic approaches based on genetic science to generate robust sub-keys and robust cryptographic techniques based on homologous genetics (DNA, RNA, and mRNA) to improve security in the cloud. This work reviews several approaches based on genetic cryptography and their applications and drawbacks. In addition, the paper introduces the architecture of cloud computing along with the fundamental challenges of cloud computing applications.



中文翻译:

云计算数据安全遗传密码算法综合文献

摘要

云计算已经彻底改变了世界,凭借其性能、可访问性、低成本和许多其他优势开辟了具有光明潜力的新视野。云计算是计算机系统资源,特别是数据存储(云存储)和计算能力的按需可用性。云计算是指众多客户可以通过 Internet 访问的数据中心。它具有以低成本和快速利用计算资源的能力。随着我们将设备、数据中心、业务流程和其他资产转移到云端,云数据安全变得越来越重要。全面的安全策略、企业安全文化、云安全解决方案,保障云数据安全等级。存在许多技术来保护云环境中的数据通信,包括加密,它是数据安全的主要组成部分,也是实现数据或消息传输机密性和完整性的机制。目前的研究人员专注于基于遗传学的密码学;遗传学已在密码学中实现,用于数据计算、存储和传输。本调查报告分析了基于遗传科学的新型密码方法,以生成稳健的子密钥和基于同源遗传学(DNA、RNA 和 mRNA)的稳健密码技术,以提高云中的安全性。这项工作回顾了几种基于遗传密码学的方法及其应用和缺点。此外,本文还介绍了云计算的体系结构以及云计算应用程序面临的基本挑战。这是数据安全的主要组成部分,也是实现数据或消息传输机密性和完整性的机制。目前的研究人员专注于基于遗传学的密码学;遗传学已在密码学中实现,用于数据计算、存储和传输。本调查报告分析了基于遗传科学的新型密码方法,以生成稳健的子密钥和基于同源遗传学(DNA、RNA 和 mRNA)的稳健密码技术,以提高云中的安全性。这项工作回顾了几种基于遗传密码学的方法及其应用和缺点。此外,本文还介绍了云计算的体系结构以及云计算应用程序面临的基本挑战。这是数据安全的主要组成部分,也是实现数据或消息传输机密性和完整性的机制。目前的研究人员专注于基于遗传学的密码学;遗传学已在密码学中实现,用于数据计算、存储和传输。本调查报告分析了基于遗传科学的新型密码方法,以生成稳健的子密钥和基于同源遗传学(DNA、RNA 和 mRNA)的稳健密码技术,以提高云中的安全性。这项工作回顾了几种基于遗传密码学的方法及其应用和缺点。此外,本文还介绍了云计算的体系结构以及云计算应用程序面临的基本挑战。

更新日期:2023-02-15
down
wechat
bug