Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Title | Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Hammami, Hamza, Brahmi, Hanen, Ben Yahia, Sadok |
Conference Name | 2018 International Conference on Information Networking (ICOIN) |
Date Published | jan |
ISBN Number | 978-1-5386-2290-2 |
Keywords | cloud computing, cloud computing paradigm, cloud computing technology, cloud provider, cloud service providers, completely secure migration, confidentiality, cryptography, data center, DNA, DNA cryptography, encoding, Encryption, Human Behavior, integrity, intensive data computing, Internet service, Metrics, outsourcing, privacy, private data, protection, pubcrawl, resilience, Resiliency, secured outsourcing, security, security schema, security solution, storage, Trust |
Abstract | Cloud computing denotes an IT infrastructure where data and software are stored and processed remotely in a data center of a cloud provider, which are accessible via an Internet service. This new paradigm is increasingly reaching the ears of companies and has revolutionized the marketplace of today owing to several factors, in particular its cost-effective architectures covering transmission, storage and intensive data computing. However, like any new technology, the cloud computing technology brings new problems of security, which represents the main restrain on turning to this paradigm. For this reason, users are reluctant to resort to the cloud because of security and protection of private data as well as lack of trust in cloud service providers. The work in this paper allows the readers to familiarize themselves with the field of security in the cloud computing paradigm while suggesting our contribution in this context. The security schema we propose allowing a distant user to ensure a completely secure migration of all their data anywhere in the cloud through DNA cryptography. Carried out experiments showed that our security solution outperforms its competitors in terms of integrity and confidentiality of data. |
URL | https://ieeexplore.ieee.org/document/8343079 |
DOI | 10.1109/ICOIN.2018.8343079 |
Citation Key | hammami_secured_2018 |
- intensive data computing
- trust
- storage
- security solution
- security schema
- security
- secured outsourcing
- Resiliency
- resilience
- pubcrawl
- protection
- private data
- privacy
- outsourcing
- Metrics
- Internet service
- Cloud Computing
- integrity
- Human behavior
- encryption
- encoding
- DNA cryptography
- DNA
- data center
- Cryptography
- confidentiality
- completely secure migration
- cloud service providers
- cloud provider
- cloud computing technology
- cloud computing paradigm