Visible to the public Managing Information and Network Security using Chaotic Bio Molecular Computing Technique

TitleManaging Information and Network Security using Chaotic Bio Molecular Computing Technique
Publication TypeConference Paper
Year of Publication2022
AuthorsAl-Qanour, Fahd bin Abdullah, Rajeyyagari, Sivaram
Conference Name2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS)
KeywordsBio Molecular, chaotic cryptography, Chaotic Key series, Costs, DNA, Metrics, molecular computing, Network security, Organizations, privacy, pubcrawl, resilience, Resiliency, Scalability, Software
AbstractRequirement Elicitation is a key phase in software development. The fundamental goal of security requirement elicitation is to gather appropriate security needs and policies from stakeholders or organizations. The majority of systems fail due to incorrect elicitation procedures, affecting development time and cost. Security requirement elicitation is a major activity of requirement engineering that requires the attention of developers and other stakeholders. To produce quality requirements during software development, the authors suggested a methodology for effective requirement elicitation. Many challenges surround requirement engineering. These concerns can be connected to scope, preconceptions in requirements, etc. Other difficulties include user confusion over technological specifics, leading to confusing system aims. They also don't realize that the requirements are dynamic and prone to change. To protect the privacy of medical images, the proposed image cryptosystem uses a CCM-generated chaotic key series to confuse and diffuse them. A hexadecimal pre-processing technique is used to increase the security of color images utilising a hyper chaos-based image cryptosystem. Finally, a double-layered security system for biometric photos is built employing chaos and DNA cryptography.
NotesISSN: 2768-5330
DOI10.1109/ICICCS53718.2022.9788181
Citation Keyal-qanour_managing_2022