DNA computing and table based data accessing in the cloud environment

Journal of Network and Computer Applications - Tập 172 - Trang 102835 - 2020
Suyel Namasudra1, Suraj Sharma2, Ganesh Chandra Deka3, Pascal Lorenz4
1Department of Computer Science and Engineering, National Institute of Technology Patna, Bihar, India
2Department of Computer Science and Engineering, IIIT Bhubaneswar, Odisha, India
3Ministry of Skill Development and Entrepreneurship, Government of India, New Delhi, India
4University of Haute-Alsace, Colmar, France

Tài liệu tham khảo

Adleman, 1994, Molecular computation of solutions to combinatorial problems, Science, 266, 1021, 10.1126/science.7973651 Ajgaonkar, 2015, Activity based access control model for cloud computing, Int. J. Curr. Eng. Technol., 5, 708 Alam, 2017, A cross tenant access control (CTAC) model for cloud computing: formal specification and verification, IEEE Trans. Inf. Forensics Secur., 12, 1259, 10.1109/TIFS.2016.2646639 Alguliyev, 2020, Efficient algorithm for big data clustering on single machine, CAAI Trans. Intell. Technol., 5, 9, 10.1049/trit.2019.0048 Almutairi, 2018, Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters, IEEE Trans. Cloud Comput., 6, 168, 10.1109/TCC.2015.2453981 Apache commons math Assis, 2020, MultiCloud tournament: a cloud federation approach to prevent Free-Riders by encouraging resource sharing, J. Netw. Comput. Appl., 166 Calheiros, 2011, CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, Software Pract. Ex. (SPE), 41, 23, 10.1002/spe.995 CityPulse dataset collection Clelland, 1999, Hiding messages in DNA microdots, Nature, 399, 533, 10.1038/21092 Devi, 2020, A boosting-aided adaptive cluster-based undersampling approach for treatment of class imbalance problem, Int. J. Data Warehous. Min. (IJDWM), 16 Ferraiolo, 1992, Role-based access controls, 554 Fu, 2018, Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing, IEEE Trans. Ind. Inf., 14, 4519, 10.1109/TII.2018.2793350 Gao, 2012, A novel data access scheme in cloud computing, 124 Goyal, 2006, Attribute-based encryption for fine-grained access control of encrypted data, 89 Hossain, 2016, Cloud-assisted industrial internet of things (IIoT)-enabled framework for health monitoring, Comput. Network., 101, 192, 10.1016/j.comnet.2016.01.009 Huth, 2011 Java Kumar, 2020, Multilabel classification of remote sensed satellite imagery, Trans. Emerg. Telecommun. Technol., 10.1002/ett.3988 Li, 2019, Survey on cloud model based similarity measure of uncertain concepts, CAAI Trans. Intell. Technol., 4, 223, 10.1049/trit.2019.0021 Lojka, 2016, Industrial IoT gateway with machine learning for smart manufacturing, 759 Ma, 2020, RCBAC: a risk-aware content-based access control model for large-scale text data, J. Netw. Comput. Appl., 167 Namasudra, 2017, An improved attribute-based encryption technique towards the data security in cloud computing, Concurrency Comput. Pract. Ex. Namasudra, 2018, Cloud computing: a new era, J. Fund. Appl. Sci., 10, 113 Namasudra, 2020, Data access control in the cloud computing environment for bioinformatics, Int. J. Appl. Res. Bioinf. (IJARB) Namasudra, 2018 Namasudra, 2016, Secure and efficient data access control in cloud computing environment: a survey, Multiagent Grid Syst. Int. J., 12, 69, 10.3233/MGS-160244 Namasudra, 2017, A new table based protocol for data accessing in cloud computing, J. Inf. Sci. Eng., 33, 585 Namasudra, 2017, Time saving protocol for data accessing in cloud computing, IET Commun., 11, 10.1049/iet-com.2016.0777 Namasudra, 2018, PpBAC: popularity based access control model for cloud computing, J. Organ. End User Comput., 30, 14, 10.4018/JOEUC.2018100102 Namasudra, 2014, Profile based access control model in cloud computing environment, 1 Namasudra, 2017, Cloud computing: fundamentals and research issues Namasudra, 2017, Data accessing based on the popularity value for cloud computing Namasudra, 2018, Taxonomy of DNA-based security models, 53 Namasudra, 2018, Security, privacy, trust, and anonymity, 153 Namasudra, 2018, Introduction of DNA computing in cryptography, 27 Namasudra, 2018, Applications and future trends of DNA computing Namasudra, 2020, The Revolution of blockchain: state-of-the-art and research challenges, Arch. Comput. Methods Eng., 10.1007/s11831-020-09426-0 Namasudra, 2020, FAST: fast accessing scheme for data transmission in cloud computing, Peer-to-Peer Network. Appl., 10.1007/s12083-020-00959-6 Namasudra, 2020, Towards DNA based data security in the cloud computing environment, Comput. Commun., 151, 539, 10.1016/j.comcom.2019.12.041 Namasudra, 2020, Securing multimedia by using DNA based encryption in the cloud computing environment, ACM Trans. Multimed Comput. Commun. Appl., 10.1145/3392665 Raghavendra, 2016, Index generation and secure multi-user access control over an encrypted cloud data, Procedia Comput. Sci., 89, 293, 10.1016/j.procs.2016.06.062 Sajid, 2016, Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges, IEEE Access, 4, 1375, 10.1109/ACCESS.2016.2549047 Sarkar, 2015, An efficient and time saving web service based android application, SSRG Int. J. Comput. Sci. Eng., 2, 18 Sheela, 2017, A novel audio cryptosystem using chaotic maps and DNA encoding, J. Comput. Netw. Commun., 2017, 1, 10.1155/2017/2721910 Tanaka, 2005, Public-key system using DNA as a one-way function for key distribution, Biosystems, 81, 25, 10.1016/j.biosystems.2005.01.004 Thaseen, 2020, An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network, Trans. Emerg. Telecommun. Technol. Tripura, 2017, Flow forecasting in multiple sections of a river system, KSCE J. Civ. Eng., 21, 512, 10.1007/s12205-017-1514-9 Tripura, 2018, Application of RBFNNs incorporating MIMO processes for simultaneous river flow forecasting, J. Eng. Technol. Sci., 50, 434, 10.5614/j.eng.technol.sci.2018.50.3.9 Tripura, 2020, Simultaneous streamflow forecasting based on hybridized neuro-fuzzy method for a river system, Neural Comput. Appl., 10.1007/s00521-020-05194-x Tuncer, 2016, A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images, Displays, 41, 1, 10.1016/j.displa.2015.10.005 Wan, 2012, HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing, IEEE Trans. Inf. Forensics Secur., 7, 743, 10.1109/TIFS.2011.2172209 Wang, 2017, Reversible data hiding based on DNA computing, Comput. Intell. Neurosci., 10.1155/2017/7276084 Wang, 2018, A new image encryption algorithm based on CML and DNA sequence, IEEE Access, 6, 62272, 10.1109/ACCESS.2018.2875676 Wang, 2019, Toward cloud-assisted industrial IoT platform for large-scale continuous condition monitoring, Proc. IEEE, 107, 1193, 10.1109/JPROC.2019.2914021 Wang, 2019, Hiding messages based on DNA sequence and recombinant DNA technique, IEEE Trans. Nanotechnol., 18, 299, 10.1109/TNANO.2019.2904842 Xie, 2019, A modified hierarchical attribute-based encryption access control method for mobile cloud computing, IEEE Trans. Cloud Comput., 7, 383, 10.1109/TCC.2015.2513388 Zhao, 2019, Advances on QoS-aware web service selection and composition with nature-inspired computing, CAAI Trans. Intell. Technol., 4, 159, 10.1049/trit.2019.0018