DNA computing and table based data accessing in the cloud environment
Tài liệu tham khảo
Adleman, 1994, Molecular computation of solutions to combinatorial problems, Science, 266, 1021, 10.1126/science.7973651
Ajgaonkar, 2015, Activity based access control model for cloud computing, Int. J. Curr. Eng. Technol., 5, 708
Alam, 2017, A cross tenant access control (CTAC) model for cloud computing: formal specification and verification, IEEE Trans. Inf. Forensics Secur., 12, 1259, 10.1109/TIFS.2016.2646639
Alguliyev, 2020, Efficient algorithm for big data clustering on single machine, CAAI Trans. Intell. Technol., 5, 9, 10.1049/trit.2019.0048
Almutairi, 2018, Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters, IEEE Trans. Cloud Comput., 6, 168, 10.1109/TCC.2015.2453981
Apache commons math
Assis, 2020, MultiCloud tournament: a cloud federation approach to prevent Free-Riders by encouraging resource sharing, J. Netw. Comput. Appl., 166
Calheiros, 2011, CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, Software Pract. Ex. (SPE), 41, 23, 10.1002/spe.995
CityPulse dataset collection
Clelland, 1999, Hiding messages in DNA microdots, Nature, 399, 533, 10.1038/21092
Devi, 2020, A boosting-aided adaptive cluster-based undersampling approach for treatment of class imbalance problem, Int. J. Data Warehous. Min. (IJDWM), 16
Ferraiolo, 1992, Role-based access controls, 554
Fu, 2018, Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing, IEEE Trans. Ind. Inf., 14, 4519, 10.1109/TII.2018.2793350
Gao, 2012, A novel data access scheme in cloud computing, 124
Goyal, 2006, Attribute-based encryption for fine-grained access control of encrypted data, 89
Hossain, 2016, Cloud-assisted industrial internet of things (IIoT)-enabled framework for health monitoring, Comput. Network., 101, 192, 10.1016/j.comnet.2016.01.009
Huth, 2011
Java
Kumar, 2020, Multilabel classification of remote sensed satellite imagery, Trans. Emerg. Telecommun. Technol., 10.1002/ett.3988
Li, 2019, Survey on cloud model based similarity measure of uncertain concepts, CAAI Trans. Intell. Technol., 4, 223, 10.1049/trit.2019.0021
Lojka, 2016, Industrial IoT gateway with machine learning for smart manufacturing, 759
Ma, 2020, RCBAC: a risk-aware content-based access control model for large-scale text data, J. Netw. Comput. Appl., 167
Namasudra, 2017, An improved attribute-based encryption technique towards the data security in cloud computing, Concurrency Comput. Pract. Ex.
Namasudra, 2018, Cloud computing: a new era, J. Fund. Appl. Sci., 10, 113
Namasudra, 2020, Data access control in the cloud computing environment for bioinformatics, Int. J. Appl. Res. Bioinf. (IJARB)
Namasudra, 2018
Namasudra, 2016, Secure and efficient data access control in cloud computing environment: a survey, Multiagent Grid Syst. Int. J., 12, 69, 10.3233/MGS-160244
Namasudra, 2017, A new table based protocol for data accessing in cloud computing, J. Inf. Sci. Eng., 33, 585
Namasudra, 2017, Time saving protocol for data accessing in cloud computing, IET Commun., 11, 10.1049/iet-com.2016.0777
Namasudra, 2018, PpBAC: popularity based access control model for cloud computing, J. Organ. End User Comput., 30, 14, 10.4018/JOEUC.2018100102
Namasudra, 2014, Profile based access control model in cloud computing environment, 1
Namasudra, 2017, Cloud computing: fundamentals and research issues
Namasudra, 2017, Data accessing based on the popularity value for cloud computing
Namasudra, 2018, Taxonomy of DNA-based security models, 53
Namasudra, 2018, Security, privacy, trust, and anonymity, 153
Namasudra, 2018, Introduction of DNA computing in cryptography, 27
Namasudra, 2018, Applications and future trends of DNA computing
Namasudra, 2020, The Revolution of blockchain: state-of-the-art and research challenges, Arch. Comput. Methods Eng., 10.1007/s11831-020-09426-0
Namasudra, 2020, FAST: fast accessing scheme for data transmission in cloud computing, Peer-to-Peer Network. Appl., 10.1007/s12083-020-00959-6
Namasudra, 2020, Towards DNA based data security in the cloud computing environment, Comput. Commun., 151, 539, 10.1016/j.comcom.2019.12.041
Namasudra, 2020, Securing multimedia by using DNA based encryption in the cloud computing environment, ACM Trans. Multimed Comput. Commun. Appl., 10.1145/3392665
Raghavendra, 2016, Index generation and secure multi-user access control over an encrypted cloud data, Procedia Comput. Sci., 89, 293, 10.1016/j.procs.2016.06.062
Sajid, 2016, Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges, IEEE Access, 4, 1375, 10.1109/ACCESS.2016.2549047
Sarkar, 2015, An efficient and time saving web service based android application, SSRG Int. J. Comput. Sci. Eng., 2, 18
Sheela, 2017, A novel audio cryptosystem using chaotic maps and DNA encoding, J. Comput. Netw. Commun., 2017, 1, 10.1155/2017/2721910
Tanaka, 2005, Public-key system using DNA as a one-way function for key distribution, Biosystems, 81, 25, 10.1016/j.biosystems.2005.01.004
Thaseen, 2020, An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network, Trans. Emerg. Telecommun. Technol.
Tripura, 2017, Flow forecasting in multiple sections of a river system, KSCE J. Civ. Eng., 21, 512, 10.1007/s12205-017-1514-9
Tripura, 2018, Application of RBFNNs incorporating MIMO processes for simultaneous river flow forecasting, J. Eng. Technol. Sci., 50, 434, 10.5614/j.eng.technol.sci.2018.50.3.9
Tripura, 2020, Simultaneous streamflow forecasting based on hybridized neuro-fuzzy method for a river system, Neural Comput. Appl., 10.1007/s00521-020-05194-x
Tuncer, 2016, A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images, Displays, 41, 1, 10.1016/j.displa.2015.10.005
Wan, 2012, HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing, IEEE Trans. Inf. Forensics Secur., 7, 743, 10.1109/TIFS.2011.2172209
Wang, 2017, Reversible data hiding based on DNA computing, Comput. Intell. Neurosci., 10.1155/2017/7276084
Wang, 2018, A new image encryption algorithm based on CML and DNA sequence, IEEE Access, 6, 62272, 10.1109/ACCESS.2018.2875676
Wang, 2019, Toward cloud-assisted industrial IoT platform for large-scale continuous condition monitoring, Proc. IEEE, 107, 1193, 10.1109/JPROC.2019.2914021
Wang, 2019, Hiding messages based on DNA sequence and recombinant DNA technique, IEEE Trans. Nanotechnol., 18, 299, 10.1109/TNANO.2019.2904842
Xie, 2019, A modified hierarchical attribute-based encryption access control method for mobile cloud computing, IEEE Trans. Cloud Comput., 7, 383, 10.1109/TCC.2015.2513388
Zhao, 2019, Advances on QoS-aware web service selection and composition with nature-inspired computing, CAAI Trans. Intell. Technol., 4, 159, 10.1049/trit.2019.0018