RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCIE SCOPUS

      DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique = DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique

      한글로보기

      https://www.riss.kr/link?id=A106320340

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      In recent years, a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability is much needed. This study presents a cloud storage framework, wherein a 128-bit encryption key has been generated by combi...

      In recent years, a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability is much needed. This study presents a cloud storage framework, wherein a 128-bit encryption key has been generated by combining deoxyribonucleic acid (DNA) cryptography and the Hill Cipher algorithm to make the framework unbreakable and ensure a better and secured distributed cloud storage environment. Moreover, the study proposes a DNA-based encryption technique, followed by a 256-bit secure socket layer (SSL) to secure data storage. The 256-bit SSL provides secured connections during data transmission. The data herein are classified based on different qualitative security parameters obtained using a specialized fuzzy-based classification technique. The model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers. A fuzzy-based technique for order of preference by similarity to ideal solution (TOPSIS) multi-criteria decision-making (MCDM) model has been employed for this, which can decide on the set of suitable storage servers on which the data must be stored and results in a reduction in execution time by keeping up the level of security to an improved grade.

      더보기

      참고문헌 (Reference)

      1 J. E. Smith, "The architecture of virtual machines" 38 (38): 32-38, 2005

      2 M. Chase, "Structured encryption and controlled disclosure" Springer Berlin Heidelberg 577-594, 2010

      3 H. Takabi, "Securecloud: Towards a comprehensive security framework for cloud computing environments" IEEE 393-398, 2010

      4 A. Majumder, "Secure data communication and cryptography based on DNA based message encoding" IEEE 360-363, 2014

      5 N. Cao, "Privacy-preserving multi-keyword ranked search over encrypted cloud data" 25 (25): 222-233, 2014

      6 Gartner, "Newsroom: Consumers Will Store More Than a Third of Their Digital Content in the Cloud by 2016"

      7 T. L. Saaty, "Multiple criteria decision analysis: state of the art surveys, vol. 78" Springer 345-405, 2005

      8 S. Venkatesan, "Multi-agent based dynamic data integrity protection in cloud computing" Springer Berlin Heidelberg 76-82, 2011

      9 A. Khalifa, "High-capacity DNA-based steganography" IEEE BIO-76-BIO-80, 2012

      10 R. Buyya, "Gridsim : A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing" 14 (14): 1175-1220, 2002

      1 J. E. Smith, "The architecture of virtual machines" 38 (38): 32-38, 2005

      2 M. Chase, "Structured encryption and controlled disclosure" Springer Berlin Heidelberg 577-594, 2010

      3 H. Takabi, "Securecloud: Towards a comprehensive security framework for cloud computing environments" IEEE 393-398, 2010

      4 A. Majumder, "Secure data communication and cryptography based on DNA based message encoding" IEEE 360-363, 2014

      5 N. Cao, "Privacy-preserving multi-keyword ranked search over encrypted cloud data" 25 (25): 222-233, 2014

      6 Gartner, "Newsroom: Consumers Will Store More Than a Third of Their Digital Content in the Cloud by 2016"

      7 T. L. Saaty, "Multiple criteria decision analysis: state of the art surveys, vol. 78" Springer 345-405, 2005

      8 S. Venkatesan, "Multi-agent based dynamic data integrity protection in cloud computing" Springer Berlin Heidelberg 76-82, 2011

      9 A. Khalifa, "High-capacity DNA-based steganography" IEEE BIO-76-BIO-80, 2012

      10 R. Buyya, "Gridsim : A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing" 14 (14): 1175-1220, 2002

      11 C. Wang, "Ensuring data storage security in cloud computing" 1-9, 2009

      12 Q. Wang, "Enabling public auditability and data dynamics for storage security in cloud computing" 22 (22): 847-859, 2011

      13 M. R. Abbasy, "Enabling data hiding for resource sharing in cloud computing environments based on dna sequences" 385-390, 2011

      14 R. Chen, "Dual-server public-key encryption with keyword search for secure cloud storage" 11 (11): 789-798, 2016

      15 L. Pray, "Discovery of DNA structure and function : Watson and Crick" 1 (1): 100-, 2008

      16 N. Kar, "Data security and cryptography based on DNA sequencing" 10 (10): 2013

      17 A. Atito, "DNA-based data encryption and hiding using playfair and insertion techniques" 2 (2): 44-, 2012

      18 S. Marwan, "DNA-based cryptographic methods for data hiding in DNA media" 150 : 110-118, 2016

      19 A. Majumdar, "DNA-based cryptographic approach toward information security" Springer India 209-219, 2014

      20 A. Gehani, "DNA-based Cryptography" 167-188, 1999

      21 S. Pramanik, "DNA cryptography" IEEE 551-554, 2012

      22 X. Wang, "DNA computing-based cryptography" 1-3, 2009

      23 S. Kamara, "Cryptographic cloud storage" Springer Berlin Heidelberg 136-149, 2010

      24 J. Spillner, "Creating optimal cloud storage systems" 29 (29): 1062-1072, 2013

      25 C. Balding, "Cloud Security" 2008

      26 A. T. Velte, "Cloud Computing : A Practical Approach" McGraw-Hill 44-, 2010

      27 H. Cui, "Attribute-based cloud storage with secure provenance over encrypted data" 79 : 461-472, 2018

      28 B. Dong, "An optimized approach for storing and accessing small files on cloud storage" 35 (35): 184-1862, 2012

      29 S. Sadeg, "An encryption algorithm inspired from DNA" IEEE 344-349, 2010

      30 M. Toorani, "A secure variant of the Hill cipher" 313-316, 2009

      31 S. K. Sood, "A secure dynamic identity based authentication protocol for multi-server architecture" 34 (34): 609-618, 2011

      32 Z. Xia, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data" 27 (27): 340-352, 2016

      33 S. K. Sood, "A combined approach to ensure data security in cloud computing" 35 (35): 1831-1838, 2012

      34 P. Prasad, "3 dimensional security in cloud computing" 198-201, 2011

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      학술지등록 한글명 : KSII Transactions on Internet and Information Systems
      외국어명 : KSII Transactions on Internet and Information Systems
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2013-10-01 평가 등재학술지 선정 (기타) KCI등재
      2011-01-01 평가 등재후보학술지 유지 (기타) KCI등재후보
      2009-01-01 평가 SCOPUS 등재 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.45 0.21 0.37
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.32 0.29 0.244 0.03
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼