Enabling Data Hiding for Resource Sharing in Cloud Computing
#1

Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences



.pdf   Enabling Data Hiding for Resource Sharing in Cloud Computing.pdf (Size: 628.93 KB / Downloads: 1)

INTRODUCTION

In order to protect data through the unsecure networks
like the Internet, using various types of data protection is
necessary. With advent of Cloud Computing idea, a
common problem, confidentiality of data, was emerged [19,
20, 21, 22, and 23]. Thus, to solve the raised difficulty,
combining different ideas can help to achieve an acceptable
level of confidentiality in Cloud Computing environments.
One of the famous ways to protect data through the
Internet is data hiding. Because of the increasing number of
Internet users, utilizing data hiding or Steganographic
techniques is inevitable. Eliminating the role of the intruder
and authorizing the clients are eventual goals of these
techniques.


RELATED WORKS

For the purpose of clarifying the algorithm in current
paper, introducing some backgrounds of the knowledge is
necessary [8, 11, 12, and 13]. The most important part of
each DNA base data hiding algorithm is, manipulating four
letters which has been called as nucleotides in biology. The
letters are A, C, G, and T.
Any composition from them will make a sequence. For
instance, two DNA sequences have been appeared in [16].
They mentioned sequences from European Bioinformatics
Institute (which is known as EBI Database) [15] for the
purpose of extracting DNA sequences of Litmus and
Balsaminaceae. So, Litmus with 154 nucleotides and
Balsaminaceae with 2283 are shown in below, respectively:


PROPOSED METHOD

In our method, there is a cloud environment and its
clients in a same company. The clients (client1 and client 2)
want to upload data on cloud in such a manner that
confidentiality of data be in highest point. Therefore, the
clients need to employ a method to increase the level of
confidentiality of data so that no one can see data when
someone intentionally or unintentionally accessed to them.
In figure 3, we demonstrate the flow of data as well as the
flow data hiding method by describing the method.


CONCLUSION
One of basic problem in cloud computing environments
is data confidentiality. Considering DNA characteristics
brings new ideas in data hiding in order to increase the level
of data confidentiality among clients. DNA sequences are
potential to implement new data hiding techniques or even
transforming previous schemes to new one. In this paper, a
reference DNA sequence has been shared among clients.
Not only this DNA reference sequence can be retrieved
from EBI [15] or NCBI [14] databases but it can also be
simply selected from any databases. Therefore, by
considering any sort of database, there are 163 million
targets to select it. Guessing the correct DNA sequence by
attacker is virtually unachievable.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: resource provisioning in cloud computing projects code, extending grids with cloud resource management for scientific computing paper, optimization of resource provisioning cost in cloud computing, download extending grids with cloud resource management for scientific computing, data sharing db2, enabling data hiding for resources sharing in cloud computing environment based on dna sequence, resource sharing on seminar report,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  HUMAN RESOURCE MANAGEMENT(HRM) seminar addict 3 4,068 07-04-2015, 11:59 AM
Last Post: Kishore1
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,508 25-08-2014, 05:40 PM
Last Post: Guest
  Human Resource Planning at WIPRO seminar details 2 4,135 23-09-2013, 11:24 AM
Last Post: computer topic
  Water resource management smart paper boy 1 4,231 04-02-2013, 03:46 PM
Last Post: seminar details
  virtual network computing seminar addict 1 1,367 12-12-2012, 02:07 PM
Last Post: seminar details
  SECURE DATA TRANSMISSION USING STEGANOGRAPHY seminar paper 1 1,905 24-11-2012, 01:35 PM
Last Post: seminar details
  Hiding Sensitive Association Rules with Limited Side Effects seminar paper 1 1,358 19-11-2012, 12:21 PM
Last Post: seminar details
  Data Communication and Networking seminar paper 1 3,327 16-11-2012, 12:36 PM
Last Post: seminar details
  Introduction to data structures seminar details 1 3,346 29-10-2012, 12:42 PM
Last Post: seminar details
  Power System Fault Analysis using Fault Reporting Data full report seminar details 1 846 05-10-2012, 04:02 PM
Last Post: seminar details

Forum Jump: