Abstract
The crucial threats and challenges prevailing in cloud computing are privacy and security. The main reason for these challenges encountered in cloud computing is its multi-tenancy nature and the subcontracting of infrastructures. Cloud services are widely recognized and approved in enterprises, educational institutions and government organizations for their businesses. In order to provide reliable, secure cloud services and enhance cloud services, enterprises should develop security in their businesses and should select pertinent vendor for their computing needs. Traditional cryptography computing models are not completely suitable for protecting cloud-based computing. Membrane computing, on the other hand, provides an explicit notion of region, namely the space enclosed by membranes.
Similar content being viewed by others
References
Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Science 266(5187):1021–1024
Gehani A, LaBean T, Reif J (2000) DNA-based cryptography. Dismacs Ser Discret Math Theor Comput Sci 54:233–349
Lipton RJ (1995) DNA solution of hard computational problems. Science 268(5210):542–545
Boneh D, Dunworth C, Lipton RJ (1995) Breaking DES using a molecular computer. DIMACS Workshop DNA Comput 27:37–51
MingXin L, XueJia L, GuoZhen X, Lei Q (2007) Symmetric-key cryptosystem with DNA technology. Sci China Ser F Inf Sci 50(3):324–333
P˘aun G (2002) Membrane computing: an introduction. Springer, Berlin
Yu J, Thomson JA (2008) Pluripotent stem cell lines. Genes Dev 22(15):1987–1997
Teuscher C (2004) Amorphous membrane blending: from regular to irregular cellular computing machines. PhD Thesis, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland
Teuscher C (2005) Outlining an unconventional, adaptive, and particle-based reconfigurable computer architecture. In: Banâtre JP et al (eds) UPP 2004. Volume 3566 of Lecture notes in computer science. Springer, pp 231–246
Teuscher C (2006) From membranes to systems: self-configuration and self-replication in membrane systems. BioSystems 87(2–3):101–110
Jong KD (2006) Evolutionary computation: a unified approach. MIT Press, Cambridge
Kaeo M (2004) Designing network security, 2nd edn. Cisco Press, Indianapolis
Kari L, Rozenberg G (2008) The many facets of natural computing. Commun ACM 51:72–83
Paun G (2000) Computing with membranes. J Comput Syst Sci 61(1):108–143
Suresh A, Kumar R, Varatharajan R (2018) Health care data analysis using evolutionary algorithm. J Supercomput. https://doi.org/10.1007/s11227018-2302-0
Bell Gordon, Hey Tony, Szalay Alex (2009) Beyond the data deluge. Science 323(5919):1297–1298
Bhatia T, Verma AK (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J Supercomput 73:2558. https://doi.org/10.1007/s11227-016-1945-y
Rizvi S, Ryoo J, Kissell J et al (2017) A security evaluation framework for cloud security auditing. J Supercomput. https://doi.org/10.1007/s11227-017-2055-1
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Maharajan, K., Paramasivan, B. Membrane computing inspired protocol to enhance security in cloud network. J Supercomput 75, 2181–2192 (2019). https://doi.org/10.1007/s11227-018-2629-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-018-2629-6