Skip to main content
Log in

Membrane computing inspired protocol to enhance security in cloud network

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The crucial threats and challenges prevailing in cloud computing are privacy and security. The main reason for these challenges encountered in cloud computing is its multi-tenancy nature and the subcontracting of infrastructures. Cloud services are widely recognized and approved in enterprises, educational institutions and government organizations for their businesses. In order to provide reliable, secure cloud services and enhance cloud services, enterprises should develop security in their businesses and should select pertinent vendor for their computing needs. Traditional cryptography computing models are not completely suitable for protecting cloud-based computing. Membrane computing, on the other hand, provides an explicit notion of region, namely the space enclosed by membranes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Science 266(5187):1021–1024

    Article  Google Scholar 

  2. Gehani A, LaBean T, Reif J (2000) DNA-based cryptography. Dismacs Ser Discret Math Theor Comput Sci 54:233–349

    Article  MathSciNet  MATH  Google Scholar 

  3. Lipton RJ (1995) DNA solution of hard computational problems. Science 268(5210):542–545

    Article  Google Scholar 

  4. Boneh D, Dunworth C, Lipton RJ (1995) Breaking DES using a molecular computer. DIMACS Workshop DNA Comput 27:37–51

    MathSciNet  Google Scholar 

  5. MingXin L, XueJia L, GuoZhen X, Lei Q (2007) Symmetric-key cryptosystem with DNA technology. Sci China Ser F Inf Sci 50(3):324–333

    Article  MATH  Google Scholar 

  6. P˘aun G (2002) Membrane computing: an introduction. Springer, Berlin

    Book  Google Scholar 

  7. Yu J, Thomson JA (2008) Pluripotent stem cell lines. Genes Dev 22(15):1987–1997

    Article  Google Scholar 

  8. Teuscher C (2004) Amorphous membrane blending: from regular to irregular cellular computing machines. PhD Thesis, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland

  9. Teuscher C (2005) Outlining an unconventional, adaptive, and particle-based reconfigurable computer architecture. In: Banâtre JP et al (eds) UPP 2004. Volume 3566 of Lecture notes in computer science. Springer, pp 231–246

  10. Teuscher C (2006) From membranes to systems: self-configuration and self-replication in membrane systems. BioSystems 87(2–3):101–110

    Google Scholar 

  11. Jong KD (2006) Evolutionary computation: a unified approach. MIT Press, Cambridge

    MATH  Google Scholar 

  12. Kaeo M (2004) Designing network security, 2nd edn. Cisco Press, Indianapolis

    Google Scholar 

  13. Kari L, Rozenberg G (2008) The many facets of natural computing. Commun ACM 51:72–83

    Article  Google Scholar 

  14. Paun G (2000) Computing with membranes. J Comput Syst Sci 61(1):108–143

    Article  MathSciNet  MATH  Google Scholar 

  15. Suresh A, Kumar R, Varatharajan R (2018) Health care data analysis using evolutionary algorithm. J Supercomput. https://doi.org/10.1007/s11227018-2302-0

    Google Scholar 

  16. Bell Gordon, Hey Tony, Szalay Alex (2009) Beyond the data deluge. Science 323(5919):1297–1298

    Article  Google Scholar 

  17. Bhatia T, Verma AK (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J Supercomput 73:2558. https://doi.org/10.1007/s11227-016-1945-y

    Article  Google Scholar 

  18. Rizvi S, Ryoo J, Kissell J et al (2017) A security evaluation framework for cloud security auditing. J Supercomput. https://doi.org/10.1007/s11227-017-2055-1

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Maharajan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maharajan, K., Paramasivan, B. Membrane computing inspired protocol to enhance security in cloud network. J Supercomput 75, 2181–2192 (2019). https://doi.org/10.1007/s11227-018-2629-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2629-6

Keywords

Navigation