2021
DOI: 10.1016/j.ijin.2021.03.001
|View full text |Cite
|
Sign up to set email alerts
|

A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 47 publications
(23 citation statements)
references
References 15 publications
0
21
0
2
Order By: Relevance
“…Thabit et al [3] proposed an algorithm based on genetics techniques and logic-mathematical functions to ensure security, integrity, and authorized access using various methods such as "deoxyribonucleic acid" (DNA) in Cloud Computing. The algorithm used Shannon's theory of diffusion and disorientation with feudal and substitution architecture methods which include logical processes that improve the complexity of cryptography [3].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Thabit et al [3] proposed an algorithm based on genetics techniques and logic-mathematical functions to ensure security, integrity, and authorized access using various methods such as "deoxyribonucleic acid" (DNA) in Cloud Computing. The algorithm used Shannon's theory of diffusion and disorientation with feudal and substitution architecture methods which include logical processes that improve the complexity of cryptography [3].…”
Section: Related Workmentioning
confidence: 99%
“…Cloud services commonly used are Software as a Service (SaaS), which is a way of delivering applications over the Internet as a service. The service provider manages access to the application, including security, availability, and performance [1][2][3][4][5]. The second one is Infrastructure as a Service (IaaS), which is a standardized, highly automated offering in which computing resources owned by a service provider, complemented by storage and networking capabilities, are offered to customers on demand.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Any encryption system has specific security conditions, which are authentication, privacy and confidentiality, and integrity [7]. Advanced encryption standard (AES) [8], data encryption standard (DES) [9], Rivest cipher 4 (RC4) [10], Rivest-Shamir-Adleman (RSA) [11], and other cryptographic algorithms are among the most widely used today. Meanwhile, steganography is a method of hiding secret data using a cover image in a way that does not invite suspicion or draw attention and is not understood by intruders and attackers.…”
Section: Introductionmentioning
confidence: 99%
“…In [3], a novel variant ofcryptography mechanisms were designed with the objective of increasing the cloud computing security with the aid of two distinct layers. Thefirst layer was designed based on the Shannon's theory of diffusion that in turn with split the actual plaintext and key into equal portions.…”
Section: Introductionmentioning
confidence: 99%