Please use this identifier to cite or link to this item: https://elib.vku.udn.vn/handle/123456789/2175
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAmisha, Patel-
dc.contributor.authorGe, Zhongyan-
dc.contributor.authorIndra, Seher-
dc.contributor.authorVo, Van Luong-
dc.date.accessioned2022-06-22T03:54:55Z-
dc.date.available2022-06-22T03:54:55Z-
dc.date.issued2021-11-
dc.identifier.citationhttps://doi.org/10.1109/CITISIA53721.2021.9719943vi_VN
dc.identifier.isbn978-1-6654-1784-6-
dc.identifier.urihttp://elib.vku.udn.vn/handle/123456789/2175-
dc.description2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)vi_VN
dc.description.abstractCloud computing is the type of technology preferred to maintain computing power, computer resources, and majorly used to handle the cloud storage process. Also, it helps to manage the data security process during different applications. The data encryption, data classification, and feature extraction approaches are majorly considered for increasing the data security process. The main aim of the work is to review the DNA based cloud computing process for improving data security. The main purpose of this work is to review the current research article focus on the data security and computing process. Further, taxonomy is introduced that helps in the evaluation and analysis process. The secondary research approach is used during review work. Further, the deep learning with sequencing and modification process is reviewed in the work to manage the security and sequence analysis process. In addition, the block-chain-based random technique is reviewed to manage data detection and probability rate. The data optimization and data indexing process with block-chain is preferred to enhance data security and handle the feasibility, accuracy, and transfer time. Moreover, the OPNET model, Dynamic and static model approach, and data access algorithms are used together for maintaining the data mining security process. The IoT network topology and attributes based encryption process are reviewed in developed methods for maintaining data optimization and data security process. These approaches and factors are analyzed with the help of current research articles in order to review the state of the art in the developed method.vi_VN
dc.language.isoenvi_VN
dc.publisherIEEEvi_VN
dc.subjectCloud computingvi_VN
dc.subjectData securityvi_VN
dc.subjectHeuristic algorithmsvi_VN
dc.subjectTaxonomyvi_VN
dc.subjectDNAvi_VN
dc.subjectFeature extractionvi_VN
dc.subjectData modelsvi_VN
dc.titleDNA based service data security in cloud computing environmentvi_VN
dc.typeWorking Papervi_VN
Appears in Collections:NĂM 2021

Files in This Item:

 Sign in to read



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.