scholarly journals Securing Data And Information In The Cloud Using Dna And Morse Coding Techniques

2021 ◽  
Vol 23 (11) ◽  
pp. 321-329
Author(s):  
L. Soumya Krishnan ◽  
◽  
Dr.K. Selvakumar ◽  

Cloud computing is a computing strategy that provides services hosted on the Internet to its users/customers. It refers to the computer solutions that are distributed. The cloud allows data to be stored and provides remote access to any work-related data. Enables easy access to cloud computing services at a low cost. Data protection and privacy protection are two major confusions about cloud technology. Various methods have been followed to make data security in the cloud reliable. A two-way DNA encryption algorithm (BDEA) is one such data protection technique. However, the current technology ignores the non-English user of cloud computing and focuses only on the ASCII script. This proposed work focuses on improving BDEA. To increase the security and confidentiality of data in the cloud environment, DNA sequences are used for encryption programs with Morse code. Using Morse code makes it very difficult for an intruder to steal the original data. Theoretical and experimental results show the efficiency of the algorithm, It is also an indication that it can be used in a variety of applications such as security, banking, and medical purposes. The future job is to encrypt color images and videos to upload to the cloud.

2018 ◽  
Vol 7 (2.20) ◽  
pp. 10
Author(s):  
G Geetha ◽  
G Surekha ◽  
P Aditya Sharma ◽  
E Uma Shankari

The primary target of this paper is to provide a secured implementing algorithm for hiding DNA sample sequence data confidently by using special software in cloud computing environments. The suggested algorithm here for hiding DNA sequences is based on binary coding and complementary pairing rules. Hence DNA reference sequence is taken as a sample secret data with a notation of M. But after applying some steps the final result obtained in cloud environment is M’’’. The procedure of identifying or extracting the original data M from the hidden DNA Reference sequence is depended on the user if and only if the user wants to use the data for process. Likewise there are security issues for the manipulating from claiming information. In this way that accessible user’s information arrangement may be isolated under SPs in such a way that it has to reach minimum number of specified threshold SPs number from the whole data block. In this paper, we recommend A low cost secured and multi- cloud storage  (SCMCS) model over cloud computing which holds an prudent appropriation about information Around the accessible SPs in the market, with gatherings gives client information accessibility and additionally secure capacity.  


Web Services ◽  
2019 ◽  
pp. 1393-1410
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A. Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 161
Author(s):  
Shakti Arora ◽  
Surjeet Dalal

Cloud computing is the becoming the architecture information technology of next generation. Cloud computing provides dynamic set of resources for different category of users. Remote access of resources is available on the pay per basis. Cloud is using the storage, computing, infrastructure services according to the requirements. Cloud manages all the user data at distributed level and provides reliability, flexibility and on demand services to user with very low cost. In Now days scenario cloud applications and data over the cloud machines are increasing day by day which indirectly invites different threats for the crucial and sensitive data on cloud. In this paper, we proposed a security model that will give the computational enhancements in different modules data. The different proposed modules: 1) key generation 2) access control strong encryption 4) remote integrity checks. The proposed model enhances t confidentiality, authentication and integrity of data. From the result analysis, it has been concluded that computation and communication overhead are minimized as compared to previous model with higher efficiency achieved.  


2016 ◽  
pp. 2402-2418
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


Author(s):  
Meghan Lynch ◽  
Irena Knezevic ◽  
Kennedy Laborde Ryan

To date, most qualitative knowledge about individual eating patterns and the food environment has been derived from traditional data collection methods, such as interviews, focus groups, and observations. However, there currently exists a large source of nutrition-related data in social media discussions that have the potential to provide opportunities to improve dietetic research and practice. Qualitative social media discussion analysis offers a new tool for dietetic researchers and practitioners to gather insights into how the public discusses various nutrition-related topics. We first consider how social media discussion data come with significant advantages including low-cost access to timely ways to gather insights from the public, while also cautioning that social media data have limitations (e.g., difficulty verifying demographic information). We then outline 3 types of social media discussion platforms in particular: (i) online news article comment sections, (ii) food and nutrition blogs, and (iii) discussion forums. We discuss how each different type of social media offers unique insights and provide a specific example from our own research using each platform. We contend that social media discussions can contribute positively to dietetic research and practice.


BMC Biology ◽  
2019 ◽  
Vol 17 (1) ◽  
Author(s):  
Amrita Srivathsan ◽  
Emily Hartop ◽  
Jayanthi Puniamoorthy ◽  
Wan Ting Lee ◽  
Sujatha Narayanan Kutty ◽  
...  

Abstract Background More than 80% of all animal species remain unknown to science. Most of these species live in the tropics and belong to animal taxa that combine small body size with high specimen abundance and large species richness. For such clades, using morphology for species discovery is slow because large numbers of specimens must be sorted based on detailed microscopic investigations. Fortunately, species discovery could be greatly accelerated if DNA sequences could be used for sorting specimens to species. Morphological verification of such “molecular operational taxonomic units” (mOTUs) could then be based on dissection of a small subset of specimens. However, this approach requires cost-effective and low-tech DNA barcoding techniques because well-equipped, well-funded molecular laboratories are not readily available in many biodiverse countries. Results We here document how MinION sequencing can be used for large-scale species discovery in a specimen- and species-rich taxon like the hyperdiverse fly family Phoridae (Diptera). We sequenced 7059 specimens collected in a single Malaise trap in Kibale National Park, Uganda, over the short period of 8 weeks. We discovered > 650 species which exceeds the number of phorid species currently described for the entire Afrotropical region. The barcodes were obtained using an improved low-cost MinION pipeline that increased the barcoding capacity sevenfold from 500 to 3500 barcodes per flowcell. This was achieved by adopting 1D sequencing, resequencing weak amplicons on a used flowcell, and improving demultiplexing. Comparison with Illumina data revealed that the MinION barcodes were very accurate (99.99% accuracy, 0.46% Ns) and thus yielded very similar species units (match ratio 0.991). Morphological examination of 100 mOTUs also confirmed good congruence with morphology (93% of mOTUs; > 99% of specimens) and revealed that 90% of the putative species belong to the neglected, megadiverse genus Megaselia. We demonstrate for one Megaselia species how the molecular data can guide the description of a new species (Megaselia sepsioides sp. nov.). Conclusions We document that one field site in Africa can be home to an estimated 1000 species of phorids and speculate that the Afrotropical diversity could exceed 200,000 species. We furthermore conclude that low-cost MinION sequencers are very suitable for reliable, rapid, and large-scale species discovery in hyperdiverse taxa. MinION sequencing could quickly reveal the extent of the unknown diversity and is especially suitable for biodiverse countries with limited access to capital-intensive sequencing facilities.


2020 ◽  
Vol 49 (D1) ◽  
pp. D498-D508
Author(s):  
Antje Chang ◽  
Lisa Jeske ◽  
Sandra Ulbrich ◽  
Julia Hofmann ◽  
Julia Koblitz ◽  
...  

Abstract The BRENDA enzyme database (https://www.brenda-enzymes.org), established in 1987, has evolved into the main collection of functional enzyme and metabolism data. In 2018, BRENDA was selected as an ELIXIR Core Data Resource. BRENDA provides reliable data, continuous curation and updates of classified enzymes, and the integration of newly discovered enzymes. The main part contains >5 million data for ∼90 000 enzymes from ∼13 000 organisms, manually extracted from ∼157 000 primary literature references, combined with information of text and data mining, data integration, and prediction algorithms. Supplements comprise disease-related data, protein sequences, 3D structures, genome annotations, ligand information, taxonomic, bibliographic, and kinetic data. BRENDA offers an easy access to enzyme information from quick to advanced searches, text- and structured-based queries for enzyme-ligand interactions, word maps, and visualization of enzyme data. The BRENDA Pathway Maps are completely revised and updated for an enhanced interactive and intuitive usability. The new design of the Enzyme Summary Page provides an improved access to each individual enzyme. A new protein structure 3D viewer was integrated. The prediction of the intracellular localization of eukaryotic enzymes has been implemented. The new EnzymeDetector combines BRENDA enzyme annotations with protein and genome databases for the detection of eukaryotic and prokaryotic enzymes.


Uro ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 39-44
Author(s):  
Mehmet Gürkan Arıkan ◽  
Göktan Altuğ Öz ◽  
Nur Gülce İşkan ◽  
Necdet Süt ◽  
İlkan Yüksel ◽  
...  

There have been few studies reported with conflicting results in the use of neutrophil-lymphocyte ratio (NLR), platelet-lymphocyte ratio (PLR), redcell-distribution-width (RDW), etc. for predicting prognosis and differential diagnosis of adrenal tumors. The aim of this study is to investigate the role of inflammatory markers through a complete blood count, which is an easy access low-cost method, for the differential diagnosis of adrenocortical adenoma (ACA), adrenocortical carcinoma (ACC), and pheochromocytoma. The data of patients who underwent adrenalectomy between the years of 2010–2020 were retrospectively analyzed. Systemic hematologic inflammatory markers based on a complete blood count such as neutrophil ratio (NR), lymphocyte ratio (LR), NLR, PLR, RDW, mean platelet volume (MPV), and maximum tumor diameter (MTD) were compared between the groups. A statistically significant difference was found between the three groups in terms of PLR, RDW, and MTD. With post-hoc tests, a statistically significant difference was found in PLR and MTD between the ACA and ACC groups. A statistically significant difference was found between the ACA and pheochromocytoma groups in PLR and RDW values. In conclusion, it could be possible to plan a more accurate medical and surgical approach using PLR and RDW, which are easily calculated through an easy access low-cost method such as a complete blood count, together with MTD in the differential diagnosis of ACC, ACA, and pheochromocytoma.


Sign in / Sign up

Export Citation Format

Share Document