Academic literature on the topic 'DNA-based secure data storage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'DNA-based secure data storage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "DNA-based secure data storage"
P., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya, and Mahesh U. Patil. "Secure Storage of Data on Android Based Devices." International Journal of Engineering and Technology 8, no. 3 (March 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v6.880.
Full textP., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya, and Mahesh U. Patil. "Secure Storage of Data on Android Based Devices." International Journal of Engineering and Technology 8, no. 3 (March 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v8.880.
Full textChen, Kaikai, Jinbo Zhu, Filip Bošković, and Ulrich F. Keyser. "Nanopore-Based DNA Hard Drives for Rewritable and Secure Data Storage." Nano Letters 20, no. 5 (March 30, 2020): 3754–60. http://dx.doi.org/10.1021/acs.nanolett.0c00755.
Full textManimekalai, R., and M. Chandra Kumar Peter. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 252–54. http://dx.doi.org/10.31142/ijtsrd13014.
Full textS, Rajasekaran, Kalifulla Y, Murugesan S, Ezhilvendan M, and Gunasekaran J. "Authentication Based Cloud Storage and Secure Data Forwarding." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (February 1, 2013): 106–10. http://dx.doi.org/10.24297/ijct.v4i1b.3068.
Full textGo, Woong, and Jin Kwak. "Dual server-based secure data-storage system for cloud storage." International Journal of Engineering Systems Modelling and Simulation 6, no. 1/2 (2014): 86. http://dx.doi.org/10.1504/ijesms.2014.058428.
Full textChenchen Han, Chenchen Han, Gwang-Jun Kim Chenchen Han, Osama Alfarraj Gwang-Jun Kim, Amr Tolba Osama Alfarraj, and Yongjun Ren Amr Tolba. "ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT." 網際網路技術學刊 23, no. 2 (March 2022): 289–95. http://dx.doi.org/10.53106/160792642022032302009.
Full textYuliang Shi, Kun Zhang, and Qingzhong Li. "Meta-data Driven Data Chunk Based Secure Data Storage for SaaS." International Journal of Digital Content Technology and its Applications 5, no. 1 (January 31, 2011): 173–85. http://dx.doi.org/10.4156/jdcta.vol5.issue1.18.
Full textHsiao-Ying Lin and Wen-Guey Tzeng. "A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding." IEEE Transactions on Parallel and Distributed Systems 23, no. 6 (June 2012): 995–1003. http://dx.doi.org/10.1109/tpds.2011.252.
Full textJaved, Muhammad Umar, Mubariz Rehman, Nadeem Javaid, Abdulaziz Aldegheishem, Nabil Alrajeh, and Muhammad Tahir. "Blockchain-Based Secure Data Storage for Distributed Vehicular Networks." Applied Sciences 10, no. 6 (March 16, 2020): 2011. http://dx.doi.org/10.3390/app10062011.
Full textDissertations / Theses on the topic "DNA-based secure data storage"
Yu, Shucheng. "Data Sharing on Untrusted Storage with Attribute-Based Encryption." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/321.
Full textMészáros, István. "Distributed P2P Data Backup System." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236378.
Full textSharma, Munish. "SHARIF: Solid Pod based Secured Healthcare Information Storage and Exchange Solution." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105147.
Full textGermishuizen, Willem Andreas. "Dielectrophoresis as an addressing mechanism in a novel data storage system based on DNA." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615680.
Full textFramner, Erik. "A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.
Full textPRISMACLOUD
Camerlengo, Terry Luke. "Techniques for Storing and Processing Next-Generation DNA Sequencing Data." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1388502159.
Full textShi, Peihan, and 施姵含. "Security Mechanisms for Cloud Data Storage based on Bitemporal Database and Secret Sharing." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/34059819805318604766.
Full text中國文化大學
資訊安全產業研發碩士專班
100
In recent years, cloud computing is not only a technical issue but also a popular commercial issue. It supplies services as well as resources through the Internet. Though cloud computing brings a lot of convenience, some people have doubt about its security. This study focuses on data and accounts protection on the cloud. We proposed security mechanisms to improve confidentiality, integrity, authentication, access control and audit in the cloud. The proposed security mechanisms are divided into two parts. The first part is for security of data storage, which combines the concept of RAID 5 with secret sharing. The second part is for account protection, which stores two time dimensions to make use of bitemporal databases. Before being uploaded, data are split using of the first part mechanisms. Even if someone steals some data, he couldn’t read and use them. The first part mechanisms will achieve confidentiality and integrity. When consumers perform some actions on cloud bitemporal databases, corresponding transaction times will be recorded and checked with their valid times. Thus we can audit consumers’ transactions. Herewith the second part mechanisms will achieve authentication, access control and auditing. Therefore, the security mechanisms can secure data and protect accounts.
Book chapters on the topic "DNA-based secure data storage"
Wang, Yuhua, Xin Tang, Yiteng Zhou, Xiguang Chen, and Yudan Zhu. "Blockchain-Based Integrity Auditing with Secure Deduplication in Cloud Storage." In Data Mining and Big Data, 303–18. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8991-9_21.
Full textZhang, Yuan, Xiaodong Lin, and Chunxiang Xu. "Blockchain-Based Secure Data Provenance for Cloud Storage." In Information and Communications Security, 3–19. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01950-1_1.
Full textMoosavi, Sanaz Rahimi, and Arman Izadifar. "End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC." In Silicon Valley Cybersecurity Conference, 77–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_6.
Full textDoss, Bandi, P. Balamuralikrishna, C. H. Nagaraju, Dayadi Lakshmaiah, and S. Naresh. "Blockchain-Based Secure Big Data Storage on the Cloud." In Blockchain Technology for IoT and Wireless Communications, 11–18. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003269991-2.
Full textZhang, Manchao, Hong Zhu, and Kai Jiang. "Secure Cross-Domain Data Sharing Technology Based on Blockchain." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 27–38. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68884-4_3.
Full textRashmi, M., P. William, N. Yogeesh, and D. K. Girija. "Blockchain-Based Cloud Storage Using Secure and Decentralised Solution." In Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023, 269–79. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3878-0_23.
Full textJing, Zhaoxing, Chunjie Cao, Longjuan Wang, and Yulian Sang. "Secure Data Storage Scheme of Judicial System Based on Blockchain." In Communications in Computer and Information Science, 339–50. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7242-3_22.
Full textYatribi, Anouar, Mostafa Belkasmi, and Fouad Ayoub. "An Efficient and Secure Forward Error Correcting Scheme for DNA Data Storage." In Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018), 226–37. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17065-3_23.
Full textZhou, Lan, Vijay Varadharajan, and Michael Hitchens. "Cryptographic Role-Based Access Control for Secure Cloud Data Storage Systems." In Security, Privacy and Trust in Cloud Systems, 313–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38586-5_11.
Full textKanakamedala, Phaneendra, Abburi Akhil, Triveni Buska, Kandimalla Koteswara Rao, and Mallela Sireesha. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud." In Advances in Intelligent Systems and Computing, 81–89. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7330-6_7.
Full textConference papers on the topic "DNA-based secure data storage"
S, Sudersan, Sowmiya B, Abhijith V.S, Thangavel M, and Varalakshmi P. "Enhanced DNA Cryptosystem for Secure Cloud Data Storage." In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC). IEEE, 2021. http://dx.doi.org/10.1109/icsccc51823.2021.9478177.
Full textElmoselhy, A., and E. S. M. El-Alfy. "On DNA cryptography for secure data storage and transfer." In 3rd Smart Cities Symposium (SCS 2020). Institution of Engineering and Technology, 2021. http://dx.doi.org/10.1049/icp.2021.0900.
Full textElminaam, Diaa Salama Abd, Menna Allah Wafik Mousa, and Mohamed Abd El Fattah. "Secure Data Storage in The Cloud by Using DNA and Chaos Cryptography." In 2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC). IEEE, 2022. http://dx.doi.org/10.1109/miucc55081.2022.9781704.
Full textZhou, Su, Wenjie Chen, Wentao Chang, Rongrong Li, Xiaoying Ye, and Xiaoyue Li. "Secure Blockchain-based Storage for Electricity Marketing Data." In 2023 Panda Forum on Power and Energy (PandaFPE). IEEE, 2023. http://dx.doi.org/10.1109/pandafpe57779.2023.10141324.
Full textSaeed, Sameera Abubaker, Marghny Hassan Mohamed, and Mamdouh Farouk Mohamed. "Secure Storage of Data on Devices-Android based." In 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM). IEEE, 2021. http://dx.doi.org/10.1109/icsecs52883.2021.00084.
Full textZhao, Li, Bo Zhang, and Jiang Li. "Secure cloud storage system based on ciphertext retrieval." In 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE). IEEE, 2020. http://dx.doi.org/10.1109/icbaie49996.2020.00032.
Full textNadiya, Ulfah, Muhammad Ilham Rizqyawan, and Oka Mahnedra. "Blockchain-based Secure Data Storage for Door Lock System." In 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2019. http://dx.doi.org/10.1109/icitisee48480.2019.9003904.
Full textLin, Chu-Hsing, Sin-Ping Li, Yu-Chiao Lin, and Chiao-Hsu Tsai. "Blockchain-based Secure Storage System for Medical Image Data." In 2023 IEEE 3rd International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB). IEEE, 2023. http://dx.doi.org/10.1109/iceib57887.2023.10170051.
Full textGejibo, S. H., F. Mancini, K. A. Mughal, R. A. B. Valvik, and J. Klungsoyr. "Secure data storage for Java ME-based mobile data collection systems." In 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom 2012). IEEE, 2012. http://dx.doi.org/10.1109/healthcom.2012.6379471.
Full textLangheinrich, Marc. "FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures." In 2007 International Conference on Mobile Data Management. Conference and Custom Publishing, 2007. http://dx.doi.org/10.1109/mdm.2007.49.
Full textReports on the topic "DNA-based secure data storage"
Koduru, Smitha. PR-244-193800-R01 Quantification of ILI Sizing for Severe Anomalies. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), June 2020. http://dx.doi.org/10.55274/r0011682.
Full textRodriguez Muxica, Natalia. Open configuration options Bioinformatics for Researchers in Life Sciences: Tools and Learning Resources. Inter-American Development Bank, February 2022. http://dx.doi.org/10.18235/0003982.
Full textLichter, Amnon, Gopi K. Podila, and Maria R. Davis. Identification of Genetic Determinants that Facilitate Development of B. cinerea at Low Temperature and its Postharvest Pathogenicity. United States Department of Agriculture, March 2011. http://dx.doi.org/10.32747/2011.7592641.bard.
Full text