The Journal of Supercomputing

, Volume 75, Issue 4, pp 2181–2192 | Cite as

Membrane computing inspired protocol to enhance security in cloud network

  • K. MaharajanEmail author
  • B. Paramasivan


The crucial threats and challenges prevailing in cloud computing are privacy and security. The main reason for these challenges encountered in cloud computing is its multi-tenancy nature and the subcontracting of infrastructures. Cloud services are widely recognized and approved in enterprises, educational institutions and government organizations for their businesses. In order to provide reliable, secure cloud services and enhance cloud services, enterprises should develop security in their businesses and should select pertinent vendor for their computing needs. Traditional cryptography computing models are not completely suitable for protecting cloud-based computing. Membrane computing, on the other hand, provides an explicit notion of region, namely the space enclosed by membranes.


Membrane computing Cryptography Cloud computing Neural network 


  1. 1.
    Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Science 266(5187):1021–1024CrossRefGoogle Scholar
  2. 2.
    Gehani A, LaBean T, Reif J (2000) DNA-based cryptography. Dismacs Ser Discret Math Theor Comput Sci 54:233–349MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Lipton RJ (1995) DNA solution of hard computational problems. Science 268(5210):542–545CrossRefGoogle Scholar
  4. 4.
    Boneh D, Dunworth C, Lipton RJ (1995) Breaking DES using a molecular computer. DIMACS Workshop DNA Comput 27:37–51MathSciNetGoogle Scholar
  5. 5.
    MingXin L, XueJia L, GuoZhen X, Lei Q (2007) Symmetric-key cryptosystem with DNA technology. Sci China Ser F Inf Sci 50(3):324–333CrossRefzbMATHGoogle Scholar
  6. 6.
    P˘aun G (2002) Membrane computing: an introduction. Springer, BerlinCrossRefGoogle Scholar
  7. 7.
    Yu J, Thomson JA (2008) Pluripotent stem cell lines. Genes Dev 22(15):1987–1997CrossRefGoogle Scholar
  8. 8.
    Teuscher C (2004) Amorphous membrane blending: from regular to irregular cellular computing machines. PhD Thesis, Swiss Federal Institute of Technology (EPFL), Lausanne, SwitzerlandGoogle Scholar
  9. 9.
    Teuscher C (2005) Outlining an unconventional, adaptive, and particle-based reconfigurable computer architecture. In: Banâtre JP et al (eds) UPP 2004. Volume 3566 of Lecture notes in computer science. Springer, pp 231–246Google Scholar
  10. 10.
    Teuscher C (2006) From membranes to systems: self-configuration and self-replication in membrane systems. BioSystems 87(2–3):101–110Google Scholar
  11. 11.
    Jong KD (2006) Evolutionary computation: a unified approach. MIT Press, CambridgezbMATHGoogle Scholar
  12. 12.
    Kaeo M (2004) Designing network security, 2nd edn. Cisco Press, IndianapolisGoogle Scholar
  13. 13.
    Kari L, Rozenberg G (2008) The many facets of natural computing. Commun ACM 51:72–83CrossRefGoogle Scholar
  14. 14.
    Paun G (2000) Computing with membranes. J Comput Syst Sci 61(1):108–143MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Suresh A, Kumar R, Varatharajan R (2018) Health care data analysis using evolutionary algorithm. J Supercomput. Google Scholar
  16. 16.
    Bell Gordon, Hey Tony, Szalay Alex (2009) Beyond the data deluge. Science 323(5919):1297–1298CrossRefGoogle Scholar
  17. 17.
    Bhatia T, Verma AK (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J Supercomput 73:2558. CrossRefGoogle Scholar
  18. 18.
    Rizvi S, Ryoo J, Kissell J et al (2017) A security evaluation framework for cloud security auditing. J Supercomput. Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Engineering CollegeKovilpattiIndia
  2. 2.Department of Information TechnologyNational Engineering CollegeKovilpattiIndia

Personalised recommendations