Advances of DNA Computing in Cryptography


Book Description

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.




Advances of DNA Computing in Cryptography


Book Description

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.




Aspects of Molecular Computing


Book Description

Molecular computing is a rapidly growing subarea of natural computing. On the one hand, molecular computing is concerned with the use of bio-molecules for the purpose of actual computations while, on the other hand, it attempts to understand the computational nature of molecular processes going on in living cells. The book presents a unique and authorative state-of-the-art survey on current research in molecular computing: 30 papers by leading researchers in the area are drawn together on the occasion of the 70th birthday of Tom Head, a pioneer in molecular computing. Among the topics addressed are molecular tiling, DNA self-assembly, splicing systems, DNA-based cryptography, DNA word design, gene assembly, and membrane computing.




Perspective of DNA Computing in Computer Science


Book Description

DNA or Deoxyribonucleic Acid computing is an emerging branch of computing that uses DNA sequence, biochemistry, and hardware for encoding genetic information in computers. Here, information is represented by using the four genetic alphabets or DNA bases, namely A (Adenine), G (Guanine), C (Cytosine), and T (Thymine), instead of the binary representation (1 and 0) used by traditional computers. This is achieved because short DNA molecules of any arbitrary sequence of A, G, C, and T can be synthesized to order. DNA computing is mainly popular for three reasons: (i) speed (ii) minimal storage requirements, and (iii) minimal power requirements. There are many applications of DNA computing in the field of computer science. Nowadays, DNA computing is widely used in cryptography for achieving a strong security technique, so that unauthorized users are unable to retrieve the original data content. In DNA-based encryption, data are encrypted by using DNA bases (A, T, G, and C) instead of 0 and 1. As four DNA bases are used in the encryption process, DNA computing supports more randomness and makes it more complex for attackers or malicious users to hack the data. DNA computing is also used for data storage because a large number of data items can be stored inside the condensed volume. One gram of DNA holds approx DNA bases or approx 700 TB. However, it takes approx 233 hard disks to store the same data on 3 TB hard disks, and the weight of all these hard disks can be approx 151 kilos. In a cloud environment, the Data Owner (DO) stores their confidential encrypted data outside of their own domain, which attracts many attackers and hackers. DNA computing can be one of the best solutions to protect the data of a cloud server. Here, the DO can use DNA bases to encrypt the data by generating a long DNA sequence. Another application of DNA computing is in Wireless Sensor Network (WSN). Many researchers are trying to improve the security of WSN by using DNA computing. Here, DNA cryptography is used along with Secure Socket Layer (SSL) that supports a secure medium to exchange information. However, recent research shows some limitations of DNA computing. One of the critical issues is that DNA cryptography does not have a strong mathematical background like other cryptographic systems. This edited book is being planned to bring forth all the information of DNA computing. Along with the research gaps in the currently available books/literature, this edited book presents many applications of DNA computing in the fields of computer science. Moreover, research challenges and future work directions in DNA computing are also provided in this edited book. - This edited book gives an overall detail of DNA computing and the fundamentals of cryptography - Many applications of DNA computing in computer science fields, such as cryptography, cloud computing, big data storage, Wireless Sensor Network (WSN) security, and many more, are presented in different chapters of this edited book - Research challenges along with many future work directions in DNA computing are presented in this edited book




Advanced Smart Computing Technologies in Cybersecurity and Forensics


Book Description

This book addresses the topics related to artificial intelligence, the Internet of Things, blockchain technology, and machine learning. It brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics. The first objective is to learn and understand the need for and impact of advanced cybersecurity and forensics and its implementation with multiple smart computational technologies. This objective answers why and how cybersecurity and forensics have evolved as one of the most promising and widely-accepted technologies globally and has widely-accepted applications. The second objective is to learn how to use advanced cybersecurity and forensics practices to answer computational problems where confidentiality, integrity, and availability are essential aspects to handle and answer. This book is structured in such a way so that the field of study is relevant to each reader’s major or interests. It aims to help each reader see the relevance of cybersecurity and forensics to their career or interests. This book intends to encourage researchers to develop novel theories to enrich their scholarly knowledge to achieve sustainable development and foster sustainability. Readers will gain valuable knowledge and insights about smart computing technologies using this exciting book. This book: • Includes detailed applications of cybersecurity and forensics for real-life problems • Addresses the challenges and solutions related to implementing cybersecurity in multiple domains of smart computational technologies • Includes the latest trends and areas of research in cybersecurity and forensics • Offers both quantitative and qualitative assessments of the topics Includes case studies that will be helpful for the researchers Prof. Keshav Kaushik is Assistant Professor in the Department of Systemics, School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. Dr. Shubham Tayal is Assistant Professor at SR University, Warangal, India. Dr. Akashdeep Bhardwaj is Professor (Cyber Security & Digital Forensics) at the University of Petroleum & Energy Studies (UPES), Dehradun, India. Dr. Manoj Kumar is Assistant Professor (SG) (SoCS) at the University of Petroleum and Energy Studies, Dehradun, India.




Blockchain, Big Data and Machine Learning


Book Description

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.




Handbook of Research on Recent Developments in Intelligent Communication Application


Book Description

The communication field is evolving rapidly in order to keep up with society’s demands. As such, it becomes imperative to research and report recent advancements in computational intelligence as it applies to communication networks. The Handbook of Research on Recent Developments in Intelligent Communication Application is a pivotal reference source for the latest developments on emerging data communication applications. Featuring extensive coverage across a range of relevant perspectives and topics, such as satellite communication, cognitive radio networks, and wireless sensor networks, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current information on emerging communication networking trends.




Advanced Computational and Communication Paradigms


Book Description

The book titled Advanced Computational and Communication Paradigms: Proceedings of International Conference on ICACCP 2017, Volume 2 presents refereed high-quality papers of the First International Conference on Advanced Computational and Communication Paradigms (ICACCP 2017) organized by the Department of Computer Science and Engineering, Sikkim Manipal Institute of Technology, held from 8– 10 September 2017. ICACCP 2017 covers an advanced computational paradigms and communications technique which provides failsafe and robust solutions to the emerging problems faced by mankind. Technologists, scientists, industry professionals and research scholars from regional, national and international levels are invited to present their original unpublished work in this conference. There were about 550 technical paper submitted. Finally after peer review, 142 high-quality papers have been accepted and registered for oral presentation which held across 09 general sessions and 05 special sessions along with 04 keynote address and 06 invited talks. This volume comprises 77 accepted papers of ICACCP 2017.




Applications of Blockchain in Healthcare


Book Description

This book discusses applications of blockchain in healthcare sector. The security of confidential and sensitive data is of utmost importance in healthcare industry. The introduction of blockchain methods in an effective manner will bring secure transactions in a peer-to-peer network. The book also covers gaps of the current available books/literature available for use cases of Distributed Ledger Technology (DLT) in healthcare. The information and applications discussed in the book are immensely helpful for researchers, database professionals, and practitioners. The book also discusses protocols, standards, and government regulations which are very useful for policymakers. /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div