Using Genetic and Ant Colony Algorithms to Address the Security Issues in Cloud Computing-Based Accounting Systems
DOI:
https://doi.org/10.61841/362khd23Keywords:
Genetic Algorithm, Ant Colony, Cloud Computing, ccounting system, CryptographyAbstract
: Due to the recent substantial development in the digital world, transfer data over the network has become more and more critical issue in the context of cloud computing-based accounting systems. This paper discusses the main security mechanisms that could be implemented to fulfill the data protection and confidentiality in cloud computing-based accounting systems. The findings assert the ability to use the computational intelligence techniques (Genetic and Ant colony) to build trust environment in cloud computing. Genetic proposed to apply the Cryptography and achieve data encryption, whereas Ant algorithm combined to add the complexity by creating strong path for each cloud user and this would enable the system to easily detect the unauthorized such as hackers when they try to reach and hack the data.
Downloads
References
[1] Elzamly, Abdelrafe, Nabil Messabia, Mohamed Doheir, Samy Abu Naser, and Hazem A Elbaz. "Critical Cloud Computing Risks for Banking Organizations: Issues and Challenges." Religación. Revista de Ciencias Sociales y Humanidades 4, no. 18 (2019): 673-82.
[2] Vasile, Valentina, Călin-Adrian Comes, Beatrice-Anamari Ştefan, and Anca Munteanu. "Emerging Markets Queries in Finance and Business." Procedia Economics and Finance, no. 32 (2015): 1-3.
[3] Chauhan, N Singh, and Ashutosh Saxena. "Cryptography and Cloud Security Challenges." CSI Communications (2013).
[4] Pearson, Siani. "Privacy, Security and Trust in Cloud Computing." In Privacy and Security for Cloud Computing, 3-42: Springer, 2013.
[5] Lohr, Steve. "Google and Ibm Join in ‘Cloud Computing’research." New York Times 8 (2007).
[6] Christauskas, Česlovas, and Regina Misevičienė. "Cloud-Computing Based Accounting for Small to Medium Sized Business." Inžinerinė ekonomika (2012): 14-21.
[7] Dimitriu, Otilia, and Marian Matei. "A New Paradigm for Accounting through Cloud Computing." Procedia economics and finance 15, no. 14 (2014): 840-46.
[8] Pearson, Siani, and George Yee. "Privacy and Security for Cloud Computing: Computer Communications and Networks." London, UK: Springer-Verlag, 2013.
[9] Group, NIST Cloud Computing Forensic Science Working. "Nist Cloud Computing Forensic Science Challenges." National Institute of Standards and Technology, 2014.
[10] Shtovba, Serhiy D. "Ant Algorithms: Theory and Applications." Programming and Computer Software 31, no. 4 (2005): 167-78.
[11] Sharma, Bhanu, Ruppa K Thulasiram, Parimala Thulasiraman, Saurabh K Garg, and Rajkumar Buyya. "Pricing Cloud Compute Commodities: A Novel Financial Economic Model." Paper presented at the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), 2012.
[12] Rittinghouse, John W, and James F Ransome. Cloud Computing: Implementation, Management, and Security. CRC press, 2016.
[13] Mather, T. "Cloud Security and Privacy/Mather T., Kumaraswamy S., Latif S." Sebastopol: O’Reilly, 2009.
[14] Sarkar, Mrinal Kanti, and Trijit Chatterjee. "Enhancing Data Storage Security in Cloud Computing through Steganography." International Journal on Network Security 5, no. 1 (2014): 13.
[15] Carolan, Jason, Steve Gaede, James Baty, Glenn Brunette, Art Licht, Jim Remmell, Lew Tucker, and Joel Weise. "Introduction to Cloud Computing Architecture." White Paper, 1st edn. Sun Micro Systems Inc (2009).
[16] Sokol, Annie W, and Michael D Hogan. "Nist Cloud Computing Standards Roadmap." 2013.
[17] Linda, Ondrej. "Applications of Computational Intelligence in Critical Infrastructures: Network Security, Robotics, and System Modeling Enhancements." University of Idaho, 2009.
[18] Robling Denning, Dorothy Elizabeth. Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., 1982.
[19] Kaur, Simarjeet. "Cryptography and Encryption in Cloud Computing." VSRD International journal of Computer science and Information Technology 2, no. 3 (2012): 242-49.
[20] Wawge, PU, and AR Rathod. "Cloud Computing Security with Steganography and Cryptoghrapy Aes Algorthm Technology." World Research Journal of Computer Architecture, ISSN (2012): 2278-8514.
[21] Chhikara, Parul, and Arun K Patel. "Enhancing Network Security Using Ant Colony Optimization." Global Journal of Computer Science and Technology (2013).
[22] Holland, John. "Adaptation in Natural and Artificial Systems: An Introductory Analysis with Application to Biology." Control and artificial intelligence (1975).
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
