Using Genetic and Ant Colony Algorithms to Address the Security Issues in Cloud Computing-Based Accounting Systems

Authors

  • Dawood Salman AlFarttoosi Department of Accounting, Faculty of Administration and Economics, University of Kufa, Iraq Author
  • Abdalabbas Hassan Kadhim Department of Accounting, Faculty of Administration and Economics, University of Kufa, Iraq Author

DOI:

https://doi.org/10.61841/362khd23

Keywords:

Genetic Algorithm, Ant Colony, Cloud Computing, ccounting system, Cryptography

Abstract

: Due to the recent substantial development in the digital world, transfer data over the network has become more and more critical issue in the context of cloud computing-based accounting systems. This paper discusses the main security mechanisms that could be implemented to fulfill the data protection and confidentiality in cloud computing-based accounting systems. The findings assert the ability to use the computational intelligence techniques (Genetic and Ant colony) to build trust environment in cloud computing. Genetic proposed to apply the Cryptography and achieve data encryption, whereas Ant algorithm combined to add the complexity by creating strong path for each cloud user and this would enable the system to easily detect the unauthorized such as hackers when they try to reach and hack the data.

 

Downloads

Download data is not yet available.

References

[1] Elzamly, Abdelrafe, Nabil Messabia, Mohamed Doheir, Samy Abu Naser, and Hazem A Elbaz. "Critical Cloud Computing Risks for Banking Organizations: Issues and Challenges." Religación. Revista de Ciencias Sociales y Humanidades 4, no. 18 (2019): 673-82.

[2] Vasile, Valentina, Călin-Adrian Comes, Beatrice-Anamari Ştefan, and Anca Munteanu. "Emerging Markets Queries in Finance and Business." Procedia Economics and Finance, no. 32 (2015): 1-3.

[3] Chauhan, N Singh, and Ashutosh Saxena. "Cryptography and Cloud Security Challenges." CSI Communications (2013).

[4] Pearson, Siani. "Privacy, Security and Trust in Cloud Computing." In Privacy and Security for Cloud Computing, 3-42: Springer, 2013.

[5] Lohr, Steve. "Google and Ibm Join in ‘Cloud Computing’research." New York Times 8 (2007).

[6] Christauskas, Česlovas, and Regina Misevičienė. "Cloud-Computing Based Accounting for Small to Medium Sized Business." Inžinerinė ekonomika (2012): 14-21.

[7] Dimitriu, Otilia, and Marian Matei. "A New Paradigm for Accounting through Cloud Computing." Procedia economics and finance 15, no. 14 (2014): 840-46.

[8] Pearson, Siani, and George Yee. "Privacy and Security for Cloud Computing: Computer Communications and Networks." London, UK: Springer-Verlag, 2013.

[9] Group, NIST Cloud Computing Forensic Science Working. "Nist Cloud Computing Forensic Science Challenges." National Institute of Standards and Technology, 2014.

[10] Shtovba, Serhiy D. "Ant Algorithms: Theory and Applications." Programming and Computer Software 31, no. 4 (2005): 167-78.

[11] Sharma, Bhanu, Ruppa K Thulasiram, Parimala Thulasiraman, Saurabh K Garg, and Rajkumar Buyya. "Pricing Cloud Compute Commodities: A Novel Financial Economic Model." Paper presented at the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), 2012.

[12] Rittinghouse, John W, and James F Ransome. Cloud Computing: Implementation, Management, and Security. CRC press, 2016.

[13] Mather, T. "Cloud Security and Privacy/Mather T., Kumaraswamy S., Latif S." Sebastopol: O’Reilly, 2009.

[14] Sarkar, Mrinal Kanti, and Trijit Chatterjee. "Enhancing Data Storage Security in Cloud Computing through Steganography." International Journal on Network Security 5, no. 1 (2014): 13.

[15] Carolan, Jason, Steve Gaede, James Baty, Glenn Brunette, Art Licht, Jim Remmell, Lew Tucker, and Joel Weise. "Introduction to Cloud Computing Architecture." White Paper, 1st edn. Sun Micro Systems Inc (2009).

[16] Sokol, Annie W, and Michael D Hogan. "Nist Cloud Computing Standards Roadmap." 2013.

[17] Linda, Ondrej. "Applications of Computational Intelligence in Critical Infrastructures: Network Security, Robotics, and System Modeling Enhancements." University of Idaho, 2009.

[18] Robling Denning, Dorothy Elizabeth. Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., 1982.

[19] Kaur, Simarjeet. "Cryptography and Encryption in Cloud Computing." VSRD International journal of Computer science and Information Technology 2, no. 3 (2012): 242-49.

[20] Wawge, PU, and AR Rathod. "Cloud Computing Security with Steganography and Cryptoghrapy Aes Algorthm Technology." World Research Journal of Computer Architecture, ISSN (2012): 2278-8514.

[21] Chhikara, Parul, and Arun K Patel. "Enhancing Network Security Using Ant Colony Optimization." Global Journal of Computer Science and Technology (2013).

[22] Holland, John. "Adaptation in Natural and Artificial Systems: An Introductory Analysis with Application to Biology." Control and artificial intelligence (1975).

Downloads

Published

30.09.2020

How to Cite

AlFarttoosi, D. S., & Kadhim, A. H. (2020). Using Genetic and Ant Colony Algorithms to Address the Security Issues in Cloud Computing-Based Accounting Systems. International Journal of Psychosocial Rehabilitation, 24(7), 6804-6812. https://doi.org/10.61841/362khd23