Bio-inspired Computing Techniques for Data Security Challenges and Controls

被引:0
|
作者
Sripriyanka G. [1 ]
Mahendran A. [1 ]
机构
[1] School of Computer Science and Engineering, Vellore Institute of Technology, Tamil Nadu, Vellore
关键词
Attacks; Bio-inspired computing; Connectivity; Controls; Data security; Optimization; Security challenges;
D O I
10.1007/s42979-022-01292-w
中图分类号
学科分类号
摘要
Bio-inspired computing approach is based on the nature and biology for solving complex real-world challenges with enhanced solutions. In this modern era smart technology, connectivity and information play a vital role in the enhancement of human daily life. In the insolent connected world, an eruption of data is increasing and it became exceedingly vulnerable to the threat surface while transfer, collection, and storage of real-time information. Through an international network, this collected information is stored in the public environment. Invaders switch and open the users’ trustworthy material without authorized access for malicious activity. And the hackers are substituting the unique information with the forged records. The collected information is exposed to the assaults, such as malware, phishing, flooding, replay, password attacks, and so on. With this new expertise, various mathematical and optimized computational methods are developed for data safety through biology and nature. Guaranteeing and comforting the security of information necessitate stimulation from the natural sphere. With this advancement, nature has developed biology and nature-based inspired techniques for resolving data security in real time through variation. For data security challenges, these techniques have various graceful solutions with high accurateness and efficacy. In this paper, we review the generous trends in bio-inspired computing methodologies for solving information security issues with extraordinary elucidations. In the future, to design a hybrid bio-inspired security model to enhance data safeguarding on various smart world applications. © 2022, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [1] Correction: Bio-inspired Computing Techniques for Data Security Challenges and Controls
    G. Sripriyanka
    Anand Mahendran
    SN Computer Science, 4 (2)
  • [2] Bio-inspired computing: constituents and challenges
    Akerkar, Rajendra
    Sajja, Priti Srinivas
    INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2009, 1 (03) : 135 - 150
  • [3] Bio-Inspired Computing, Information Swarms, and the Problem of Data Fusion Bio-Inspired Computing
    Nordmann, Brian
    TECHNOLOGICAL INNOVATIONS IN SENSING AND DETECTION OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR THREATS AND ECOLOGICAL TERRORISM, 2012, : 35 - 44
  • [4] Advances in bio-inspired computing: Techniques and applications
    Jain, L. C.
    Lim, C. P.
    NEUROCOMPUTING, 2014, 125 : 183 - 183
  • [5] Cognitive systems and bio-inspired computing in homeland security
    Ogiela, Lidia
    Ogiela, Marek R.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 : 34 - 42
  • [6] Bio-Inspired Computing and Communication
    Crowcroft, Jon
    BIO-INSPIRED COMPUTING AND COMMUNICATION, 2008, 5151 : 1 - 8
  • [7] Bio-Inspired Optimization Techniques for Job Scheduling In Grid Computing
    Grover, Reetika
    Chabbra, Amit
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1902 - 1906
  • [8] Bio-inspired Approaches for Secret Data Sharing Techniques
    Ogiela, Marek R.
    Ogiela, Lidia
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATICS AND BIOMEDICAL SCIENCES (ICIIBMS), 2015, : 75 - 78
  • [9] Bio-inspired computing paradigms (natural computing)
    Paun, G
    UNCONVENTIONAL PROGRAMMING PARADIGMS, 2005, 3566 : 155 - 160
  • [10] Bio-inspired model for data distribution in Fog and Mist computing
    Vasconcelos, Danilo
    Severino, Valdenir
    Neuman, Jose
    Andrade, Rossana
    Maia, Marcio
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 777 - 782