DNA Data Storage and Hybrid Molecular–Electronic Computing
نویسندگان
چکیده
منابع مشابه
Inner Workings: DNA for data storage and computing.
On the surface, genetic and electrical engineering appear to have little in common. One field revolves around carbon and the other is built upon silicon; one makes RNA from DNA and the other converts AC to DC. But some creative biologists have begun to apply the concepts of electrical engineering to living cells. “We view ourselves as biological programmers,” says Timothy Lu, a member of the Sy...
متن کاملData Storage in Cloud Computing
With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertextpolicy attribute based encrypti...
متن کاملData Storage in DNA
Human-beings have always been fond of accessing more and more information in minimum possible time and space. Consequently New Generation Computers and High Speed Internet have gained popularity in the recent years. We have been witness to remarkable achievements like the transition from the bulky hard-drives to the flash drives which has made personal data storage efficiently manageable. But w...
متن کاملSecure Data Storage in Mobile Cloud Computing
In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Com...
متن کاملIdentity-based data storage in cloud computing
Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the IEEE
سال: 2019
ISSN: 0018-9219,1558-2256
DOI: 10.1109/jproc.2018.2875386