Hybrid DNA Cryptography for Secure Cloud Storage
Keywords:Cloud Computing, Security, Confidentiality, Authentication, DNA Cryptography.
Now a day’s cloud computing is being used in several areas like industry, medical, science and research, colleges etc for storage of huge amount of data. User can retrieve data files from cloud data center on request. While storing data files on cloud server several security issues may arise. To overcome from these security issues there are a number of techniques. Out of several security techniques Cryptography is more popular now a day’s for data security. Use of a traditional cryptography algorithm is not effective or sufficient for high level security to data in cloud computing. In order to make sure security of the information at cloud data storage end, a design and implementation of an algorithm to enhance cloud security is proposed. With a concept, where the proposed algorithm combines features of DNA sequencing. Proposed methodology or system is provides security to data files by using hybrid encryption/decryption technique. So, the enhanced approach maintains confidentiality and authenticity of cloud data. As a result the proposed algorithm provides enhanced security as well as reduces time complexity during encryption and decryption process of data file.
Abbasy, M. R. and Shanmugam, B, Enabling data hiding for resource sharing in cloud computing environments based on dna sequences. In 2011 IEEE World Congress on Services, pages 385390. IEEE,2011.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., and Brandic, I, Cloud com-puting and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6):599616, 2009.
Clark, A. J. (1998). Optimisation heuristics for cryptology.60 Dimovski, A. and Gligoroski, D., Attacks on the transposition ciphers using optimization heuristics. In International Scientific Conference on Information, Communication & Energy Systems & Technologies ICEST, 2003.
Jegadeeswari, S., Dinadayalan, P., and Gnanambigai, Enhanced data security using neural network in cloud environment. International Journal of Applied Engineering Research, 11(1):278285, 2016.
Negi, A., Singh, M., and Kumar, S, An efficent security framework design for cloud computing using artificial neural networks. International Journal of Computer Applications, 129(4):1721, 2015.
Phangal, S. and Kumar, M, A dual security scheme using dna key based dna cryptography. In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, page 37. ACM, 2014.
Spillman, R., Janssen, M., Nelson, B., and Kepner, M., Use of a genetic algo- rithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17(1):3144, 1993.
Naik, P. G. and Naik, G. R, Symmetric key encryption using genetic algorithm. International Journal of Latest Trends in Engineering and Technology (IJLTET), 3(3):118128,2014.
Ranalkar, R. and Phulpagar, B, DNA based cryptography in multi-cloud: Security strategy and analysis. pages 189192, 2014.
N. Hitaswi and K. Chandrasekaran, “A Bio-Inspired Model to Provide Data Security in Cloud Storage”, IEEE, 2016.
Shruti Goyal, Sourabh Jain, “A secure cryptographic cloud communication using DNA cryptographic technique”, ICICT, IEEE, 2016.
Rajkumar Buyya, Karthik Sukumar, “Platforms for Building and Deploying Applications for Cloud Computing”, CSI Communications, 2011.
Ganesh Patidar, Nitin Agrawal, SitendraTarmakar, “A block based Encryption Model to improve Avalanche Effect for data Security”, International Journal of Scientific and Research Publications, Volume 3, Issue 1, 2013.
How to Cite
Copyright (c) 2017 Ms. Mona Vishwakarma, Mr. Umesh Lilhore
This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.