A Novel Cryptographic Technique for Cloud Environment Based on Feedback DNA

Keywords: Cloud Environment, DNA-based Key generation, DNA sequence, Data Security, Cryptography

Abstract

Abstract: In the era of cloud computing, ensuring data security is crucial for users and organizations. This paper presents an innovative approach called F-DNAES, which combines DNA cryptography and the Advanced Encryption Standard (AES) algorithm, to enhance data security in cloud-based environments. The proposed methodology focuses on securing data during its transmission and storage in the cloud. By leveraging the unique properties of DNA, such as its storage capacity and stability, along with the robustness of AES encryption, F-DNAES provides a highly secure and efficient solution. The proposed method also ensures the authentication of the Data owners and the users. The F-DNAES model effectively mitigates potential security threats such as phishing attacks, collision attacks, and password guessing attacks. It also offers superior performance in terms of key generation, encryption, and decryption processes. The proposed approach can be applied to various cloud-based scenarios, including IoT infrastructure, web-based applications, and network security. F-DNAES contributes to strengthening data privacy and security, providing users with a trusted and reliable solution in cloud environments.

References

Al-Husainy, M. A. F., Al-Shargabi, B., & Aljawarneh, S. (2021). Lightweight cryptography system for IoT devices using DNA. Computers and Electrical Engineering, 95. https://doi.org/10.1016/j.compeleceng.2021.107418

Bahig, H. M., & Nassr, D. I. (2019). DNA-Based AES with Silent Mutations. Arabian Journal for Science and Engineering, 44(4), 3389–3403. https://doi.org/10.1007/s13369-018-3520-8

Daemen, J., & Rijmen, V. (n.d.). AES Proposal: Rijndael.

Di Pietro, R., & Lombardi, F. (2018.). Virtualization Technologies and Cloud Security: advantages, issues, and perspectives.

Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., & Inácio, P. R. M. (2014). Security issues in cloud environments: A survey. International Journal of Information Security, 13(2), 113–170. https://doi.org/10.1007/s10207-013-0208-7

Imam, R., Anwer, F., & Nadeem, M. (2022). An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA). International Journal of Information Technology (Singapore), 14(5), 2645–2656. https://doi.org/10.1007/s41870-022-00993-y

Imam, R., Areeb, Q. M., Alturki, A., & Anwer, F. (2021). Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status. In IEEE Access (Vol. 9, pp. 155949–155976). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2021.3129224

Institute of Electrical and Electronics Engineers. Bangladesh Section, & IEEE Communications Society. (2017). ICCIT : 2017 20th International Conference of Computer and Information Technology : 22-24 December 2017.

Institute of Electrical and Electronics Engineers. Bangladesh Section, & IEEE Communications Society. (2017). ICCIT : 2017 20th International Conference of Computer and Information Technology : 22-24 December 2017.

Kadhim, A., & Ali, R. S. (2019). Enhancement AES based on 3D chaos theory and DNA operations addition. Karbala International Journal of Modern Science, 5(2). https://doi.org/10.33640/2405-609X.1137

Kandukuri, B. R., Ramakrishna, P. V., & Rakshit, A. (2009). Cloud security issues. SCC 2009 - 2009 IEEE International Conference on Services Computing, 517–520. https://doi.org/10.1109/SCC.2009.84

Kaufman, L. M. (2010). Can Public-Cloud Security Meet Its Unique Challenges? http://csrc.nist.gov/groups/

Kolate, V., & Joshi, R. B. (2021). An Information Security Using DNA Cryptography along with AES Algorithm. In Turkish Journal of Computer and Mathematics Education, 12(1), 2021.

Muttik, I., & Barton, C. (2009). Cloud security technologies. Information Security Technical Report, 14(1), 1–6.

https://doi.org/10.1016/j.istr.2009.03.001

Namasudra, S., Chakraborty, R., Majumder, A., & Moparthi, N. R. (2021). Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment. ACM Transactions on Multimedia Computing, Communications and Applications, 16(3s). https://doi.org/10.1145/3392665

Noor, T. H., Sheng, Q. Z., Zeadally, S., & Yu, J. (2013). Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Surveys, 46(1). https://doi.org/10.1145/2522968.2522980

Patnala, B. D., & Kiran Kumar, R. (2019). A Novel Level-Based DNA Security Algorithm Using DNA Codons. Springer Verlag. In SpringerBriefs in Applied Sciences and Technology, pp. 1–13. https://doi.org/10.1007/978-981-13-0544-3_1

Pavithran, P., Mathew, S., Namasudra, S., & Lorenz, P. (2021). A novel cryptosystem based on DNA cryptography and randomly generated mealy machine. Computers and Security, 104. https://doi.org/10.1016/j.cose.2020.102160

Rama Devi, K., & Bhuvaneswari, E. (2022). An Enhancement in Data Security Using Trellis Algorithm with DNA Sequences in Symmetric DNA Cryptography. Wireless Personal Communications. https://doi.org/10.1007/s11277-022-10102-8

Rosado, D. G., Gómez, R., Mellado, D., & Fernández-Medina, E. (2012). Security Analysis in the Migration to Cloud Environments. Future Internet, 4(2), 469–487. https://doi.org/10.3390/fi4020469

Safaa, H., Adill, S., & Yakoob, A. (2023). Information Security Using DNA Sequences. 30(4). https://doi.org/10.29196/jubpas.v30i4.4397

Sakr, S., Liu, A., Batista, D. M., & Alomari, M. (2011). A survey of large scale data management approaches in cloud environments. In IEEE Communications Surveys and Tutorials,13(3), 311–336. https://doi.org/10.1109/SURV.2011.032211.00087

Stallings, W. (2005). Cryptography and Network Security Principles and Practices, Fourth Edition.

Tiwari, H. D., & Kim, J. H. (2018). Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices. ETRI Journal, 40(3), 396–409. https://doi.org/10.4218/etrij.2017-0220

Varadharajan, V., & Tupakula, U. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1), 60–75. https://doi.org/10.1109/TNSM.2014.041614.120394

Young, K. H., Weisenburger, D. D., Dave, B. J., Smith, L., Sanger, W., Iqbal, J., Campo, E., Delabie, J., Gascoyne, R. D., Ott, G., Rimsza, L., Konrad, Mü Ller-Hermelink, H., Jaffe, E. S., Rosenwald, A., Staudt, L. M., Chan, W. C., & Greiner, T. C. (2007). Mutations in the DNA-binding codons of TP53, which are associated with decreased expression of TRAIL receptor-2, predict for poor survival in diffuse large B-cell lymphoma. https://doi.org/10.1182/blood-2007-02

Zhang, Y., Xiao, D., Wen, W., & Wong, K. W. (2014). On the security of symmetric ciphers based on DNA coding. Information Sciences, 289(1), 254–261. https://doi.org/10.1016/j.ins.2014.08.005

Published
2023-08-30
How to Cite
Sharfuddin, N., Anwer, F., & Ali, S. (2023). A Novel Cryptographic Technique for Cloud Environment Based on Feedback DNA. International Journal of Experimental Research and Review, 32, 323-339. https://doi.org/10.52756/ijerr.2023.v32.028
Section
Articles