A Novel Cryptographic Technique for Cloud Environment Based on Feedback DNA
DOI:
https://doi.org/10.52756/ijerr.2023.v32.028Keywords:
Cloud Environment, DNA-based Key generation, DNA sequence, Data Security, CryptographyAbstract
Abstract: In the era of cloud computing, ensuring data security is crucial for users and organizations. This paper presents an innovative approach called F-DNAES, which combines DNA cryptography and the Advanced Encryption Standard (AES) algorithm, to enhance data security in cloud-based environments. The proposed methodology focuses on securing data during its transmission and storage in the cloud. By leveraging the unique properties of DNA, such as its storage capacity and stability, along with the robustness of AES encryption, F-DNAES provides a highly secure and efficient solution. The proposed method also ensures the authentication of the Data owners and the users. The F-DNAES model effectively mitigates potential security threats such as phishing attacks, collision attacks, and password guessing attacks. It also offers superior performance in terms of key generation, encryption, and decryption processes. The proposed approach can be applied to various cloud-based scenarios, including IoT infrastructure, web-based applications, and network security. F-DNAES contributes to strengthening data privacy and security, providing users with a trusted and reliable solution in cloud environments.
References
Al-Husainy, M. A. F., Al-Shargabi, B., & Aljawarneh, S. (2021). Lightweight cryptography system for IoT devices using DNA. Computers and Electrical Engineering, 95. https://doi.org/10.1016/j.compeleceng.2021.107418
Bahig, H. M., & Nassr, D. I. (2019). DNA-Based AES with Silent Mutations. Arabian Journal for Science and Engineering, 44(4), 3389–3403. https://doi.org/10.1007/s13369-018-3520-8
Daemen, J., & Rijmen, V. (n.d.). AES Proposal: Rijndael.
Di Pietro, R., & Lombardi, F. (2018.). Virtualization Technologies and Cloud Security: advantages, issues, and perspectives.
Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., & Inácio, P. R. M. (2014). Security issues in cloud environments: A survey. International Journal of Information Security, 13(2), 113–170. https://doi.org/10.1007/s10207-013-0208-7
Imam, R., Anwer, F., & Nadeem, M. (2022). An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA). International Journal of Information Technology (Singapore), 14(5), 2645–2656. https://doi.org/10.1007/s41870-022-00993-y
Imam, R., Areeb, Q. M., Alturki, A., & Anwer, F. (2021). Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status. In IEEE Access (Vol. 9, pp. 155949–155976). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2021.3129224
Institute of Electrical and Electronics Engineers. Bangladesh Section, & IEEE Communications Society. (2017). ICCIT : 2017 20th International Conference of Computer and Information Technology : 22-24 December 2017.
Institute of Electrical and Electronics Engineers. Bangladesh Section, & IEEE Communications Society. (2017). ICCIT : 2017 20th International Conference of Computer and Information Technology : 22-24 December 2017.
Kadhim, A., & Ali, R. S. (2019). Enhancement AES based on 3D chaos theory and DNA operations addition. Karbala International Journal of Modern Science, 5(2). https://doi.org/10.33640/2405-609X.1137
Kandukuri, B. R., Ramakrishna, P. V., & Rakshit, A. (2009). Cloud security issues. SCC 2009 - 2009 IEEE International Conference on Services Computing, 517–520. https://doi.org/10.1109/SCC.2009.84
Kaufman, L. M. (2010). Can Public-Cloud Security Meet Its Unique Challenges? http://csrc.nist.gov/groups/
Kolate, V., & Joshi, R. B. (2021). An Information Security Using DNA Cryptography along with AES Algorithm. In Turkish Journal of Computer and Mathematics Education, 12(1), 2021.
Muttik, I., & Barton, C. (2009). Cloud security technologies. Information Security Technical Report, 14(1), 1–6.
https://doi.org/10.1016/j.istr.2009.03.001
Namasudra, S., Chakraborty, R., Majumder, A., & Moparthi, N. R. (2021). Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment. ACM Transactions on Multimedia Computing, Communications and Applications, 16(3s). https://doi.org/10.1145/3392665
Noor, T. H., Sheng, Q. Z., Zeadally, S., & Yu, J. (2013). Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Surveys, 46(1). https://doi.org/10.1145/2522968.2522980
Patnala, B. D., & Kiran Kumar, R. (2019). A Novel Level-Based DNA Security Algorithm Using DNA Codons. Springer Verlag. In SpringerBriefs in Applied Sciences and Technology, pp. 1–13. https://doi.org/10.1007/978-981-13-0544-3_1
Pavithran, P., Mathew, S., Namasudra, S., & Lorenz, P. (2021). A novel cryptosystem based on DNA cryptography and randomly generated mealy machine. Computers and Security, 104. https://doi.org/10.1016/j.cose.2020.102160
Rama Devi, K., & Bhuvaneswari, E. (2022). An Enhancement in Data Security Using Trellis Algorithm with DNA Sequences in Symmetric DNA Cryptography. Wireless Personal Communications. https://doi.org/10.1007/s11277-022-10102-8
Rosado, D. G., Gómez, R., Mellado, D., & Fernández-Medina, E. (2012). Security Analysis in the Migration to Cloud Environments. Future Internet, 4(2), 469–487. https://doi.org/10.3390/fi4020469
Safaa, H., Adill, S., & Yakoob, A. (2023). Information Security Using DNA Sequences. 30(4). https://doi.org/10.29196/jubpas.v30i4.4397
Sakr, S., Liu, A., Batista, D. M., & Alomari, M. (2011). A survey of large scale data management approaches in cloud environments. In IEEE Communications Surveys and Tutorials,13(3), 311–336. https://doi.org/10.1109/SURV.2011.032211.00087
Stallings, W. (2005). Cryptography and Network Security Principles and Practices, Fourth Edition.
Tiwari, H. D., & Kim, J. H. (2018). Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices. ETRI Journal, 40(3), 396–409. https://doi.org/10.4218/etrij.2017-0220
Varadharajan, V., & Tupakula, U. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1), 60–75. https://doi.org/10.1109/TNSM.2014.041614.120394
Young, K. H., Weisenburger, D. D., Dave, B. J., Smith, L., Sanger, W., Iqbal, J., Campo, E., Delabie, J., Gascoyne, R. D., Ott, G., Rimsza, L., Konrad, Mü Ller-Hermelink, H., Jaffe, E. S., Rosenwald, A., Staudt, L. M., Chan, W. C., & Greiner, T. C. (2007). Mutations in the DNA-binding codons of TP53, which are associated with decreased expression of TRAIL receptor-2, predict for poor survival in diffuse large B-cell lymphoma. https://doi.org/10.1182/blood-2007-02
Zhang, Y., Xiao, D., Wen, W., & Wong, K. W. (2014). On the security of symmetric ciphers based on DNA coding. Information Sciences, 289(1), 254–261. https://doi.org/10.1016/j.ins.2014.08.005