Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2021, Vol. 15 Issue (3) : 153807    https://doi.org/10.1007/s11704-019-9015-2
RESEARCH ARTICLE
A novel DNA-inspired encryption strategy for concealing cloud storage
Abhishek MAJUMDAR1(), Arpita BISWAS1, Atanu MAJUMDER2, Sandeep Kumar SOOD3, Krishna Lal BAISHNAB1
1. Department of Electronics and Communication Engineering, NIT Silchar, Silchar, Assam-788010, India
2. National Informatics Centre, Agartala, Tripura-799001, India
3. Computer Science & Informatics, Central University of Himachal Pradesh, Dharamsala, HP-176206, India
 Download: PDF(956 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Over the last few years, the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely. This study presents such a secured cloud storage framework comprising of a deoxyribonucleic acid (DNA) based encryption key which has been generated to make the framework unbreakable, thus ensuring a better and secured distributed cloud storage environment. Furthermore, this work proposes a novel DNAbased encryption technique inspired by the biological characteristics of DNA and the protein synthesis mechanism. The introduced DNA based model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers on which the data must be stored. A fuzzy-based technique for order of preference by similarity to ideal solution (TOPSIS) multi-criteria decisionmaking (MCDM) model has been employed to achieve the above-mentioned goal. This can decide the set of suitable storage servers and also results in a reduction in execution time by keeping up the level of security to an improved grade. This study also investigates and analyzes the strength of the proposed S-Box and encryption technique against some standard criteria and benchmarks, such as avalanche effect, correlation coefficient, information entropy, linear probability, and differential probability etc. After the avalanche effect analysis, the average change in cipher-text has been found to be 51.85%. Moreover, thorough security, sensitivity and functionality analysis show that the proposed scheme guarantees high security with robustness.

Keywords cloud storage security      DNA cryptography      fuzzy logic      MCDM     
Corresponding Author(s): Abhishek MAJUMDAR   
Just Accepted Date: 15 November 2019   Issue Date: 24 December 2020
 Cite this article:   
Abhishek MAJUMDAR,Arpita BISWAS,Atanu MAJUMDER, et al. A novel DNA-inspired encryption strategy for concealing cloud storage[J]. Front. Comput. Sci., 2021, 15(3): 153807.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-019-9015-2
https://academic.hep.com.cn/fcs/EN/Y2021/V15/I3/153807
1 A T Velte, T J Velte, R C Elsenpeter, R C Elsenpeter. Cloud Computing: A Practical Approach. New York: McGraw-Hill, 2010, 44
2 S Kamara, K Lauter. Cryptographic cloud storage. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2010, 136–149
https://doi.org/10.1007/978-3-642-14992-4_13
3 N Cao, C Wang, M Li, K Ren, W Lou. Privacy preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222–233
https://doi.org/10.1109/TPDS.2013.45
4 C Wang, Q Wang, K Ren, W Lou. Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop on Quality of Service. 2009, 1–9
5 Q Wang, C Wang, K Ren, W Lou, J Li. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847–859
https://doi.org/10.1109/TPDS.2010.183
6 M Chase, S Kamara. Structured encryption and controlled disclosure. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2010, 577–594
https://doi.org/10.1007/978-3-642-17373-8_33
7 P Prasad, B Ojha, R R Shahi, R Lal, A Vaish, U Goel. 3 dimensional security in cloud computing. In: Proceedings of the 3rd International Conference on Computer Research and Development. 2011, 198–201
https://doi.org/10.1109/ICCRD.2011.5764279
8 S K Sood, A K Sarje, K A Singh. Secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 2011, 34(2): 609–618
https://doi.org/10.1016/j.jnca.2010.11.011
9 S K Sood. A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 2012, 35(6): 1831–1838
https://doi.org/10.1016/j.jnca.2012.07.007
10 B Dong, Q Zheng, F Tian, K M Chao, R Ma, R Anane. An optimized approach for storing and accessing small files on cloud storage. Journal of Network and Computer Applications, 2012, 35(6): 1847–1862
https://doi.org/10.1016/j.jnca.2012.07.009
11 X A Wang, X Huang, X Yang, L Liu, X Wu. Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 2012, 85(3): 643–654
https://doi.org/10.1016/j.jss.2011.09.035
12 J Shao, Z Cao, X Liang, H Lin. Proxy re-encryption with keyword search. Information Sciences, 2010, 180(13): 2576–2587
https://doi.org/10.1016/j.ins.2010.03.026
13 J Spillner, J MüLler, A Schill. Creating optimal cloud storage systems. Future Generation Computer Systems, 2013, 29(4): 1062–1072
https://doi.org/10.1016/j.future.2012.06.004
14 Z Xia, X Wang, X Sun, Q Wang. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340–352
https://doi.org/10.1109/TPDS.2015.2401003
15 R Chen, Y Mu, G Yang, F Guo, X Wang. Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 2016, 11(4): 789–798
16 N Kaaniche, M Laurent. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 2017, 111: 120–141
https://doi.org/10.1016/j.comcom.2017.07.006
17 X A Wang, J Ma, F Xhafa, M Zhang, X Luo. Cost effective secure Ehealth cloud system using identity based cryptographic techniques. Future Generation Computer Systems, 2017, 67: 242–254
https://doi.org/10.1016/j.future.2016.08.008
18 X A Wang, X Yang, C Li, Y Liu, Y Ding. Improved functional proxy reencryption schemes for secure cloud data sharing. Computer Science & Information Systems, 2018, 15(3): 585–614
https://doi.org/10.2298/CSIS171218024W
19 X A Wang, Y Liu, J Zhang, X Yang, M Zhang. Improved group-oriented proofs of cloud storage in IoT setting. Concurrency and Computation: Practice and Experience, 2018, 30(21): e4781
https://doi.org/10.1002/cpe.4781
20 H Cui, R H Deng, Y Li. Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 2018, 79: 461–472
https://doi.org/10.1016/j.future.2017.10.010
21 G S S Jose, C S Christopher. Secure cloud data storage approach in elearning systems. Cluster Computing, 2019, 22(5): 12857–12862
https://doi.org/10.1007/s10586-018-1785-z
22 A Gehani, T LaBean, J Reif. DNA-based cryptography. In: Jonoska N, Pˇaun G, Rozenberg G, eds. Aspects of Molecular Computing. Springer, Berlin, Heidelberg, 2003, 167–188
https://doi.org/10.1007/978-3-540-24635-0_12
23 S T Amin, M Saeb, S El-Gindi. A DNA-based implementation of YAEA encryption algorithm. In: Proceedings of the 2nd IASTED International Conference on Computational Intelligence. 2006
24 G Cui, L Qin, Y Wang, X Zhang. An encryption scheme using DNA technology. In: Proceedings of the 3rd International Conference on Bio- Inspired Computing: Theories and Applications. 2008, 37–42
https://doi.org/10.1109/BICTA.2008.4656701
25 X Wang, Q Zhang. DNA computing-based cryptography. In: Proceedings of the 4th International Conference on Bio-Inspired Computing. 2009, 1–3
https://doi.org/10.1109/BICTA.2009.5338153
26 S Sadeg, M Gougache, N Mansouri, H Drias. An encryption algorithm inspired from DNA. In: Proceedings of International Conference on Machine and Web Intelligence. 2010, 344–349
https://doi.org/10.1109/ICMWI.2010.5648076
27 Z Yunpeng, Z Yu, W Zhong, R O Sinnott. Index-based symmetric DNA encryption algorithm. In: Proceedings of the 4th International Congress on Image and Signal Processing. 2011, 2290–2294
https://doi.org/10.1109/CISP.2011.6100690
28 M R Abbasy, B Shanmugam. Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences. In: Proceedings of IEEE World Congress on Services. 2011, 385–390
https://doi.org/10.1109/SERVICES.2011.45
29 A Khalifa, A Atito. High-capacity DNA-based steganography. In: Proceedings of the 8th International Conference on Informatics and Systems. 2012, 76–80
30 A Atito, A Khalifa, S Z Rida. DNA-based data encryption and hiding using play-fair and insertion techniques. Journal of Communications and Computer Engineering, 2012, 2(3): 44
https://doi.org/10.20454/jcce.2012.242
31 S Pramanik, S K Setua. DNA cryptography. In: Proceedings of the 7th International Conference on Electrical & Computer Engineering. 2012, 551–554
https://doi.org/10.1109/ICECE.2012.6471609
32 T Mandge, V Choudhary. A DNA encryption technique based on matrix manipulation and secure key generation scheme. In: Proceedings of International Conference on Information Communication and Embedded Systems. 2013, 47–52
https://doi.org/10.1109/ICICES.2013.6508181
33 N Kar, A Majumder, A Saha, S Deb, M C Pal. Data security and cryptography based on DNA sequencing. International Journal of Information Technology & Computer Science, 2013, 10(3): 24–32
34 D S Chouhan, R P Mahajan. An architectural framework for encryption & generation of digital signature using DNA cryptography. In: Proceedings of International Conference on Computing for Sustainable Global Development. 2014, 743–748
35 A Aich, A Sen, S R Dash, S Dehuri. A symmetric key cryptosystem using DNA sequence with OTP key. In: Mandal J, Satapathy S, Kumar Sanyal M, Sarkar P, Mukhopadhyay A, eds. Information Systems Design and Intelligent Applications. Springer, New Delhi, 2015, 207–215
https://doi.org/10.1007/978-81-322-2247-7_22
36 N H UbaidurRahman, C Balamurugan, R Mariappan. A novel DNA computing based encryption and decryption algorithm. Procedia Computer Science, 2015, 46: 463–475
https://doi.org/10.1016/j.procs.2015.02.045
37 S Marwan, A Shawish, K Nagaty. DNA-based cryptographic methods for data hiding in DNA media. Biosystems, 2016, 150: 110–118
https://doi.org/10.1016/j.biosystems.2016.08.013
38 M Thangavel, P Varalakshmi. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Computing, 2018, 21(2): 1411–1437
https://doi.org/10.1007/s10586-017-1368-4
39 B D Patnala, R K Kumar. A novel level-based DNA security algorithm using DNA codons. In: Computational Intelligence and Big Data Analytics. Springer, Singapore, 2019, 1–13
https://doi.org/10.1007/978-981-13-0544-3_1
40 A Elhadad. Data sharing using proxy re-encryption based on DNA computing. Soft Computing, 2020, 24(3): 2101–2108
https://doi.org/10.1007/s00500-019-04041-z
41 S Basu, M Karuppiah, M Nasipuri, A K Halder, N Radhakrishnan. Bioinspired cryptosystem with DNA cryptography and neural networks. Journal of Systems Architecture, 2019, 94: 24–31
https://doi.org/10.1016/j.sysarc.2019.02.005
42 L Pray. Discovery of DNA structure and function: Watson and Crick. Nature Education, 2008
43 H Wu, Q Wang, K Wolter. Methods of cloud-path selection for offloading in mobile cloud computing systems. In: Proceedings of the 4th International Conference on Cloud Computing Technology and Science. 2012, 443–448
https://doi.org/10.1109/CloudCom.2012.6427587
44 A Majumder, A Majumdar, T Podder, N Kar, M Sharma. Secure data communication and cryptography based on DNA based message encoding. In: Proceedings of International Conference on Advanced Communication Control and Computing Technologies. 2014, 360–363
https://doi.org/10.1109/ICACCCT.2014.7019464
45 A Majumdar, T Podder, A Majumder, N Kar, M Sharma. DNA-based cryptographic approach toward information security. In: Jain L, Patnaik S, Ichalkaranje N, eds. Intelligent Computing, Communication and Devices. Springer, New Delhi, 2015, 209–219
https://doi.org/10.1007/978-81-322-2012-1_22
46 Q Zhang, L Guo, X Xue, X Wei. An image encryption algorithm based on DNA sequence addition operation. In: Proceedings of the 4th International on Conference on Bio Inspired Computing. 2009, 1–5
https://doi.org/10.1109/BICTA.2009.5338151
47 O Tornea, M E Borda. DNA cryptographic algorithms. In: Proceedings of International Conference on Advancements of Medicine and Health Care through Technology. 2009, 223–226
https://doi.org/10.1007/978-3-642-04292-8_49
48 M Sabry, M Hashem, T Nazmy. Three reversible data encoding algorithms based on dna and amino acids’ structure. International Journal of Computer Applications, 2012, 54(8): 24–30
https://doi.org/10.5120/8588-2339
49 A Agrawal, A Bhopale, J Sharma, M S Ali, D Gautam. Implementation of DNA algorithm for secure voice communication. International Journal of Scientific & Engineering Research, 2012, 3(6): 1–5
50 G S Sundaram, S Pavithra, A Arthi, B M Bala, S Mahalakshmi. Cellular automata based DNA cryptography algorithm. In: Proceedings of the 9th International Conference on Intelligent Systems and Control. 2015, 1–6
https://doi.org/10.1109/ISCO.2015.7282333
51 G Gugnani, S P Ghrera, P K Gupta, R Malekian, B T Maharaj. Implementing DNA encryption technique in Web services to embed confidentiality in cloud. In: Proceedings of the 2nd International Conference on Computer and Communication Technologies. 2016, 407–415
https://doi.org/10.1007/978-81-322-2526-3_42
[1] Houda AKREMI, Sami ZGHAL. DOF: a generic approach of domain ontology fuzzification[J]. Front. Comput. Sci., 2021, 15(3): 153322-.
[2] Samir ZEGHLACHE,Djamel SAIGAA,Kamel KARA. Fault tolerant control based on neural network interval type-2 fuzzy sliding mode controller for octorotor UAV[J]. Front. Comput. Sci., 2016, 10(4): 657-672.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed