skip to main content
research-article

Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment

Published:17 December 2020Publication History
Skip Abstract Section

Abstract

Today, the size of a multimedia file is increasing day by day from gigabytes to terabytes or even petabytes, mainly because of the evolution of a large amount of real-time data. As most of the multimedia files are transmitted through the internet, hackers and attackers try to access the users’ personal and confidential data without any authorization. Thus, maintaining a strong security technique has become a significant concerned to protect the personal information. Deoxyribonucleic Acid (DNA) computing is an advanced field for improving security, which is based on the biological concept of DNA. A novel DNA-based encryption scheme is proposed in this article for protecting multimedia files in the cloud computing environment. Here, a 1024-bit secret key is generated based on DNA computing and the user's attributes and password to encrypt any multimedia file. To generate the secret key, the decimal encoding rule, American Standard Code for Information Interchange value, DNA reference key, and complementary rule are used, which enable the system to protect the multimedia file against many security attacks. Experimental results, as well as theoretical analyses, show the efficiency of the proposed scheme over some well-known existing schemes.

References

  1. A. Huth and J. Chebula. 2011. The Basics of Cloud Computing. Carnegie Mellon University, Pittsburgh, PA.Google ScholarGoogle Scholar
  2. S. Namasudra, S. Nath, and A. Majumder. 2014. Profile based access control model in cloud computing environment. In Proceedings of the International Conference on Green Computing, Communication, and Electrical Engineering. IEEE, Los Alamitos, CA, 1--5.Google ScholarGoogle Scholar
  3. S. Li, G. Wang, and J. Yang. 2019. Survey on cloud model based similarity measure of uncertain concepts. CAAI Transactions on Intelligence Technology 4, 4 (2019), 223--230.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini. 2020. Towards DNA based data security in the cloud computing environment. Computer Communications 151 (2020), 539--547.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Namasudra. 2019. An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Exercise 31, 3 (2019), e4364.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Sarkar, K. Saha, S. Namasudra, and P. Roy. 2015. An efficient and time saving web service based Android application. SSRG International Journal of Computer Science and Engineering 2, 8 (2015), 18--21.Google ScholarGoogle Scholar
  7. S. Namasudra, P. Roy, and B. Balamurugan. 2017. Cloud computing: Fundamentals and research issues. In Proceedings of the 2nd International Conference on Recent Trends and Challenges in Computational Models. IEEE, Los Alamitos, CA.Google ScholarGoogle Scholar
  8. R. M. Alguliyev, R. M. Aliguliyev, and L. V. Sukhostat. 2020. Efficient algorithm for big data clustering on single machine. CAAI Transactions on Intelligence Technology 5, 1 (2020), 9--14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Namasudra. 2018. Taxonomy of DNA-based security models. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka (Eds.). Taylor 8 Francis, 53--68.Google ScholarGoogle Scholar
  10. S. Namasudra, P. Roy, B. Balamurugan, and P. Vijayakumar. 2017. Data accessing based on the popularity value for cloud computing. In Proceedings of the International Conference on Innovations in Information, Embedded, and Communications Systems (ICIIECS’17). IEEE, Los Alamitos, CA.Google ScholarGoogle Scholar
  11. S. Namasudra, G. C. Deka, P. Johri, M. Hosseinpour, and A. H. Gandomi. 2020. The revolution of blockchain: State-of-the-art and research challenges. Archives of Computational Methods in Engineering. In Press.Google ScholarGoogle Scholar
  12. D. Devi, S. Namasudra, and S. Kadry. 2020. A boosting-aided adaptive cluster-based undersampling approach for treatment of class imbalance problem. International Journal of Data Warehousing and Mining 16, 3 (2020), 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Namasudra and P. Roy. 2016. Secure and efficient data access control in cloud computing environment: A survey. Multiagent and Grid Systems 12, 2 (2016), 69--90.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Namasudra and G. C. Deka. 2018. Advances of DNA Computing in Cryptography. Taylor 8 Francis.Google ScholarGoogle Scholar
  15. S. Namasudra, D. Devi, S. Choudhary, R. Patan, and S. Kallam. 2018. Security, privacy, trust, and anonymity. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka (Eds.). Taylor 8 Francis, 153--166.Google ScholarGoogle Scholar
  16. S. Namasudra and P. Roy. 2017. Time saving protocol for data accessing in cloud computing. IET Communications 11, 10 (2017), 1558--1565.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Namasudra. 2020. Data access control in the cloud computing environment for bioinformatics. International Journal of Applied Research in Bioinformatics. In Press.Google ScholarGoogle Scholar
  18. G. C. Deka, M. Kathing, and D. P. Kumar. 2013. Library automation in cloud. In Proceedings of the International Conference on Computational Intelligence and Communication Networks.Google ScholarGoogle Scholar
  19. S. Namasudra and G. C. Deka. 2018. Introduction of DNA computing in cryptography. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka (Eds.). Taylor 8 Francis, 27--34.Google ScholarGoogle Scholar
  20. S. Namasudra and P. Roy. 2018. PpBAC: Popularity based access control model for cloud computing. Journal of Organizational and End User Computing 30, 4 (2018), 14--31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Namasudra, G. C. Deka, and R. Bali. 2018. Applications and future trends of DNA computing. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka (Eds.). Taylor 8 Francis, 181--192.Google ScholarGoogle Scholar
  22. X. Zhao, R. Li, and X. Zuo. 2019. Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Transactions on Intelligence Technology 4, 3 (2019), 159--174.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Namasudra and P. Roy. 2016. A new table based protocol for data accessing in cloud computing. Journal of Information Science and Engineering 33, 3 (2016), 585--609.Google ScholarGoogle Scholar
  24. A. Shamir. 1985. Identity-based cryptosystems and signature schemes. In Advances in Cryptology, G. R. Blakley and D. Chaum (Eds.). Springer, 47--53.Google ScholarGoogle Scholar
  25. D. F. Ferraiolo and D. R. Kuhn. 1992. Role-based access controls. In Proceedings of the 15th National Computer Security Conference. 554--563.Google ScholarGoogle Scholar
  26. V. Goyal, O. Pandey, A. Sahai, and B. Waters. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security. 89--98.Google ScholarGoogle Scholar
  27. J. Bethencourt, A. Sahai, and B. Waters. 2007. Ciphertext-policy attribute based encryption. In Proceedings of the IEEE Symposium on Security and Privacy. 321--334.Google ScholarGoogle Scholar
  28. R. Mian, P. Martin, and J. L. V. Poletti. 2013. Provisioning data analytic workloads in a cloud. Future Generation Computer Systems 29, 6 (2013), 1452--1458.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Ajgaonkar, H. Indalkar, and J. Jeswani. 2015. Activity based access control model for cloud computing. International Journal of Current Engineering and Technology 5, 2 (2015), 708--713.Google ScholarGoogle Scholar
  30. S. Raghavendra, K. Meghanaa, P. A. Doddabasappaa, C. M. Geetaa, Rajkumar Buyyab, K. R. Venugopala, S. S. Iyengarc, and L. M. Patnaik. 2016. Index generation and secure multi-user access control over an encrypted cloud data. Procedia Computer Science 89 (2016), 293--300.Google ScholarGoogle ScholarCross RefCross Ref
  31. G. Cui, Y. Liu, and X. Zhang. 2006. New direction of data storage: DNA molecular storage technology. Computer Engineering and Application 42, 26 (2006), 29--32.Google ScholarGoogle Scholar
  32. C. T. Clelland, V. Risca, and C. Bancroft. 1999. Hiding messages in DNA microdots. Nature 399, 6736 (1999), 533--534.Google ScholarGoogle Scholar
  33. K. Tanaka, A. Okamoto, and I. Saito. 2005. Public-key system using DNA as a one-way function for key distribution. Biosystems 81, 1 (2005), 25--29.Google ScholarGoogle ScholarCross RefCross Ref
  34. R. Enayatifar, A. H. Abdullah, and I. F. Isnin. 2014. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering 56 (2014), 83--93.Google ScholarGoogle ScholarCross RefCross Ref
  35. B. Wang, Y. Xie, S. Zhou, C. Zhou, and X. Zheng. 2017. Reversible data hiding based on DNA computing. Computational Intelligence and Neuroscience 2017 (2017), Article 7276084.Google ScholarGoogle Scholar
  36. Y. Wang, Q. Han, G. Cui, and J. Sun. 2019. Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Transactions on Nanotechnology 18 (2019), 299--307.Google ScholarGoogle ScholarCross RefCross Ref
  37. A. Leier, C. Richter, W. Banzhaf, and H. Rauhe. 2000. Cryptography with DNA binary strands. Biosystems 57, 1 (2000), 13--22.Google ScholarGoogle ScholarCross RefCross Ref
  38. L. MingXin, L. XueJia, X. GuoZhen, and Q. Lei. 2007. Symmetric-key cryptosystem with DNA technology. Science in China Series F: Information Sciences 50, 3 (2007), 324--333.Google ScholarGoogle ScholarCross RefCross Ref
  39. S. Namasudra. 2018. Cloud computing: A new era. Journal of Fundamental and Applied Sciences 10, 2 (2018), 113--135.Google ScholarGoogle Scholar
  40. R. Isawa and M. Morii. 2011. One-time password authentication scheme to solve stolen verifier problem. In Proceedings of the Forum on Information Technology. 225--228.Google ScholarGoogle Scholar
  41. K. Schramm, T. J. Wollinger, and C. Paar. 2003. A new class of collision attacks and its application to DES. In Proceedings of the Fast Software Encryption Conference. 206--222.Google ScholarGoogle Scholar
  42. T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. 2007. Social phishing. Communications of the ACM 50, 10 (2007), 94--100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. L. Gong. 1995. Optimal authentication protocols resistant to password guessing attacks. In Proceedings of the 8th IEEE Computer Security Foundations Workshop. IEEE, Los Alamitos, CA, 24--29.Google ScholarGoogle ScholarCross RefCross Ref
  44. M. B. Salem and S. J. Stolfo. 2011. Decoy document deployment for effective masquerade attack detection. In Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. ACM, New York, NY, 35--54.Google ScholarGoogle Scholar
  45. R. N. Calheiros, R. Ranjan, and A. Beloglazov. 2011. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience 41, 1 (2011), 23--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Apache Commons Math. 2019. Home Page. Retrieved September 14, 2019 from http://commons.apache.org/proper/commons-math/download_math.cgi.Google ScholarGoogle Scholar
  47. Java. 2019. Home Page. Retrieved September 14, 2019 from http://java.com/en/download/index.jsp.Google ScholarGoogle Scholar
  48. CityPulse Dataset Collection. 2019. Home Page. Retrieved September 15, 2020 from http://iot.ee.surrey.ac.uk:8080/datasets.html.Google ScholarGoogle Scholar

Index Terms

  1. Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!