Abstract
Today, the size of a multimedia file is increasing day by day from gigabytes to terabytes or even petabytes, mainly because of the evolution of a large amount of real-time data. As most of the multimedia files are transmitted through the internet, hackers and attackers try to access the users’ personal and confidential data without any authorization. Thus, maintaining a strong security technique has become a significant concerned to protect the personal information. Deoxyribonucleic Acid (DNA) computing is an advanced field for improving security, which is based on the biological concept of DNA. A novel DNA-based encryption scheme is proposed in this article for protecting multimedia files in the cloud computing environment. Here, a 1024-bit secret key is generated based on DNA computing and the user's attributes and password to encrypt any multimedia file. To generate the secret key, the decimal encoding rule, American Standard Code for Information Interchange value, DNA reference key, and complementary rule are used, which enable the system to protect the multimedia file against many security attacks. Experimental results, as well as theoretical analyses, show the efficiency of the proposed scheme over some well-known existing schemes.
- A. Huth and J. Chebula. 2011. The Basics of Cloud Computing. Carnegie Mellon University, Pittsburgh, PA.Google Scholar
- S. Namasudra, S. Nath, and A. Majumder. 2014. Profile based access control model in cloud computing environment. In Proceedings of the International Conference on Green Computing, Communication, and Electrical Engineering. IEEE, Los Alamitos, CA, 1--5.Google Scholar
- S. Li, G. Wang, and J. Yang. 2019. Survey on cloud model based similarity measure of uncertain concepts. CAAI Transactions on Intelligence Technology 4, 4 (2019), 223--230.Google Scholar
Digital Library
- S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini. 2020. Towards DNA based data security in the cloud computing environment. Computer Communications 151 (2020), 539--547.Google Scholar
Digital Library
- S. Namasudra. 2019. An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Exercise 31, 3 (2019), e4364.Google Scholar
Cross Ref
- M. Sarkar, K. Saha, S. Namasudra, and P. Roy. 2015. An efficient and time saving web service based Android application. SSRG International Journal of Computer Science and Engineering 2, 8 (2015), 18--21.Google Scholar
- S. Namasudra, P. Roy, and B. Balamurugan. 2017. Cloud computing: Fundamentals and research issues. In Proceedings of the 2nd International Conference on Recent Trends and Challenges in Computational Models. IEEE, Los Alamitos, CA.Google Scholar
- R. M. Alguliyev, R. M. Aliguliyev, and L. V. Sukhostat. 2020. Efficient algorithm for big data clustering on single machine. CAAI Transactions on Intelligence Technology 5, 1 (2020), 9--14.Google Scholar
Digital Library
- S. Namasudra. 2018. Taxonomy of DNA-based security models. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka (Eds.). Taylor 8 Francis, 53--68.Google Scholar
- S. Namasudra, P. Roy, B. Balamurugan, and P. Vijayakumar. 2017. Data accessing based on the popularity value for cloud computing. In Proceedings of the International Conference on Innovations in Information, Embedded, and Communications Systems (ICIIECS’17). IEEE, Los Alamitos, CA.Google Scholar
- S. Namasudra, G. C. Deka, P. Johri, M. Hosseinpour, and A. H. Gandomi. 2020. The revolution of blockchain: State-of-the-art and research challenges. Archives of Computational Methods in Engineering. In Press.Google Scholar
- D. Devi, S. Namasudra, and S. Kadry. 2020. A boosting-aided adaptive cluster-based undersampling approach for treatment of class imbalance problem. International Journal of Data Warehousing and Mining 16, 3 (2020), 1--27.Google Scholar
Digital Library
- S. Namasudra and P. Roy. 2016. Secure and efficient data access control in cloud computing environment: A survey. Multiagent and Grid Systems 12, 2 (2016), 69--90.Google Scholar
Cross Ref
- S. Namasudra and G. C. Deka. 2018. Advances of DNA Computing in Cryptography. Taylor 8 Francis.Google Scholar
- S. Namasudra, D. Devi, S. Choudhary, R. Patan, and S. Kallam. 2018. Security, privacy, trust, and anonymity. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka (Eds.). Taylor 8 Francis, 153--166.Google Scholar
- S. Namasudra and P. Roy. 2017. Time saving protocol for data accessing in cloud computing. IET Communications 11, 10 (2017), 1558--1565.Google Scholar
Digital Library
- S. Namasudra. 2020. Data access control in the cloud computing environment for bioinformatics. International Journal of Applied Research in Bioinformatics. In Press.Google Scholar
- G. C. Deka, M. Kathing, and D. P. Kumar. 2013. Library automation in cloud. In Proceedings of the International Conference on Computational Intelligence and Communication Networks.Google Scholar
- S. Namasudra and G. C. Deka. 2018. Introduction of DNA computing in cryptography. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka (Eds.). Taylor 8 Francis, 27--34.Google Scholar
- S. Namasudra and P. Roy. 2018. PpBAC: Popularity based access control model for cloud computing. Journal of Organizational and End User Computing 30, 4 (2018), 14--31.Google Scholar
Digital Library
- S. Namasudra, G. C. Deka, and R. Bali. 2018. Applications and future trends of DNA computing. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka (Eds.). Taylor 8 Francis, 181--192.Google Scholar
- X. Zhao, R. Li, and X. Zuo. 2019. Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Transactions on Intelligence Technology 4, 3 (2019), 159--174.Google Scholar
Digital Library
- S. Namasudra and P. Roy. 2016. A new table based protocol for data accessing in cloud computing. Journal of Information Science and Engineering 33, 3 (2016), 585--609.Google Scholar
- A. Shamir. 1985. Identity-based cryptosystems and signature schemes. In Advances in Cryptology, G. R. Blakley and D. Chaum (Eds.). Springer, 47--53.Google Scholar
- D. F. Ferraiolo and D. R. Kuhn. 1992. Role-based access controls. In Proceedings of the 15th National Computer Security Conference. 554--563.Google Scholar
- V. Goyal, O. Pandey, A. Sahai, and B. Waters. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security. 89--98.Google Scholar
- J. Bethencourt, A. Sahai, and B. Waters. 2007. Ciphertext-policy attribute based encryption. In Proceedings of the IEEE Symposium on Security and Privacy. 321--334.Google Scholar
- R. Mian, P. Martin, and J. L. V. Poletti. 2013. Provisioning data analytic workloads in a cloud. Future Generation Computer Systems 29, 6 (2013), 1452--1458.Google Scholar
Digital Library
- S. Ajgaonkar, H. Indalkar, and J. Jeswani. 2015. Activity based access control model for cloud computing. International Journal of Current Engineering and Technology 5, 2 (2015), 708--713.Google Scholar
- S. Raghavendra, K. Meghanaa, P. A. Doddabasappaa, C. M. Geetaa, Rajkumar Buyyab, K. R. Venugopala, S. S. Iyengarc, and L. M. Patnaik. 2016. Index generation and secure multi-user access control over an encrypted cloud data. Procedia Computer Science 89 (2016), 293--300.Google Scholar
Cross Ref
- G. Cui, Y. Liu, and X. Zhang. 2006. New direction of data storage: DNA molecular storage technology. Computer Engineering and Application 42, 26 (2006), 29--32.Google Scholar
- C. T. Clelland, V. Risca, and C. Bancroft. 1999. Hiding messages in DNA microdots. Nature 399, 6736 (1999), 533--534.Google Scholar
- K. Tanaka, A. Okamoto, and I. Saito. 2005. Public-key system using DNA as a one-way function for key distribution. Biosystems 81, 1 (2005), 25--29.Google Scholar
Cross Ref
- R. Enayatifar, A. H. Abdullah, and I. F. Isnin. 2014. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering 56 (2014), 83--93.Google Scholar
Cross Ref
- B. Wang, Y. Xie, S. Zhou, C. Zhou, and X. Zheng. 2017. Reversible data hiding based on DNA computing. Computational Intelligence and Neuroscience 2017 (2017), Article 7276084.Google Scholar
- Y. Wang, Q. Han, G. Cui, and J. Sun. 2019. Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Transactions on Nanotechnology 18 (2019), 299--307.Google Scholar
Cross Ref
- A. Leier, C. Richter, W. Banzhaf, and H. Rauhe. 2000. Cryptography with DNA binary strands. Biosystems 57, 1 (2000), 13--22.Google Scholar
Cross Ref
- L. MingXin, L. XueJia, X. GuoZhen, and Q. Lei. 2007. Symmetric-key cryptosystem with DNA technology. Science in China Series F: Information Sciences 50, 3 (2007), 324--333.Google Scholar
Cross Ref
- S. Namasudra. 2018. Cloud computing: A new era. Journal of Fundamental and Applied Sciences 10, 2 (2018), 113--135.Google Scholar
- R. Isawa and M. Morii. 2011. One-time password authentication scheme to solve stolen verifier problem. In Proceedings of the Forum on Information Technology. 225--228.Google Scholar
- K. Schramm, T. J. Wollinger, and C. Paar. 2003. A new class of collision attacks and its application to DES. In Proceedings of the Fast Software Encryption Conference. 206--222.Google Scholar
- T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. 2007. Social phishing. Communications of the ACM 50, 10 (2007), 94--100.Google Scholar
Digital Library
- L. Gong. 1995. Optimal authentication protocols resistant to password guessing attacks. In Proceedings of the 8th IEEE Computer Security Foundations Workshop. IEEE, Los Alamitos, CA, 24--29.Google Scholar
Cross Ref
- M. B. Salem and S. J. Stolfo. 2011. Decoy document deployment for effective masquerade attack detection. In Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. ACM, New York, NY, 35--54.Google Scholar
- R. N. Calheiros, R. Ranjan, and A. Beloglazov. 2011. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience 41, 1 (2011), 23--50.Google Scholar
Digital Library
- Apache Commons Math. 2019. Home Page. Retrieved September 14, 2019 from http://commons.apache.org/proper/commons-math/download_math.cgi.Google Scholar
- Java. 2019. Home Page. Retrieved September 14, 2019 from http://java.com/en/download/index.jsp.Google Scholar
- CityPulse Dataset Collection. 2019. Home Page. Retrieved September 15, 2020 from http://iot.ee.surrey.ac.uk:8080/datasets.html.Google Scholar
Index Terms
Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment
Recommendations
Towards DNA based data security in the cloud computing environment
AbstractNowadays, data size is increasing day by day from gigabytes to terabytes or even petabytes, mainly because of the evolution of a large amount of real-time data. Most of the big data is transmitted through the internet and they are ...
Obfuscation for multi-use re-encryption and its application in cloud computing
With the rapid development of cloud computing, more and more data are being centralized into cloud server for sharing. It is a challenge problem on how to keep them both private and accessible. Re-encryption function is a useful tool to fulfill secure ...
A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
Highlights- A novel cryptosystem is proposed by using DNA computing in the cloud-based IoT infrastructure.
AbstractIn this digital era, most of the data of an Internet of Things (IoT) infrastructure are communicated over the internet and they are stored in a cloud environment. As there are numerous users and attackers over the internet, IoT data ...
Graphical abstractDisplay Omitted






Comments