Advertisement

Cluster Computing

, Volume 21, Issue 2, pp 1411–1437 | Cite as

Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud

  • M. ThangavelEmail author
  • P. Varalakshmi
Article
  • 315 Downloads

Abstract

Cloud computing enables the access of the resources such as network hardware’s, storage, applications and services that are configurable based on the demand in a network especially specific to the operations on the data. The need for data security in the cloud is progressively higher as the abundant sensitive data in the cloud are transferred among various stakeholders for data operations leads to loss of data confidentiality. To maintain data confidentiality in the cloud, the data need to be encrypted with cryptographic algorithms. Existing cryptographic algorithms face the challenges of key management, dynamic encryption, and computational complexity. In this paper, a novel variant of DNA cryptosystem is proposed to secure the original data within the DNA nucleotides providing greater storage space, reduced overhead and dynamic operations. The significance of DNA is incorporated in the proposed Novel DNA cryptosystem, which encrypts the data transferred between the Data Owner and the Data User in the cloud. Enhanced ElGamal cryptosystem is the proposed asymmetric cryptosystem used to address key management issues in the cloud, by securely transferring the key file between the Data Owner and the Data User. Enhanced ElGamal cryptosystem provides better user authentication and performance with respect to the security accomplishment against attacks. At the same time, Novel DNA cryptosystem achieves better performance, reduced the complexity of implementing the properties of DNA and embarks upon a standardized algorithmic approach among the existing DNA cryptographic methodologies. The performance analysis, mathematical proof as well as security analysis forms the security metrics and it meets out the proposed objectives. Thus, on utilizing the proposed Novel DNA and Enhanced ElGamal cryptosystems (i.e) both symmetric and asymmetric cryptosystems, enhances the security and performance of data storage and retrieval in the cloud.

Keywords

Confidentiality Secure cloud storage Secure data retrieval DNA cryptosystem ElGamal cryptosystem Cryptanalysis 

References

  1. 1.
    Pant, V., Kumar, A.: DNA cryptography an new approach to secure cloud data. Int. J. Sci. Eng. Res. 7(6) (2016)Google Scholar
  2. 2.
    Arockiam, L., Monikandan, S.: Efficient cloud storage confidentiality to ensure data security. In: IEEE International Conference on Computer Communication and Informatics (ICCCI) (2014)Google Scholar
  3. 3.
    Chandramouli, R., Iorga, M., Chokhani, S.: Cryptographic Key Management Issues & Challenges in Cloud Services. National Institute of Standards and Technology. U.S, Department of Commerce (2013)Google Scholar
  4. 4.
    European Payment Council: Guidelines on Cryptographic Algorithms Usage and Key Management. https://www.europeanpaymentscouncil.eu/document-library/guidance-documents/guidelines-cryptographic-algorithms-usage-and-key-management
  5. 5.
    Adleman, L.: Molecular computation of solutions to combinatorial problems. Science 266, 1021–1024 (1994)CrossRefGoogle Scholar
  6. 6.
    Jain, S., Bhatnagar, V.: A novel DNA sequence dictionary method for securing data in DNA using spiral approach and framework of DNA cryptography. In: IEEE, ICAETR, pp. 1–5 (2014)Google Scholar
  7. 7.
    Ubaidur Rahman, N.H., Balamurugan, C., Mariappan, R.: A novel DNA computing based encryption and decryption algorithm. In: Proceedia Computer Science, International Conference on Information and Communication Technologies, pp. 463 – 475 (2015)Google Scholar
  8. 8.
    Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Pearson Education (2013)Google Scholar
  9. 9.
    Agarwala, A., Saravanan, R.: A public key cryptosystem based on number theory. 978-1-4673-0255-5/12, IEEE (2012)Google Scholar
  10. 10.
    ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Boneh, D., Joux, A., Nguyen, P.: Breaking plain ElGamal and plain RSA encryption. https://www-almasty.lip6.fr/~joux/pages/papers/PlainRSA.pdf
  12. 12.
    Bryce, D.A.: Implementing several attacks on plain ElGamal encryption. http://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=2577&context=etd
  13. 13.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapter 9), 2nd edn. CRC Press, Boca Raton (2016)zbMATHGoogle Scholar
  14. 14.
    McCurley, K.: The discrete logarithm problem. In: Proceedings of Symposia in Applied Mathematics, vol. 42 (1990)Google Scholar
  15. 15.
    Hwang, M.-S., Chang, C.-C., Hwang, K.-F.: An ElGamal-like cryptosystem for enciphering large messages. IEEE Trans. Knowl. Data Eng. 14(2), 445–446 (2002)CrossRefzbMATHGoogle Scholar
  16. 16.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Mohit, P., Biswas, G.P.: Design of ElGamal PKC for encryption of large messages. In: INDIACom, International Conference. IEEE (2015)Google Scholar
  18. 18.
    Sharma, P., Sharma, S, Dhakar, R.S.: Modified elgamal cryptosystem algorithm (MECA). In: International Conference on Computer & Communication Technology, pp. 439–443 (2011)Google Scholar
  19. 19.
    Asbullah, M.A., Ariffin, M.R.K.: A proposed CCA-secure encryption on an ElGamal variant. In: 7th International Conference on Computing and Convergence Technology (ICCCT), pp. 499–503 (2012)Google Scholar
  20. 20.
    Nguyen, M.T., Nguyen, B.: Some hybrid crypto systems constructed on discrete logarithm problem. In: ATC, International Conference. IEEE (2015)Google Scholar
  21. 21.
    Hashim, H.R., Neamaa, I.A.: Image encryption and decryption in a modification of ElGamal cryptosystem in MATLAB. Int. J. Sci. 14(2), 141–147 (2014)Google Scholar
  22. 22.
    Alam, K., Alam, K.R., Faruq, O., Morimoto, Y.: A comparison between RSA and Elgamal based untraceable blind signature schemes. In: NSysS, International Conference. IEEE (2016)Google Scholar
  23. 23.
    Prajapati, A., Barkha, P.: Implementation of DNA cryptography in cloud computing and using socket programming. In: ICCCI. IEEE (2016)Google Scholar
  24. 24.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  25. 25.
    Malhotra, M.: A new encryption scheme based on enhanced RSA and ElGamal. Int. J. Emerg. Technol. Comput. Appl. Sci. (IJETCAS) 8(2), 138–142 (2014)Google Scholar
  26. 26.
    Madhur, K., Yadav, J.S., Vijay, A.: Modified ElGamal over RSA digital signature algorithm (MERDSA). Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(8), 289–293 (2012)Google Scholar
  27. 27.
    Wang, H., Sun, Z.: Study on the improvement of ELGamal cryptosystem based on elliptic curve. J. Netw. 9(11), 3025–3029 (2014)Google Scholar
  28. 28.
    Dawahdeh, Z.E., Yaakob, S.N., Sagheer, A.M.: Modified ElGamal elliptic curve cryptosystem using hexadecimal representation. Indian J. Sci. Technol. 8(15) (2015)Google Scholar
  29. 29.
    Gennaro, R.: Randomness in cryptography. IEEE Secur. Priv. 4(2), 64–67 (2006)CrossRefGoogle Scholar
  30. 30.
    Yunpeng, Z., Yu, Z., Zhong, W., Sinnott, R.O.: Index-based symmetric DNA encryption algorithm. In: Image and Signal Processing (CISP), pp. 2290–2294 (2011)Google Scholar
  31. 31.
    Abbasy, M.R., Nikfard, P., Ordi, A., Torkaman, M.R.N.: DNA base data hiding algorithm. In: IJNCAA, pp. 183–192 (2012)Google Scholar
  32. 32.
    Gao, Q.: A few DNA based security techniques. In: Systems, Applications and Technology Conference, pp. 1–5. IEEE, Long Island (2011)Google Scholar
  33. 33.
    Dhawan, S., Saini, A.: A new DNA encryption technique for secure data transmission. In: IJETCAS, pp. 36–42 (2012)Google Scholar
  34. 34.
    Mandge, T., Choudhary, V.: A DNA encryption technique based on matrix manipulation and secure key generation. In: ICICES, pp. 47–52. IEEE (2013)Google Scholar
  35. 35.
    Majumder, A., Majumdar, A., Podder, T., Kar, N., Sharma, M.: DNA-based cryptographic approach toward information security. In: Advances in Intelligent Systems and Computing, vol. 308, pp. 209–219. Springer (2015)Google Scholar
  36. 36.
    Aich, A., Sen, A., Dash, S.R., Dehuri, S.: A symmetric key cryptosystem using DNA sequence with OTP key. In: Advances in Intelligent Systems and Computing, pp. 207–215 (2015)Google Scholar
  37. 37.
    Majumder, A., Majumdar, A., Podder, T., Kar, N., Sharma, M.: Secure data communication and cryptography based on DNA based message encoding. In: ICACCCT. IEEE (2014)Google Scholar
  38. 38.
    Cui, G., Han, D., Wang, Y.: An improved method of DNA information encryption. In: BIC-TA, CCIS, pp. 73–77. Springer (2014)Google Scholar
  39. 39.
    Sundaram, G.S., Pavithra, S., Arthi, A., Bala, B.M., Mahalakshmi, S.: Cellular automata based DNA cryptography algorithm. In: ISCO. IEEE (2015)Google Scholar
  40. 40.
    Aich, A., Sen, A., Dash, S.R., Dehuri, S.: Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie hellman key sharing technique. In: CCCIT, pp. 1–6 (2015)Google Scholar
  41. 41.
    Gugnani, G., Ghrera, S.P., Gupta, P.K., Malekian, R., Maharaj, B.T.J.: Implementing DNA . In: Advances in Intelligent Systems and Computing, vol. 381. Springer (2016)Google Scholar
  42. 42.
    Thangavel, M., Varalakshmi, P., Sindhuja, R.: A Comparative study on DNA cryptosystem. In: IEEE International Conference on Recent Trends in Information Technology (ICRTIT) (2016)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Department of Information TechnologyThiagarajar College of EngineeringMaduraiIndia
  2. 2.Department of Computer Technology, Madras Institute of TechnologyAnna UniversityChennaiIndia

Personalised recommendations