Skip to main content
Log in

A novel DNA-inspired encryption strategy for concealing cloud storage

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

Over the last few years, the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely. This study presents such a secured cloud storage framework comprising of a deoxyribonucleic acid (DNA) based encryption key which has been generated to make the framework unbreakable, thus ensuring a better and secured distributed cloud storage environment. Furthermore, this work proposes a novel DNA-based encryption technique inspired by the biological characteristics of DNA and the protein synthesis mechanism. The introduced DNA based model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers on which the data must be stored. A fuzzy-based technique for order of preference by similarity to ideal solution (TOPSIS) multi-criteria decisionmaking (MCDM) model has been employed to achieve the above-mentioned goal. This can decide the set of suitable storage servers and also results in a reduction in execution time by keeping up the level of security to an improved grade. This study also investigates and analyzes the strength of the proposed S-Box and encryption technique against some standard criteria and benchmarks, such as avalanche effect, correlation coefficient, information entropy, linear probability, and differential probability etc. After the avalanche effect analysis, the average change in cipher-text has been found to be 51.85%. Moreover, thorough security, sensitivity and functionality analysis show that the proposed scheme guarantees high security with robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Velte A T, Velte T J, Elsenpeter R C, Elsenpeter R C. Cloud Computing: A Practical Approach. New York: McGraw-Hill, 2010, 44

    Google Scholar 

  2. Kamara S, Lauter K. Cryptographic cloud storage. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2010, 136–149

  3. Cao N, Wang C, Li M, Ren K, Lou W. Privacy preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222–233

    Article  Google Scholar 

  4. Wang C, Wang Q, Ren K, Lou W. Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop on Quality of Service. 2009, 1–9

  5. Wang Q, Wang C, Ren K, Lou W, Li J. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847–859

    Article  Google Scholar 

  6. Chase M, Kamara S. Structured encryption and controlled disclosure. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2010, 577–594

  7. Prasad P, Ojha B, Shahi R R, Lal R, Vaish A, Goel U. 3 dimensional security in cloud computing. In: Proceedings of the 3rd International Conference on Computer Research and Development. 2011, 198–201

  8. Sood S K, Sarje A K, Singh K A. Secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 2011, 34(2): 609–618

    Article  Google Scholar 

  9. Sood S K. A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 2012, 35(6): 1831–1838

    Article  Google Scholar 

  10. Dong B, Zheng Q, Tian F, Chao K M, Ma R, Anane R. An optimized approach for storing and accessing small files on cloud storage. Journal of Network and Computer Applications, 2012, 35(6): 1847–1862

    Article  Google Scholar 

  11. Wang X A, Huang X, Yang X, Liu L, Wu X. Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 2012, 85(3): 643–654

    Article  Google Scholar 

  12. Shao J, Cao Z, Liang X, Lin H. Proxy re-encryption with keyword search. Information Sciences, 2010, 180(13): 2576–2587

    Article  MathSciNet  Google Scholar 

  13. Spillner J, MüLler J, Schill A. Creating optimal cloud storage systems. Future Generation Computer Systems, 2013, 29(4): 1062–1072

    Article  Google Scholar 

  14. Xia Z, Wang X, Sun X, Wang Q. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340–352

    Article  Google Scholar 

  15. Chen R, Mu Y, Yang G, Guo F, Wang X. Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 2016, 11(4): 789–798

    Google Scholar 

  16. Kaaniche N, Laurent M. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 2017, 111: 120–141

    Article  Google Scholar 

  17. Wang X A, Ma J, Xhafa F, Zhang M, Luo X. Cost effective secure E-health cloud system using identity based cryptographic techniques. Future Generation Computer Systems, 2017, 67: 242–254

    Article  Google Scholar 

  18. Wang X A, Yang X, Li C, Liu Y, Ding Y. Improved functional proxy re-encryption schemes for secure cloud data sharing. Computer Science & Information Systems, 2018, 15(3): 585–614

    Article  Google Scholar 

  19. Wang X A, Liu Y, Zhang J, Yang X, Zhang M. Improved group-oriented proofs of cloud storage in IoT setting. Concurrency and Computation: Practice and Experience, 2018, 30(21): e4781

    Article  Google Scholar 

  20. Cui H, Deng R H, Li Y. Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 2018, 79: 461–472

    Article  Google Scholar 

  21. Jose G S S, Christopher C S. Secure cloud data storage approach in e-learning systems. Cluster Computing, 2019, 22(5): 12857–12862

    Article  Google Scholar 

  22. Gehani A, LaBean T, Reif J. DNA-based cryptography. In: Jonoska N, Paun G, Rozenberg G, eds. Aspects of Molecular Computing. Springer, Berlin, Heidelberg, 2003, 167–188

    Chapter  Google Scholar 

  23. Amin S T, Saeb M, El-Gindi S. A DNA-based implementation of YAEA encryption algorithm. In: Proceedings of the 2nd IASTED International Conference on Computational Intelligence. 2006

  24. Cui G, Qin L, Wang Y, Zhang X. An encryption scheme using DNA technology. In: Proceedings of the 3rd International Conference on Bio-Inspired Computing: Theories and Applications. 2008, 37–42

  25. Wang X, Zhang Q. DNA computing-based cryptography. In: Proceedings of the 4th International Conference on Bio-Inspired Computing. 2009, 1–3

  26. Sadeg S, Gougache M, Mansouri N, Drias H. An encryption algorithm inspired from DNA. In: Proceedings of International Conference on Machine and Web Intelligence. 2010, 344–349

  27. Yunpeng Z, Yu Z, Zhong W, Sinnott R O. Index-based symmetric DNA encryption algorithm. In: Proceedings of the 4th International Congress on Image and Signal Processing. 2011, 2290–2294

  28. Abbasy M R, Shanmugam B. Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences. In: Proceedings of IEEE World Congress on Services. 2011, 385–390

  29. Khalifa A, Atito A. High-capacity DNA-based steganography. In: Proceedings of the 8th International Conference on Informatics and Systems. 2012, 76–80

  30. Atito A, Khalifa A, Rida S Z. DNA-based data encryption and hiding using play-fair and insertion techniques. Journal of Communications and Computer Engineering, 2012, 2(3): 44

    Article  Google Scholar 

  31. Pramanik S, Setua S K. DNA cryptography. In: Proceedings of the 7th International Conference on Electrical & Computer Engineering. 2012, 551–554

  32. Mandge T, Choudhary V. A DNA encryption technique based on matrix manipulation and secure key generation scheme. In: Proceedings of International Conference on Information Communication and Embedded Systems. 2013, 47–52

  33. Kar N, Majumder A, Saha A, Deb S, Pal M C. Data security and cryptography based on DNA sequencing. International Journal of Information Technology & Computer Science, 2013, 10(3): 24–32

    Google Scholar 

  34. Chouhan D S, Mahajan R P. An architectural framework for encryption & generation of digital signature using DNA cryptography. In: Proceedings of International Conference on Computing for Sustainable Global Development. 2014, 743–748

  35. Aich A, Sen A, Dash S R, Dehuri S. A symmetric key cryptosystem using DNA sequence with OTP key. In: Mandal J, Satapathy S, Kumar Sanyal M, Sarkar P, Mukhopadhyay A, eds. Information Systems Design and Intelligent Applications. Springer, New Delhi, 2015, 207–215

    Chapter  Google Scholar 

  36. UbaidurRahman N H, Balamurugan C, Mariappan R. A novel DNA computing based encryption and decryption algorithm. Procedia Computer Science, 2015, 46: 463–475

    Article  Google Scholar 

  37. Marwan S, Shawish A, Nagaty K. DNA-based cryptographic methods for data hiding in DNA media. Biosystems, 2016, 150: 110–118

    Article  Google Scholar 

  38. Thangavel M, Varalakshmi P. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Computing, 2018, 21(2): 1411–1437

    Article  Google Scholar 

  39. Patnala B D, Kumar R K. A novel level-based DNA security algorithm using DNA codons. In: Computational Intelligence and Big Data Analytics. Springer, Singapore, 2019, 1–13

    Google Scholar 

  40. Elhadad A. Data sharing using proxy re-encryption based on DNA computing. Soft Computing, 2020, 24(3): 2101–2108

    Article  Google Scholar 

  41. Basu S, Karuppiah M, Nasipuri M, Halder A K, Radhakrishnan N. Bio-inspired cryptosystem with DNA cryptography and neural networks. Journal of Systems Architecture, 2019, 94: 24–31

    Article  Google Scholar 

  42. Pray L. Discovery of DNA structure and function: Watson and Crick. Nature Education, 2008

  43. Wu H, Wang Q, Wolter K. Methods of cloud-path selection for offloading in mobile cloud computing systems. In: Proceedings of the 4th International Conference on Cloud Computing Technology and Science. 2012, 443–448

  44. Majumder A, Majumdar A, Podder T, Kar N, Sharma M. Secure data communication and cryptography based on DNA based message encoding. In: Proceedings of International Conference on Advanced Communication Control and Computing Technologies. 2014, 360–363

  45. Majumdar A, Podder T, Majumder A, Kar N, Sharma M. DNA-based cryptographic approach toward information security. In: Jain L, Patnaik S, Ichalkaranje N, eds. Intelligent Computing, Communication and Devices. Springer, New Delhi, 2015, 209–219

    Chapter  Google Scholar 

  46. Zhang Q, Guo L, Xue X, Wei X. An image encryption algorithm based on DNA sequence addition operation. In: Proceedings of the 4th International on Conference on Bio Inspired Computing. 2009, 1–5

  47. Tornea O, Borda M E. DNA cryptographic algorithms. In: Proceedings of International Conference on Advancements of Medicine and Health Care through Technology. 2009, 223–226

  48. Sabry M, Hashem M, Nazmy T. Three reversible data encoding algorithms based on dna and amino acids’ structure. International Journal of Computer Applications, 2012, 54(8): 24–30

    Article  Google Scholar 

  49. Agrawal A, Bhopale A, Sharma J, Ali M S, Gautam D. Implementation of DNA algorithm for secure voice communication. International Journal of Scientific & Engineering Research, 2012, 3(6): 1–5

    Article  Google Scholar 

  50. Sundaram G S, Pavithra S, Arthi A, Bala B M, Mahalakshmi S. Cellular automata based DNA cryptography algorithm. In: Proceedings of the 9th International Conference on Intelligent Systems and Control. 2015, 1–6

  51. Gugnani G, Ghrera S P, Gupta P K, Malekian R, Maharaj B T. Implementing DNA encryption technique in Web services to embed confidentiality in cloud. In: Proceedings of the 2nd International Conference on Computer and Communication Technologies. 2016, 407–415

Download references

Acknowledgements

This publication was an outcome of the R&D work undertaken project under the Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Majumdar.

Additional information

Abhishek Majumdar is currently pursuing his PhD from National Institute of Technology Silchar, India under the Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation. His research areas are cloud computing, information security, optimization and machine learning.

Arpita Biswas is currently pursuing her PhD from National Institute of Technology Silchar, India under the Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation. Her research areas are information security, Integration of IoT with cloud computing and optimization.

Atanu Majumder received his MTech degree in Computer Science and Engineering from National Institute of Technology Agartala, India. Presently he is appointed as Scientist — A in National Informatics Centre, India. His research areas are information security and cryptography.

Sandeep Kumar Sood is currently working as Head & Professor, Computer Science & Informatics, Central University of Himachal Pradesh, India. He has 17 years of teaching and 9 years of research experience. He has more than 50 research publications in highly reputed journals. His research areas are Cloud Computing, IoT, Big Data Analytics, Information Security, Cyber Physical System.

Krishna Lal Baishnab is currently working as Associate Professor, Electronics and Communication Engineering, NIT Silchar, India. He has more than 20 years of teaching experience and published more than 50 articles in various reputed journals and international conferences. His research areas are Analog VLSI and RF design: design of continuous/discrete time analog circuit for bio-medical applications, RF CMOS circuit design and wireless systems.

Electronic Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Majumdar, A., Biswas, A., Majumder, A. et al. A novel DNA-inspired encryption strategy for concealing cloud storage. Front. Comput. Sci. 15, 153807 (2021). https://doi.org/10.1007/s11704-019-9015-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-019-9015-2

Keywords

Navigation