Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud

  • Gunjan Gugnani
  • S. P. Ghrera
  • P. K. Gupta
  • Reza Malekian
  • B. T. J. Maharaj
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 381)

Abstract

Hottest buzzword of this decade is “Cloud Computing”—which has been considered as one of the potential solutions to our increasing demand for accessing, processing, storing, and using provisioned resources over the internet. However, with so many boons, it comes along with some curses as security and trust issues. There are many security issues within the cloud, and Information disclosure is a big threat to a cloud user when the information is transferred over the network using web services. In this paper, we have focused on to provide confidentiality to the user while using cloud-based web services, and an approach has been proposed for selective encryption of XML elements so as to provide confidentiality and prevent XML document form improper information disclosure. The technique used for encrypting the selective XML elements is Deoxyribonucleic Acid (DNA) Encryption. Proposed technique selectively encrypts the elements of XML file using DNA sequencing.

Keywords

Cloud security Web services Encryption DNA sequencing SOAP 

Notes

Acknowledgments

This work was supported by the National Research Foundation of South Africa (NRF) grant funded by the South African government (No. KIC 150323115773).

References

  1. 1.
    Jensen, M., Schwenk, J., Gruschka, N., Iacono, L. L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109–116 (2009)Google Scholar
  2. 2.
    Saravanaguru, R.A., Abraham, G., Ventakasubramanian, K., Borasia, K.: Securing web services using XML signature and XML encryption. arXiv preprint arXiv:1303.0910, 1–6 (2013)
  3. 3.
    Moradian, E. Anne H.: Possible attacks on XML web services. Int. J. Comput. Sci. Netw. Sec. 6.1B, 154–170 (2006)Google Scholar
  4. 4.
    Chou T.S.: Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. IT, 5, 79–88 (2013)Google Scholar
  5. 5.
    Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)CrossRefGoogle Scholar
  6. 6.
    Gu, Y.S., Ye, M.T., Gan, Y.: Web services security based on XML signature and XML encryption. J. Netw. 5, 1092–1097 (2010)Google Scholar
  7. 7.
    Thakur, A.S., Gupta, P.K.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87, 28–32 (2014)Google Scholar
  8. 8.
    Liu, H., Lin, D., Kadir, A.: A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39, 1164–1173 (2013)CrossRefGoogle Scholar
  9. 9.
    Terec, R., Vaida, M.F., Alboaie, L., Chiorean, L.: DNA security using symmetric and asymmetric cryptography. Int. J. New Comput. Archit. Their. Appl. 1, 34–51 (2011)Google Scholar
  10. 10.
    Rana, P., Gupta, P.K., Siddavatam, R.: Combined and improved framework of infrastructure as a service and platform as a service in cloud computing. In: Babu, B.V., Nagar, A., Deep, K., Pant, M., Bansal, J.C., Ray, K., Gupta, U. (eds.) SocPros 2012. LNCS, vol. 236, pp. 831–839. Springer, India (2014)Google Scholar
  11. 11.
    Thakur, A.S., Gupta, P.K., Gupta, P.: Handling data integrity issue in SaaS cloud. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) FICTA 2014. LNCS, vol. 328, pp. 127–134. Springer International Publishing (2015)Google Scholar
  12. 12.
    Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web Services. Springer, Berlin Heidelberg (2004)CrossRefMATHGoogle Scholar
  13. 13.
    Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  • Gunjan Gugnani
    • 1
  • S. P. Ghrera
    • 1
  • P. K. Gupta
    • 2
  • Reza Malekian
    • 2
  • B. T. J. Maharaj
    • 2
  1. 1.Department of Computer Science and EngineeringJaypee University of Information TechnologyWaknaghatIndia
  2. 2.Department of Electrical, Electronic, and Computer EngineeringUniversity of PretoriaPretoriaSouth Africa

Personalised recommendations