Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment

Today, the size of a multimedia file is increasing day by day from gigabytes to terabytes or even petabytes, mainly because of the evolution of a large amount of real-time data. As most of the multimedia files are transmitted through the internet, hackers and attackers try to access the users’ personal and confidential data without any authorization. Thus, maintaining a strong security technique has become a significant concerned to protect the personal information. Deoxyribonucleic Acid (DNA) computing is an advanced field for improving security, which is based on the biological concept of DNA. A novel DNA-based encryption scheme is proposed in this article for protecting multimedia files in the cloud computing environment. Here, a 1024-bit secret key is generated based on DNA computing and the user's attributes and password to encrypt any multimedia file. To generate the secret key, the decimal encoding rule, American Standard Code for Information Interchange value, DNA reference key, and complementary rule are used, which enable the system to protect the multimedia file against many security attacks. Experimental results, as well as theoretical analyses, show the efficiency of the proposed scheme over some well-known existing schemes.

[1]  Deka Ganesh Chandra,et al.  Library Automation in Cloud , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[2]  S. Namasudra,et al.  CLOUD COMPUTING: A NEW ERA , 2018 .

[3]  Suyel Namasudra,et al.  Taxonomy of DNA-Based Security Models , 2018, Advances of DNA Computing in Cryptography.

[4]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[5]  A Leier,et al.  Cryptography with DNA binary strands. , 2000, Bio Systems.

[6]  Rizwan Patan,et al.  Security, Privacy, Trust, and Anonymity , 2018, Advances of DNA Computing in Cryptography.

[7]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[8]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[9]  Christof Paar,et al.  A New Class of Collision Attacks and Its Application to DES , 2003, FSE.

[10]  Suyel Namasudra,et al.  Data Access Control in the Cloud Computing Environment for Bioinformatics , 2021 .

[11]  Westone,et al.  Home Page , 2004, 2022 2nd International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA).

[12]  Abdul Hanan Abdullah,et al.  Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .

[13]  Suyel Namasudra,et al.  Introduction of DNA Computing in Cryptography , 2018, Advances of DNA Computing in Cryptography.

[14]  Guoyin Wang,et al.  Survey on cloud model based similarity measure of uncertain concepts , 2019, CAAI Trans. Intell. Technol..

[15]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[16]  Decoy Document Deployment for Effective Masquerade Attack Detection , 2011, DIMVA.

[17]  Seifedine Kadry,et al.  A Boosting-Aided Adaptive Cluster-Based Undersampling Approach for Treatment of Class Imbalance Problem , 2020, Int. J. Data Warehous. Min..

[18]  José Luis Vázquez-Poletti,et al.  Provisioning data analytic workloads in a cloud , 2013, Future Gener. Comput. Syst..

[19]  Zhang Xun-cai New Direction of Data Storage:DNA Molecular Storage Technology , 2006 .

[20]  C. Martin 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.

[21]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[22]  L. Miles,et al.  2000 , 2000, RDH.

[23]  Pinki Roy,et al.  Time saving protocol for data accessing in cloud computing , 2017, IET Commun..

[24]  Yada Zhu,et al.  Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[25]  Guozhen Xiao,et al.  Symmetric-key cryptosystem with DNA technology , 2007, Science in China Series F: Information Sciences.

[26]  Suyel Namasudra,et al.  Applications and Future Trends of DNA Computing , 2018, Advances of DNA Computing in Cryptography.

[27]  Suyel Namasudra,et al.  An improved attribute‐based encryption technique towards the data security in cloud computing , 2019, Concurr. Comput. Pract. Exp..

[28]  Pinki Roy,et al.  Cloud Computing: Fundamentals and Research Issues , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[29]  Akimitsu Okamoto,et al.  Public-key system using DNA as a one-way function for key distribution. , 2005, Bio Systems.

[30]  A. Azzouz 2011 , 2020, City.

[31]  S. M. García,et al.  2014: , 2020, A Party for Lazarus.

[32]  Pinki Roy,et al.  A New Table Based Protocol for Data Accessing in Cloud Computing , 2017, J. Inf. Sci. Eng..

[33]  Guangzhao Cui,et al.  Hiding Messages Based on DNA Sequence and Recombinant DNA Technique , 2019, IEEE Transactions on Nanotechnology.

[34]  Ganesh Chandra Deka,et al.  Advances of DNA Computing in Cryptography , 2018 .

[35]  A. Shanthini,et al.  Towards DNA based data security in the cloud computing environment , 2020, Comput. Commun..

[36]  Li Gong,et al.  Optimal authentification protocols resistant to password guessing attacks , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.

[37]  Pinki Roy,et al.  PpBAC: Popularity Based Access Control Model for Cloud Computing , 2018, J. Organ. End User Comput..

[38]  Jaya Jeswani,et al.  Activity Based Access Control Model for Cloud Computing , 2015 .

[39]  Abhishek Majumder,et al.  Profile based access control model in cloud computing environment , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).

[40]  Masakatu Morii,et al.  One-Time Password Authentication Scheme to Solve Stolen Verifier Problem , 2011 .

[41]  Rich Kaestner,et al.  The Basics of Cloud Computing. , 2012 .

[42]  Pinki Roy,et al.  Data accessing based on the popularity value for cloud computing , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[43]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[44]  Rui Li,et al.  Advances on QoS-aware web service selection and composition with nature-inspired computing , 2019, CAAI Trans. Intell. Technol..

[45]  Bin Wang,et al.  Reversible Data Hiding Based on DNA Computing , 2017, Comput. Intell. Neurosci..

[46]  S. Sitharama Iyengar,et al.  Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data , 2016 .

[47]  Pinki Roy,et al.  Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..

[48]  Florence March,et al.  2016 , 2016, Affair of the Heart.

[49]  Rasim M. Alguliyev,et al.  Efficient algorithm for big data clustering on single machine , 2020, CAAI Trans. Intell. Technol..

[50]  Ganesh Chandra Deka,et al.  The Revolution of Blockchain: State-of-the-Art and Research Challenges , 2020, Archives of Computational Methods in Engineering.