Open Access Open Access  Restricted Access Subscription Access

A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography


Affiliations
1 Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, India
 

Cloud is a recent technology that enables wide access and storage on the internet. Moreover, the cloud computing environment allows storing and sharing plenty of digital data including text, image, video, audio, etc. through the internet. Although it is cost-effective and has numerous advantages, cloud technology still faces a lot of challenges like data loss, quality issues, and data security. In this paper, an effective algorithm is introduced using deoxyribonucleic acid (DNA)-based cryptography to enhance data security while sharing the data over the internet. For this process, an optimized encryption model is implemented using Grey Wolf Optimization (GWO) Algorithm to generate optimal encrypted data while sharing. Various datasets have been implemented to verify the efficiency of the proposed GWO Assisted-DNA (GWOA-DNA) cryptography in terms of accuracy and execution time.

Keywords

Data Security, DNA-Based Cryptography, User Access, Cloud Computing, Key Generation, Encryption, User Verification, User Access.
User
Notifications
Font Size

  • Selvi, S., and M. Gobi. "Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security." International Conference on Intelligent Data Communication Technologies and Internet of Things. Springer, Cham, 2018.
  • Gobi, M., and R. Sridevi. "An Approach for Secure Data Storage in Cloud Environment." International Journal of Computer and Communication Engineering 2.2 (2013): 206.
  • Fu X, Liu B, Xie Y, Li W, Liu Y. (2018) ‘Image Encryption-ThenTransmission Using DNA Encryption Algorithm and The Double Chaos’, IEEE Photonics Journal. Vol.10 NO.3, pp.1-15
  • Selvi, S., and M. Gobi. "An Efficient Data Security Model using Hyper Elliptic Curve Cryptography and Steganography
  • Liu X, Deng R. H, Choo K. -K. R, Yang Y, and Pang H. (2020) ‘Privacy-Preserving Outsourced Calculation Toolkit in the Cloud’, IEEE Transactions on Dependable and Secure Computing,vol. 17 NO.5, pp.898-911
  • Wei X, Guo L, and Zhang Q.(2012), ‘A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system’, J. Syst. Softw. Vol.85 NO.2, pp.290-299
  • Q. Alam S. U. R. Malik A. Akhunzada K. R. Choo S. Tabbasum and M. Alam,(2017) ’ A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification’, IEEE Trans. Inf. Forensics Secur, vol.12 NO. 6 pp.1259-1268
  • Gobi, M., R. Sridevi, and R. Rahini. "A comparative study on the performance and the security of RSA and ECC algorithm." International journal of advanced network and application (2015)
  • Sridevi, R., and S. Selvi. "Progressing Biometric Security Concern with Blowfish Algorithm.", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8, Issue9S2, 2019.
  • Kumar B. M, Sri B. R. S, Katamaraju, G. M. S. A, Rani P, Harinadh N, and Saibabu C. (2020) ‘File Encryption and Decryption Using DNA Technology’, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp.382-385
  • Kumar, G. Kishore, and Dr M. Gobi. "Role of Cryptography & its Related Techniques in Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology, IJRASET 5 (2017).
  • Selvi, S., et al. "Hyper elliptic curve cryptography in multi cloudsecurity using DNA (genetic) techniques." 2017 International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2017
  • Pushpa B. R. (2017) ‘A new technique for data encryption using DNA sequence’, 2017 International Conference on Intelligent Computing and Control(I2C2), pp.1-4
  • Ritu Gupta and Anchal Jain. (2014) ‘A New Image Encryption Algorithm based on DNA Approach’, International Journal of Computer Applications, Vol. 85 NO. 18
  • Selvi, S., and R. Sridevi. "Efficient Scheduling Mechanisms for Secured Cloud Data Environment.", International Journal of Recent Technology and Engineering (IJRTE), Volume-8, Issue-2S11, 2019.
  • Seyedali Mirjalili, Seyed Mohammad Mirjalili and Andrew Lewisa, (2014) ‘Grey Wolf Optimizer, Advances in Engineering Software, Vol.69, pp.46-61
  • Abhishek Majumdar, Arpita Biswas, Atanu Majumder, Sandeep Kumar Sood and Krishna Lal Baishnab, (2020) ‘A novel DNAinspired encryption strategy for concealing cloud storage’, Frontiers of Computer Science,Vol. 15
  • Ahmed Elhadad . (2019) ‘ Data sharing using proxy re-encryption based on DNA computing’, Soft Computing,vol.24, pp. 2101–2108
  • Thangavel,M Varalakshmi,,P. (2017) ‘Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud’, Cluster Computing, vol.21, pp.1411–1437
  • Nithya Chidambaram, Pethuru Raj Thenmozhi,k Sundararaman Rajagopalan, Rengarajan Amirtharajan,(2019) ‘ A cloud compatible DNA coded security solution for multimedia file sharing & storage’, Multimedia Tools and Applications,vol.78, pp.33837–33863
  • Sandhia,G.K. Raja, S. V. K. (2021) ‘Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography’, Journal of Ambient Intelligence and Humanized Computing
  • Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood and Shakoor Muhammad, (2020) CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Cluster Computing. Vol. 24, pp. 739–752
  • Rashmi Ramesh Rachh, Ananda Mohan P.V,and Anami B.S. (2012) ‘Efficient Implementations for AES Encryption and Decryption. Circuits, Systems, and Signal Processing’, Vol.31, pp.1765-1785
  • Ch. Usha Kumari, T. Pavani, A. Sampath Dakshina Murthy, B. Lakshmi Prasanna, and M. Pala Prasad Reddy, "Generating Cipher Text using BLOWFISH Algorithm for Secured Data Communications", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, No. 2, December 2019
  • Indumathi Saikumar, (2017) ‘DES- Data Encryption Standard’, International Research Journal of Engineering and Technology,Vol. 4 NO.3,
  • Khan J.S. (2020) et al., ‘DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption’, IEEE Access. Vol.8, pp.159732-159744.

Abstract Views: 463

PDF Views: 3




  • A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography

Abstract Views: 463  |  PDF Views: 3

Authors

Mercy Joseph
Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, India
Gobi Mohan
Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, India

Abstract


Cloud is a recent technology that enables wide access and storage on the internet. Moreover, the cloud computing environment allows storing and sharing plenty of digital data including text, image, video, audio, etc. through the internet. Although it is cost-effective and has numerous advantages, cloud technology still faces a lot of challenges like data loss, quality issues, and data security. In this paper, an effective algorithm is introduced using deoxyribonucleic acid (DNA)-based cryptography to enhance data security while sharing the data over the internet. For this process, an optimized encryption model is implemented using Grey Wolf Optimization (GWO) Algorithm to generate optimal encrypted data while sharing. Various datasets have been implemented to verify the efficiency of the proposed GWO Assisted-DNA (GWOA-DNA) cryptography in terms of accuracy and execution time.

Keywords


Data Security, DNA-Based Cryptography, User Access, Cloud Computing, Key Generation, Encryption, User Verification, User Access.

References





DOI: https://doi.org/10.22247/ijcna%2F2022%2F211630