DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography

Ashish SINGH , Abhinav KUMAR , Suyel NAMASUDRA

Front. Comput. Sci. ›› 2024, Vol. 18 ›› Issue (1) : 181801

PDF (9570KB)
Front. Comput. Sci. ›› 2024, Vol. 18 ›› Issue (1) : 181801 DOI: 10.1007/s11704-022-2193-3
Information Security
RESEARCH ARTICLE

DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography

Author information +
History +
PDF (9570KB)

Abstract

The Internet of Everything (IoE) based cloud computing is one of the most prominent areas in the digital big data world. This approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the cloud. The IoE-based cloud computing services are located at remote locations without the control of the data owner. The data owners mostly depend on the untrusted Cloud Service Provider (CSP) and do not know the implemented security capabilities. The lack of knowledge about security capabilities and control over data raises several security issues. Deoxyribonucleic Acid (DNA) computing is a biological concept that can improve the security of IoE big data. The IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol (StS KAP) and Feistel cipher algorithms. This paper proposed a DNA-based cryptographic scheme and access control model (DNACDS) to solve IoE big data security and access issues. The experimental results illustrated that DNACDS performs better than other DNA-based security schemes. The theoretical security analysis of the DNACDS shows better resistance capabilities.

Graphical abstract

Keywords

IoE based cloud computing / DNA cryptography / IoE big data security / StS KAP / feistel cipher / IoE big data access

Cite this article

Download citation ▾
Ashish SINGH, Abhinav KUMAR, Suyel NAMASUDRA. DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography. Front. Comput. Sci., 2024, 18(1): 181801 DOI:10.1007/s11704-022-2193-3

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Lakhan A, Mohammed M A, Abdulkareem K H, Jaber M M, Nedoma J, Martinek R, Zmij P . Delay optimal schemes for internet of things applications in heterogeneous edge cloud computing networks. Sensors, 2022, 22( 16): 5937

[2]

Gunal M M, Karatas M. Industry 4.0, digitisation in manufacturing, and simulation: a review of the literature. In: Gunal M M, ed. Simulation for Industry 4.0. Cham: Springer, 2019, 19−37

[3]

Mahmood T, Ali Z. Prioritized muirhead mean aggregation operators under the complex single-valued neutrosophic settings and their application in multi-attribute decision-making. Journal of Computational and Cognitive Engineering, 2022, 1(2): 56−73

[4]

Snyder T, Byrd G . The internet of everything. Computer, 2017, 50( 6): 8–9

[5]

DeNardis L. The Internet in Everything. New Haven: Yale University Press, 2020

[6]

Karatas M, Eriskin L, Deveci M, Pamucar D, Garg H . Big data for healthcare industry 4.0: Applications, challenges and future perspectives. Expert Systems with Applications, 2022, 200: 116912

[7]

Tripathi S, De S. Pathway and future of IoE in smart cities: challenges of big data and energy sustainability. In: Jindal A, Kumar N, Aujla G S, eds. Internet of Energy for Smart Cities. Boca Raton: CRC Press, 2021, 277−302

[8]

Lakhan A, Mohammed M A, Rashid A N, Kadry S, Abdulkareem K H, Nedoma J, Martinek R, Razzak I . Restricted Boltzmann machine assisted secure serverless edge system for internet of medical things. IEEE Journal of Biomedical and Health Informatics, 2022,

[9]

Lakhan A, Mohammed M A, Ibrahim D A, Abdulkareem K H . Bio-inspired robotics enabled schemes in blockchain-fog-cloud assisted IoMT environment. Journal of King Saud University-Computer and Information Sciences, 2021,

[10]

Singh A, Chatterjee K . Cloud security issues and challenges: a survey. Journal of Network and Computer Applications, 2017, 79: 88–115

[11]

Pavithran P, Mathew S, Namasudra S, Srivastava G . A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems. Computer Communications, 2022, 188: 1–12

[12]

Zhang Q, Cheng L, Boutaba R . Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications, 2010, 1( 1): 7–18

[13]

Chang V, Kuo Y H, Ramachandran M . Cloud computing adoption framework: a security framework for business clouds. Future Generation Computer Systems, 2016, 57: 24–41

[14]

Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th Conference on Information Communications. 2010, 534−542

[15]

Namasudra S, Sharma S, Deka G C, Lorenz P . DNA computing and table based data accessing in the cloud environment. Journal of Network and Computer Applications, 2020, 172: 102835

[16]

Agrawal N, Tapaswi S . Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 2019, 21( 4): 3769–3795

[17]

Sirichotedumrong W, Kiya H. Visual security evaluation of learnable image encryption methods against ciphertext-only attacks. In: Proceedings of 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). 2020, 1304−1309

[18]

Vasko F J, Lu Y, McNally B . A simple methodology that efficiently generates all optimal spanning trees for the cable-trench problem. Journal of Computational and Cognitive Engineering, 2022, 1( 1): 13–20

[19]

Wani A, Revathi S, Khaliq R. SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Transactions on Intelligence Technology, 2021, 6(3): 281−290

[20]

Chen Z . Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. Journal of Computational and Cognitive Engineering, 2022, 1( 3): 103–108

[21]

Mohindru G, Mondal K, Banka H . Different hybrid machine intelligence techniques for handling IoT-based imbalanced data. CAAI Transactions on Intelligence Technology, 2021, 6( 4): 405–416

[22]

Rakotondravony N, Taubmann B, Mandarawi W, Weishäupl E, Xu P, Kolosnjaji B, Protsenko M, De Meer H, Reiser H P . Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing, 2017, 6( 1): 26

[23]

Doreswamy , Hooshmand M K, Gad I . Feature selection approach using ensemble learning for network anomaly detection. CAAI Transactions on Intelligence Technology, 2020, 5( 4): 283–293

[24]

Namasudra S, Deka G C. Advances of DNA Computing in Cryptography. Boca Raton: CRC Press, 2018

[25]

Sheela S J, Suresh K V, Tandur D . A novel audio cryptosystem using chaotic maps and DNA encoding. Journal of Computer Networks and Communications, 2017, 2017: 2721910

[26]

Mondal B, Mandal T . A light weight secure image encryption scheme based on chaos & DNA computing. Journal of King Saud University-Computer and Information Sciences, 2017, 29( 4): 499–504

[27]

Clelland C T, Risca V, Bancroft C . Hiding messages in DNA microdots. Nature, 1999, 399( 6736): 533–534

[28]

Leier A, Richter C, Banzhaf W, Rauhe H . Cryptography with DNA binary strands. Biosystems, 2000, 57( 1): 13–22

[29]

Tanaka K, Okamoto A, Saito I . Public-key system using DNA as a one-way function for key distribution. Biosystems, 2005, 81( 1): 25–29

[30]

Ahmed U, Lin J C W, Srivastava G . Privacy-preserving deep reinforcement learning in vehicle Ad Hoc networks. IEEE Consumer Electronics Magazine, 2022, 11( 6): 41–48

[31]

Lin J C W, Srivastava G, Zhang Y, Djenouri Y, Aloqaily M . Privacy-preserving multiobjective sanitization model in 6G IoT environments. IEEE Internet of Things Journal, 2021, 8( 7): 5340–5349

[32]

Lakhan A, Mohammed M A, Nedoma J, Martinek R, Tiwari P, Vidyarthi A, Alkhayyat A, Wang W . Federated-learning based privacy preservation and fraud-enabled blockchain IoMT system for healthcare. IEEE Journal of Biomedical and Health Informatics, 2022,

[33]

Kaushik S, Gandhi C . Ensure hierarchal identity based data security in cloud environment. International Journal of Cloud Applications and Computing, 2019, 9( 4): 21–36

[34]

Kaufman L M . Data security in the world of cloud computing. IEEE Security & Privacy, 2009, 7( 4): 61–64

[35]

Sood S K . A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 2012, 35( 6): 1831–1838

[36]

Arockiam L, Monikandan S. Efficient cloud storage confidentiality to ensure data security. In: Proceedings of 2014 International Conference on Computer Communication and Informatics. 2014, 1−5

[37]

Manogaran G, Thota C, Kumar M V . MetaCloudDataStorage architecture for big data security in cloud computing. Procedia Computer Science, 2016, 87: 128–133

[38]

Attasena V, Darmont J, Harbi N . Secret sharing for cloud data security: a survey. The VLDB Journal, 2017, 26( 5): 657–681

[39]

Akhil K M, Kumar M P, Pushpa B R. Enhanced cloud data security using AES algorithm. In: Proceedings of 2017 International Conference on Intelligent Computing and Control (I2C2). 2017, 1−5

[40]

Kalpana P, Singaraju S . Data security in cloud computing using RSA algorithm. International Journal of Research in Computer & Communication Technology, 2012, 1( 4): 143–146

[41]

Sugumaran M, Murugan B B, Kamalraj D. An architecture for data security in cloud computing. In: Proceedings of 2014 World Congress on Computing and Communication Technologies. 2014, 252−255

[42]

Almutairi A, Sarfraz M I, Ghafoor A . Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Transactions on Cloud Computing, 2015, 6( 1): 168–181

[43]

Xie Y, Wen H, Wu B, Jiang Y, Meng J . A modified hierarchical attribute-based encryption access control method for mobile cloud computing. IEEE Transactions on Cloud Computing, 2019, 7( 2): 383–391

[44]

Lu M, Lai X, Xiao G, Qin L . Symmetric-key cryptosystem with DNA technology. Science in China Series F: Information Sciences, 2007, 50( 3): 324–333

[45]

Murugan A, Thilagavathy R. Cloud storage security scheme using DNA computing with Morse code and zigzag pattern. In: Proceedings of 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI). 2017, 2263−2268

[46]

Alam Q, Malik S U R, Akhunzada A, Choo K K R, Tabbasum S, Alam M . A cross tenant access control (CTAC) model for cloud computing: formal specification and verification. IEEE Transactions on Information Forensics and Security, 2017, 12( 6): 1259–1268

[47]

Wang Y, Han Q, Cui G, Sun J . Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Transactions on Nanotechnology, 2019, 18: 299–307

[48]

Enayatifar R, Abdullah A H, Isnin I F . Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 2014, 56: 83–93

[49]

Alghafis A, Firdousi F, Khan M, Batool S I, Amin M . An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Mathematics and Computers in Simulation, 2020, 177: 441–466

[50]

Elhadad A . Data sharing using proxy re-encryption based on DNA computing. Soft Computing, 2020, 24( 3): 2101–2108

[51]

Namasudra S . Fast and secure data accessing by using DNA computing for the cloud environment. IEEE Transactions on Services Computing, 2020, 15( 4): 2289–2300

[52]

Reddy M I, Kumar A P S, Reddy K S . A secured cryptographic system based on DNA and a hybrid key generation approach. Biosystems, 2020, 197: 104207

[53]

Liu C, Yang C, Zhang X, Chen J . External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Generation Computer Systems, 2015, 49: 58–67

[54]

Elhoseny M, Abdelaziz A, Salama A S, Riad A M, Muhammad K, Sangaiah A K . A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future Generation Computer Systems, 2018, 86: 1383–1394

[55]

Wang T, Mei Y, Liu X, Wang J, Dai H N, Wang Z . Edge-based auditing method for data security in resource-constrained internet of things. Journal of Systems Architecture, 2021, 114: 101971

[56]

Sarosh P, Parah S A, Bhat G M, Muhammad K . A security management framework for big data in smart healthcare. Big Data Research, 2021, 25: 100225

[57]

Yu W, Liu Y, Dillon T, Rahayu W, Mostafa F . An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques. IEEE Internet of Things Journal, 2022, 9( 3): 2443–2454

[58]

Wang T, Yang Q, Shen X, Gadekallu T R, Wang W, Dev K . A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Transactions on Industrial Informatics, 2022, 18( 7): 4981–4989

[59]

Forouzan B A, Mukhopadhyay D. Cryptography and Network Security (Sie). McGraw-Hill Education, 2011

[60]

Pavithran P, Mathew S, Namasudra S, Singh A . Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine. Cluster Computing, 2022, 10.1007/s10586–022-03653-9

[61]

Aieh A, Sen A, Dash S R, Dehuri S. Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie Hellman key sharing technique. In: Proceedings of the 3rd International Conference on Computer, Communication, Control and Information Technology (C3IT). 2015, 1−6

RIGHTS & PERMISSIONS

Higher Education Press

AI Summary AI Mindmap
PDF (9570KB)

Supplementary files

FCS-22193-OF-AS_suppl_1

3337

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/