Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment

被引:63
作者
Namasudra, Suyel [1 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Cloud computing; DNA; Cryptography; Encryption; DNA computing; Servers; Data models; Cloud service provider; complementary pair rule; DNA encoding rule; DNA-EXOR rule; decimal encoding rule; CloudSim; HIDING MESSAGES;
D O I
10.1109/TSC.2020.3046471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a cloud environment, traditional approaches are used to encrypt any data by using 0 and 1 that increase data security issues because of the presence of numerous malicious users and hackers over the internet. Deoxyribonucleic Acid (DNA) computing can be one of the best solutions to improve data security in which data are encrypted using the DNA bases: Thymine (T), Guanine (G), Cytosine (C) and Adenine (A). Along with data security, access control is another major issue of a cloud environment as the searching time of the owner of any data, the system overheard and the accessing time of a file or data are high during data access. A novel DNA computing based secure and fast Access Control Model (ACM) is proposed in this article to solve all these major problems. In the proposed scheme, the Cloud Service Provider (CSP) keeps a table or list for fast data accessing. Here, a 1024-bit DNA computing based random key is generated by using the user's secret information, and the same key is utilized for data encryption. Theoretical analysis along with many experimental results prove the efficiency and effectiveness of the proposed access control model over some well-known existing models.
引用
收藏
页码:2289 / 2300
页数:12
相关论文
共 29 条
  • [1] MOLECULAR COMPUTATION OF SOLUTIONS TO COMBINATORIAL PROBLEMS
    ADLEMAN, LM
    [J]. SCIENCE, 1994, 266 (5187) : 1021 - 1024
  • [2] Ajgaonkar S., 2015, INT J CURRENT ENG TE, V5, P708
  • [3] A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
    Alam, Quratulain
    Malik, Saif U. R.
    Akhunzada, Adnan
    Choo, Kim-Kwang Raymond
    Tabbasum, Saher
    Alam, Masoom
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1259 - 1268
  • [4] Risk-Aware Management of Virtual Resources in Access Controlled Service-Oriented Cloud Datacenters
    Almutairi, Abdulrahman
    Sarfraz, Muhammad Ihsanulhaq
    Ghafoor, Arif
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (01) : 168 - 181
  • [5] [Anonymous], 2020, AP COMM MATH
  • [6] [Anonymous], 2020, JAVA
  • [7] [Anonymous], 2011, BASICS CLOUD COMPUTI
  • [8] [Anonymous], 2020, CITYPULSE DAT COLL
  • [9] CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
    Calheiros, Rodrigo N.
    Ranjan, Rajiv
    Beloglazov, Anton
    De Rose, Cesar A. F.
    Buyya, Rajkumar
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (01) : 23 - 50
  • [10] Hiding messages in DNA microdots
    Clelland, CT
    Risca, V
    Bancroft, C
    [J]. NATURE, 1999, 399 (6736) : 533 - 534