What are you looking for ?
Advertise with us
RAIDON

R&D: Novel DNA-Inspired Encryption Strategy for Concealing Cloud Storage

Security, sensitivity and functionality analysis show that proposed scheme guarantees high security with robustness.

Frontiers of Computer Science has published an article written by Abhishek Majumdar, Arpita Biswas, Department of Electronics and Communication Engineering, NIT Silchar, Silchar, Assam, 788010, India, Atanu Majumder, National Informatics Centre, Agartala, Tripura, 799001, India, Sandeep Kumar Sood, Computer Science and Informatics, Central University of Himachal Pradesh, Dharamsala, HP, 176206, India, and Krishna Lal Baishnab, Department of Electronics and Communication Engineering, NIT Silchar, Silchar, Assam, 788010, India.

Abstract: Over the last few years, the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely. This study presents such a secured cloud storage framework comprising of a deoxyribonucleic acid (DNA) based encryption key which has been generated to make the framework unbreakable, thus ensuring a better and secured distributed cloud storage environment. Furthermore, this work proposes a novel DNA-based encryption technique inspired by the biological characteristics of DNA and the protein synthesis mechanism. The introduced DNA based model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers on which the data must be stored. A fuzzy-based technique for order of preference by similarity to ideal solution (TOPSIS) multi-criteria decisionmaking (MCDM) model has been employed to achieve the above-mentioned goal. This can decide the set of suitable storage servers and also results in a reduction in execution time by keeping up the level of security to an improved grade. This study also investigates and analyzes the strength of the proposed S-Box and encryption technique against some standard criteria and benchmarks, such as avalanche effect, correlation coefficient, information entropy, linear probability, and differential probability etc. After the avalanche effect analysis, the average change in cipher-text has been found to be 51.85%. Moreover, thorough security, sensitivity and functionality analysis show that the proposed scheme guarantees high security with robustness.

Articles_bottom
ExaGrid
ATTOtarget="_blank"
OPEN-E