International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography

Author NameAuthor Details

Mercy Joseph, Gobi Mohan

Mercy Joseph[1]

Gobi Mohan[2]

[1]Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, India

[2]Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, India

Abstract

Cloud is a recent technology that enables wide access and storage on the internet. Moreover, the cloud computing environment allows storing and sharing plenty of digital data including text, image, video, audio, etc. through the internet. Although it is cost-effective and has numerous advantages, cloud technology still faces a lot of challenges like data loss, quality issues, and data security. In this paper, an effective algorithm is introduced using deoxyribonucleic acid (DNA)-based cryptography to enhance data security while sharing the data over the internet. For this process, an optimized encryption model is implemented using Grey Wolf Optimization (GWO) Algorithm to generate optimal encrypted data while sharing. Various datasets have been implemented to verify the efficiency of the proposed GWO Assisted-DNA (GWOA-DNA) cryptography in terms of accuracy and execution time.

Index Terms

Data Security

DNA-Based Cryptography

User Access

Cloud Computing

Key Generation

Encryption

User Verification

User Access

Reference

  1. 1.
    Selvi, S., and M. Gobi. "Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security." International Conference on Intelligent Data Communication Technologies and Internet of Things. Springer, Cham, 2018.
  2. 2.
    Gobi, M., and R. Sridevi. "An Approach for Secure Data Storage in Cloud Environment." International Journal of Computer and Communication Engineering 2.2 (2013): 206.
  3. 3.
    Fu X, Liu B, Xie Y, Li W, Liu Y. (2018) ‘Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos’, IEEE Photonics Journal. Vol.10 NO.3, pp.1-15
  4. 4.
    Selvi, S., and M. Gobi. "An Efficient Data Security Model using Hyper Elliptic Curve Cryptography and Steganography
  5. 5.
    Liu X, Deng R. H, Choo K. -K. R, Yang Y, and Pang H. (2020) ‘Privacy-Preserving Outsourced Calculation Toolkit in the Cloud’, IEEE Transactions on Dependable and Secure Computing,vol. 17 NO.5, pp.898-911
  6. 6.
    Wei X, Guo L, and Zhang Q.(2012), ‘A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system’, J. Syst. Softw. Vol.85 NO.2, pp.290-299
  7. 7.
    Q. Alam S. U. R. Malik A. Akhunzada K. R. Choo S. Tabbasum and M. Alam,(2017) ’ A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification’, IEEE Trans. Inf. Forensics Secur, vol.12 NO. 6 pp.1259-1268
  8. 8.
    Gobi, M., R. Sridevi, and R. Rahini. "A comparative study on the performance and the security of RSA and ECC algorithm." International journal of advanced network and application (2015)
  9. 9.
    Sridevi, R., and S. Selvi. "Progressing Biometric Security Concern with Blowfish Algorithm.", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8, Issue- 9S2, 2019.
  10. 10.
    Kumar B. M, Sri B. R. S, Katamaraju, G. M. S. A, Rani P, Harinadh N, and Saibabu C. (2020) ‘File Encryption and Decryption Using DNA Technology’, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp.382-385
  11. 11.
    Kumar, G. Kishore, and Dr M. Gobi. "Role of Cryptography & its Related Techniques in Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology, IJRASET 5 (2017).
  12. 12.
    Selvi, S., et al. "Hyper elliptic curve cryptography in multi cloud-security using DNA (genetic) techniques." 2017 International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2017
  13. 13.
    Pushpa B. R. (2017) ‘A new technique for data encryption using DNA sequence’, 2017 International Conference on Intelligent Computing and Control(I2C2), pp.1-4
  14. 14.
    Ritu Gupta and Anchal Jain. (2014) ‘A New Image Encryption Algorithm based on DNA Approach’, International Journal of Computer Applications, Vol. 85 NO. 18
  15. 15.
    Selvi, S., and R. Sridevi. "Efficient Scheduling Mechanisms for Secured Cloud Data Environment.", International Journal of Recent Technology and Engineering (IJRTE), Volume-8, Issue-2S11, 2019.
  16. 16.
    Seyedali Mirjalili, Seyed Mohammad Mirjalili and Andrew Lewisa, (2014) ‘Grey Wolf Optimizer, Advances in Engineering Software, Vol.69, pp.46-61
  17. 17.
    Abhishek Majumdar, Arpita Biswas, Atanu Majumder, Sandeep Kumar Sood and Krishna Lal Baishnab, (2020) ‘A novel DNA-inspired encryption strategy for concealing cloud storage’, Frontiers of Computer Science,Vol. 15
  18. 18.
    Ahmed Elhadad . (2019) ‘ Data sharing using proxy re-encryption based on DNA computing’, Soft Computing,vol.24, pp. 2101–2108
  19. 19.
    Thangavel,M Varalakshmi,,P. (2017) ‘Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud’, Cluster Computing, vol.21, pp.1411–1437
  20. 20.
    Nithya Chidambaram, Pethuru Raj Thenmozhi,k Sundararaman Rajagopalan, Rengarajan Amirtharajan,(2019) ‘ A cloud compatible DNA coded security solution for multimedia file sharing & storage’, Multimedia Tools and Applications,vol.78, pp.33837–33863
  21. 21.
    Sandhia,G.K. Raja, S. V. K. (2021) ‘Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography’, Journal of Ambient Intelligence and Humanized Computing
  22. 22.
    Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood and Shakoor Muhammad, (2020) CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Cluster Computing. Vol. 24, pp. 739–752
  23. 23.
    Rashmi Ramesh Rachh, Ananda Mohan P.V,and Anami B.S. (2012) ‘Efficient Implementations for AES Encryption and Decryption. Circuits, Systems, and Signal Processing’, Vol.31, pp.1765-1785
  24. 24.
    Ch. Usha Kumari, T. Pavani, A. Sampath Dakshina Murthy, B. Lakshmi Prasanna, and M. Pala Prasad Reddy, "Generating Cipher Text using BLOWFISH Algorithm for Secured Data Communications", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, No. 2, December 2019
  25. 25.
    Indumathi Saikumar, (2017) ‘DES- Data Encryption Standard’, International Research Journal of Engineering and Technology,Vol. 4 NO.3,
  26. 26.
    Khan J.S. (2020) et al., ‘DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption’, IEEE Access. Vol.8, pp.159732-159744.
SCOPUS
SCImago Journal & Country Rank