Skip to main content

Secure Cloud Storage Using Color Code in DNA Computing

  • Conference paper
  • First Online:
Advances in Networked-Based Information Systems (NBiS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 313))

Included in the following conference series:

  • 433 Accesses

Abstract

Now a days the cloud computing became a trend of storage, computational power, and other advanced services. Already 90% of the companies are on the cloud, more and more corporate data and public data are being stored in the cloud. Nearly two-third of organizations see security as the tremendous challenge for cloud adoption. So now a days there are lot of research going on to reduce the security risk of storing confidential data over the cloud. In this research we introduced a novel encryption method to secure the data in the cloud using the color code encryption and the well-known DNA computing method. Here we used a 1024-bit encryption key to store the data in the cloud. This key has been designed by using the 256-RGB Color codes, User’s attributes like MAC address and personal data, decimal encoding, ASCII values and DNA bases with complementary rules. The Security analysis of the algorithm is discussed in this research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Thomas, E., Ricardo, P., Zaigham, M.: Cloud Computing: Concepts, Technology & Architecture, The Pearson Service Technology Series (2014)

    Google Scholar 

  2. Dotson, C.: Practical Cloud Security. O’Reilly Media, Inc (2019)

    Google Scholar 

  3. Mathew, S.: AWS principal solutions architect, Overview of Amazon Web Services (2020)

    Google Scholar 

  4. Morrow, T.: 12 risks, threats, & vulnerabilities in moving to the cloud, Carnegie Mellon University’s Software Engineering Institute Blog (2018)

    Google Scholar 

  5. Kumar, S., Wollinger, T.: Fundamentals of symmetric cryptography. In: Lemke, K., Paar, C., Wolf, M. (eds.) Embedded Security in Cars. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-28428-1_8

  6. Namasudra, S., Roy, P., Balusamy, B., Vijayakumar, P.: Data accessing based on the popularity value for cloud computing. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1–6 (2017)

    Google Scholar 

  7. Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., Shanthini, A.: Towards DNA based data security in the cloud computing environment. Comput. Commun. 151, 539–547 (2020)

    Google Scholar 

  8. Younis, Y.A., Kifayat, K., Merabti, M.: An access control for cloud computing. J. Inf. Secur. Appl. 19(1), 45–60 (2014)

    Google Scholar 

  9. Balamurugan, B., Krishna, P.V.: Extensive survey on usage of attribute-based encryption in cloud. J. Emerg. Technol. Web Intell. 6(3), 263–272 (2014)

    Google Scholar 

  10. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of Advances Cryptology, pp. 47–53 (1985)

    Google Scholar 

  11. Crues, R.A.: Methods for access control: advances and limitations (2013)

    Google Scholar 

  12. Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability based cryptographic data access control in cloud computing. Int. J. Adv. Netw. Appl. 3(3), 1152–1161 (2011)

    Google Scholar 

  13. Zhu, Y., Hu, H., Ahn, G.J., Huang, D., Wang, S.: Towards temporal access control in cloud computing. In: Proceedings of IEEE INFOCOM, Orlando, USA, pp. 2576–2580 (2012)

    Google Scholar 

  14. Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266, 1021–1024 (1994)

    Article  Google Scholar 

  15. Clelland, C., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399(V), 533–534

    Google Scholar 

  16. MingXin, L.: Symmetric key cryptosystem with DNA technology. Sci. China Ser. F Inf. Sci. 50, 324–333 (2007)

    Article  Google Scholar 

  17. Lai, X., MingXin, L., Qin, L.: Asymmetric encryption and signature method with DNA technology. Sci. China. Inf. Sci. 53, 506–514 (2010)

    Google Scholar 

  18. Wang, B., Xie, Y., Zhou, S., Zhou, C., Zheng, X.: Reversible data hiding based on DNA computing. Comput. Intell. Neurosci. 2017, 9 (2017). Article ID 7276084

    Google Scholar 

  19. Gaitonde, A.: Color coded cryptography. Int. J. Sci. Eng. Res. 3(7), 828–830 (2012)

    Google Scholar 

  20. Tiri, K.: Side-channel attack pitfalls. In: Proceedings of the 44th ACM/IEEE Design Automation Conference, San Diego, USA. IEEE (2007)

    Google Scholar 

  21. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94–100 (2007)

    Article  Google Scholar 

  22. Chen, H.-C., et al.: A secure color-code key exchange protocol for mobile chat application. In: You, I., Leu, F.-Y., Chen, H.-C., Kotenko, I. (eds.) MobiSec 2016. CCIS, vol. 797, pp. 54–64. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7850-7_6

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Ministry of Science and Technology, Taiwan, through grant MOST 110-2218-E-468-001-MBK.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Lin Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Manikandan, S., Saikhul, I.M.D., Chen, HC., Song, YL. (2022). Secure Cloud Storage Using Color Code in DNA Computing. In: Barolli, L., Chen, HC., Enokido, T. (eds) Advances in Networked-Based Information Systems. NBiS 2021. Lecture Notes in Networks and Systems, vol 313. Springer, Cham. https://doi.org/10.1007/978-3-030-84913-9_10

Download citation

Publish with us

Policies and ethics