SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Richa H. Ranalkar et al. Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Review on Multi-Cloud DNA Encryption Model for Cloud
Security
Richa H. Ranalkar *, Prof. B.D. Phulpagar**
*(M.E. Student, Department of Computer Engineering, Modern College of Engineeting, Pune – 05)
** (Professor, Department of Computer Engineering, Modern College of Engineeting, Pune – 05)

ABSTRACT
Cloud computing is one of the fastest growing areas in the IT industry, with huge potential of cost-saving
capabilities along with increased flexibility and scalability for system resources. Although there are great
benefits associated with cloud computing, it also presented new security threats/challenges. Due to risks of
service availability, failure and the possibility of malicious insiders in the single cloud, single cloud is becoming
less popular and new concept of using Multi-Clouds is becoming evident to solve these security issues. This
paper reviews DNA Encryption to secure data while storing it on Multi-Clouds.
Keywords - Cloud computing, Cloud security, Cloud service provider (CSP), DNA Encryption, DNA sequence
and Multi-Cloud

I.

INTRODUCTION

Cloud computing offers great potential, but
at the same time it presents many security risks and
challenges. Using “single cloud” provider is
becoming less popular due to service availability
failure risk and the possibility of malicious insiders
in the single cloud. Solution that comes up recently
is “multi-clouds”, or in other words, “inter-clouds”
or “cloud-of-clouds”.
Better security and data availability can be
achieved by breaking down the user’s critical data
block into parts and dispersing them among the
available Cloud Service Providers (CSP). Each
divided part of data can be further protected by
utilizing some interesting features of DNA
sequences and data hiding.
This paper aims to review DNA Encryption
as a possible solution for security and privacy
concerns of cloud.

II.

LITERATURE REVIEW

Mohammad A. Alzain et al. [1] proposed a
multi cloud database model. The proposed work
encompasses comparison of this model with
Amazon cloud. They have demonstrated how this
proposed model is better for data storage and
retrieval. The model is analysed for addressing data
integrity, data intrusion, and service availability.
Anil Kurmus et al. [2] have proposed two
multi-tenancy architectures one at hypervisor level
and other at operating-system kernel level.
Architectures are compared as a solution to security
problems
such
as
malicious
customer,
confidentiality, data integrity and unauthorized data
access.
Sangdo Lee et al. [3] proposed a rain cloud
system model. Different cloud interface providers

www.ijera.com

are managed by library. His work aimed to
demonstrate data storage for a big rain cloud system.
According to S. Jaya Prakash et al. [4] a
multi cloud system where data is replicated into
different cloud providers is a solution to reduce the
service availability risk or loss of data. To overcome
security risk of single point of contact, multiple
clouds from different unrelated cloud providers
should be used.

III.

MULTI- CLOUD

Data availability, security, privacy, and
integrity are the most critical issues to solve in cloud
computing. Even though the cloud service providers
have powerful infrastructure along with standard
regulations to provide a better availability and
ensure customer’s data privacy, there still exist many
reports of service outage and privacy breach in last
few years. Solution is using multiple clouds for
storing critical data. An example of multi- cloud
architecture is as shown in Fig. 1.

Fig. 1: Multi-Cloud Architecture.

1625 | P a g e
Richa H. Ranalkar et al. Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628
Better security can be obtained by dispersing the
user data over multiple cloud service providers
(CSP) in such a way that, none of the CSP can
successfully retrieve meaningful information from
the data pieces allocated at their servers. Also,
because of redundancy in data distribution, user is
assured of data availability. If a service provider
goes bankrupt or suffers service outage, the user still
can access his critical data from other CSPs. Thus
advantages of using Multi-cloud storage are data
availability, avoid vendor lock-in, business
continuity and disaster recovery.
Given p number of cloud service providers,
User will divide his data into N data pieces where atleast k data pieces out of N data pieces are necessary
to recover any meaningful information of the data;
as data redundancy is used. This (k, N) is the first
threshold. Second threshold is of (q, p); which
implies, at least q out of p number of CSPs must be a
part of retrieval process for successful data retrieval
[5].
Thus minimum number of pieces that must
be chosen for data retrieval is k, for which at least q
service providers are required. ai is the data pieces
allocated to be stored at CSPi, Thus, we have:

Where, N ≥ k and p ≥ q
is jtℎ data unit on itℎ
service provider.
Now, to assure no meaningful information
retrieval by single CSP, less than k number of data
pieces should be allotted to each CSP:
0 < ai < k
Each of such data pieces should be
converted to binary in order to apply DNA
encryption and data hiding using DNA sequence.

IV.

DNA ENCRYPTION MODEL

Data hiding is one of the most popular ways
to protect data through the unsecured networks like
Internet.
Sureshraj and Bhaskaran proposed new data hiding
technique based on DNA sequences [6]. First DNA
encryption is applied by using two rules viz. base
pairing rules and complementary rules. Then
generated cipher-text is embedded in DNA reference
sequence, thus data hiding is used.
In real environment (biology) DNA is a
pair of biopolymers, Polynucleotide, forming the

www.ijera.com

www.ijera.com

double helix. Nucleotides synthesis is done in real
natural environment using below constant rules:
4.1 Watson-Crick Base Pairing Rules
 Purine Adenine (A) always pairs with the
pyrimidine Thymine (T).
 Pyrimidine Cytosine (C) always pairs with
the purine Guanine (G). For that See Fig. 2.

Fig. 2: Synthesizing Nucleotides in Natural
Environment.
4.2 Application in Computing Area
Base pairing rule - These natural rules will be
changed in order to increase complexity and make it
difficult to intrude by attacker. For example, in
biology G is synthesized to C while we can assume
G to T, A or C, anything and so on, as we selected.
Thus, all the base pairing rules are 4×3×2×1 = 24.
The possibility of correct guess by attacker is 1 /24.
The letters are A, C, G, and T known as
nucleotides, any composition from them will make a
DNA sequence.
Binary coding rule or Complementary
pairing rule - This rule is used to convert binary
data to DNA sequences. Consider G = 00, A = 01, T
= 10, and C = 11. In order to further increase the
complexity, again this will change every time, So
Next time G = 00 or it can be T, A or C. As these are
four basic nucleotides, hence four possibilities of
complementary rule for every DNA sequences. The
final numbers of possible rules are 4×3×2×1 = 24.
Hence, likelihood of correct guess is 1/24.
Generate DNA reference sequence - One
way is to directly pick up reference sequence from
European Bioinformatics Institute (EBI). This is
online database that consists of around 163 million
unique DNA sequences. However more secure
method is generating DNA sequence based on the
user-id and shift-key. Each user will be assigned
with four character user-id e.g. “TAGC” and at
random system will generate the shift-key range
from one to sixteen.
Thus,
system
can
generate
1616
combinations, as sixteen combinations can be shifted
based on the key, i.e. generating more than 163
million unique DNA reference sequences [6], [7].

1626 | P a g e
Richa H. Ranalkar et al. Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628
V.

PROPOSED METHOD

There exist clients (client-1 and client-2) of
a same company which are using cloud environment.
The client-1 wants to upload critical data on cloud
such that data confidentiality should be maintained.
First, client-1 must apply the method of DNA
encryption and data hiding on its data.
This is divided into two phases.
 Embedding data.
 Extracting the original data.
5.1
Embedding Data – Client-1
Pseudo code steps are as follows:
1.
2.
3.
4.
5.
6.
7.

M is original data piece in binary.
Apply binary coding rule.
M’ = DNA sequence (Converted to DNA
nucleotides from binary).
Apply base pairing rule.
M” = new form of M’.
Find index of Nucleotides in DNA
reference sequence.
M’” = Cipher text.

Assume original data M = 111001001011 should be
uploaded to the cloud. The following steps shows
original data convert to Cipher-Text.
DNA reference sequence is:
AT1CG2AA3TT4CG5CG6CT7GA8GT9AC10
CA11AT12TC13GC14GC15TG16AG17TC18AA
19CC20.
2. M = 111001001011.
3. Sub-Part1 (A = 00, T = 01, C = 10, G = 11).
4. M’ = GCTACG.
5. Sub-Part2 ((AC), (CG), (GT), (TA)).
6. M” = TGACGT.
7. Sub-Part3 (Picking Indexes); M”’=16109.
Thus, embedding phase is completed; sender sends
16109 to the cloud.
1.

5.2 Extracting Data – Client-2
Pseudo code steps are as given below:
M’” = Cipher text.
Find Index of Nucleotides in DNA
reference Sequence.
3. M” = Previous Form of M’.
4. Apply base pairing Rules on M’ (In reverse
way).
5. Get M’ = DNA Sequence.
6. Convert M’ to binary using binary coding
rule.
7. Get M= original data
Client-2 takes the secret data in form of some
numbers. Assume secret data M = 16109 should be
downloaded from the cloud. Below steps shows
cipher-text convert to Original data
DNA reference requence is:

1.

AT1CG2AA3TT4CG5CG6CT7GA8GT9AC10
CA11AT12TC13GC14GC15TG16AG17TC18AA
19CC20.
2. M”’ = 16109.
3. Sub-Part1
(Picking
Indexes);
M”=
TGACGT.
4. Sub-Part2 ((AC) (CG) (GT) (TA)).
5. M’ = GCTACG.
6. Sub-Part3 (A = 00, T = 01, C = 10, G = 11).
7. M = 111001001011.
So, the receiver extracted the original data,
accurately.

VI.

SECURITY MEASURES

In terms of security, each intruder must
have correct knowledge of following information.
Without this basic knowledge, possibility of
decrypting original data is scientifically near to zero.
DNA reference sequence: As stated previously
system generates more than 163 million DNA
reference sequences.
Base pairing rule: As stated in section IV-B,
likelihood of correct guess of this rule is 1/24.
Binary coding rule: As stated in section IV-B, The
possibility of correct guess by any attacker is 1 /24.
Hence, the final probability of correct and successful
guess by attacker is [6]

VII.

Sr.
No.

SUMMARY OF LITERARURE
REVIEW
Authors

Work

1

Compares Multi cloud
M. Alzain et al. database model Vs
Amazon cloud.

2

Proposed
Operating
system based multiarchitecture,
A. Kurmus et al. tenancy
OS
resource
segregation.

3

Proposed Rain cloud
system model, Rain
cloud library-Interface,
Demonstrated
Data
storage.

1.
2.

www.ijera.com

www.ijera.com

4

S. Lee et al.

J. Prakash et al. Suggests replication of
data reduces Service

1627 | P a g e
Richa H. Ranalkar et al. Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628
availability risk or loss
of
data,
Multiple
unrelated
cloud
architecture should be
used.

5

www.ijera.com

[6] D. Sureshraj, and V. Bhaskaran, "Automatic
DNA Sequence Generation for Secured Costeffective Multi-Cloud Storage", IEEE
Conference on Mobile Application Modelling
and Cloud Computing, pp. 1 – 6, December –
2012.
[7] European Bioinformatics Institute,
http://www.ebi.ac.uk/.

Proposed new data
hiding technique using
DNA sequence. DNA
Encryption is used to
D. Sureshraj et al.
protect
data
while
storing on Multi-cloud.

VIII.

CONCLUSION

Cloud computing is restructuring how IT
resources and services to be used and managed, but
major problem in cloud implementation is security
challenges. By dividing user’s data and applying
DNA encryption using data hiding, and then storing
it on multiple clouds; this model has shown its
ability of providing a cloud customer with a more
secured storage. The proposed concepts discussed
here will help to build strong security architecture in
cloud computing. This will also improve customer
satisfaction and will attract more investors for
industrial as well as future research farms.

REFERENCES
[1] M. A. Alzain, B. Soh and E. Pardede,
“MCDB: Using Multi-Clouds to Ensure
Security in Cloud Computing”, IEEE
transactions on Dependable, Autonomic and
Secure Computing (DASC), pp. 784 – 791,
Dec– 2011.
[2] A. Kurmus, M. Gupta, R. Pletka, C. Cachin,
and R. Haas, “A Comparison of Secure
Multi-tenancy Architectures for File System
Storage Clouds”,
ACM
International
Conference on Middleware. pp. 471- 490,
June - 2011.
[3] S. Lee, H. Park, and Y. Shin, “Cloud
Computing Availability: Multi-clouds for Big
Data Service”, 6th International Springer
Conference, pp. 799 - 806, August – 2012.
[4] S. Prakash, Dr. K. Subramanyam, and S.
Prasad, “Multi Clouds Model for Service
Availability and Security”, IJCST Vol. 2,
Issue -1, March – 2012.
[5] Y. Singh, F. Kandah, and W. Zhang, “A
Secured Cost-effective Multi-Cloud Storage
in Cloud Computing”, IEEE Workshop on
Computer Communications and Cloud
Computing, pp. 619 – 624, April – 2011.

www.ijera.com

1628 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION ijdms
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATIONPRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATIONcscpconf
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...IJDKP
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 
Distributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private CloudDistributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private CloudIJERA Editor
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...IEEEGLOBALSOFTTECHNOLOGIES
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Pvrtechnologies Nellore
 
ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
 ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATANexgen Technology
 

Was ist angesagt? (19)

IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATIONPRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
 
B0330811
B0330811B0330811
B0330811
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
C0312023
C0312023C0312023
C0312023
 
A0360109
A0360109A0360109
A0360109
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Distributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private CloudDistributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private Cloud
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
 ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
 

Andere mochten auch

Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Andere mochten auch (6)

Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 

Ähnlich wie Jj3616251628

Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption TechniqueSajedul Karim
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsIRJET Journal
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acidIJECEIAES
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsPrivacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsMd Uddin
 
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...ieeepondy
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA CryptographyIRJET Journal
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudAswathy Rajan
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Privacy protection domain-user integra tag deduplication in cloud data server
Privacy protection domain-user integra tag deduplication in  cloud data serverPrivacy protection domain-user integra tag deduplication in  cloud data server
Privacy protection domain-user integra tag deduplication in cloud data serverIJECEIAES
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 

Ähnlich wie Jj3616251628 (20)

Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
 
dbms ppt .pptx
dbms ppt .pptxdbms ppt .pptx
dbms ppt .pptx
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsPrivacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public Clouds
 
Final 1st
Final 1stFinal 1st
Final 1st
 
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Privacy protection domain-user integra tag deduplication in cloud data server
Privacy protection domain-user integra tag deduplication in  cloud data serverPrivacy protection domain-user integra tag deduplication in  cloud data server
Privacy protection domain-user integra tag deduplication in cloud data server
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 

Kürzlich hochgeladen

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Jj3616251628

  • 1. Richa H. Ranalkar et al. Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Review on Multi-Cloud DNA Encryption Model for Cloud Security Richa H. Ranalkar *, Prof. B.D. Phulpagar** *(M.E. Student, Department of Computer Engineering, Modern College of Engineeting, Pune – 05) ** (Professor, Department of Computer Engineering, Modern College of Engineeting, Pune – 05) ABSTRACT Cloud computing is one of the fastest growing areas in the IT industry, with huge potential of cost-saving capabilities along with increased flexibility and scalability for system resources. Although there are great benefits associated with cloud computing, it also presented new security threats/challenges. Due to risks of service availability, failure and the possibility of malicious insiders in the single cloud, single cloud is becoming less popular and new concept of using Multi-Clouds is becoming evident to solve these security issues. This paper reviews DNA Encryption to secure data while storing it on Multi-Clouds. Keywords - Cloud computing, Cloud security, Cloud service provider (CSP), DNA Encryption, DNA sequence and Multi-Cloud I. INTRODUCTION Cloud computing offers great potential, but at the same time it presents many security risks and challenges. Using “single cloud” provider is becoming less popular due to service availability failure risk and the possibility of malicious insiders in the single cloud. Solution that comes up recently is “multi-clouds”, or in other words, “inter-clouds” or “cloud-of-clouds”. Better security and data availability can be achieved by breaking down the user’s critical data block into parts and dispersing them among the available Cloud Service Providers (CSP). Each divided part of data can be further protected by utilizing some interesting features of DNA sequences and data hiding. This paper aims to review DNA Encryption as a possible solution for security and privacy concerns of cloud. II. LITERATURE REVIEW Mohammad A. Alzain et al. [1] proposed a multi cloud database model. The proposed work encompasses comparison of this model with Amazon cloud. They have demonstrated how this proposed model is better for data storage and retrieval. The model is analysed for addressing data integrity, data intrusion, and service availability. Anil Kurmus et al. [2] have proposed two multi-tenancy architectures one at hypervisor level and other at operating-system kernel level. Architectures are compared as a solution to security problems such as malicious customer, confidentiality, data integrity and unauthorized data access. Sangdo Lee et al. [3] proposed a rain cloud system model. Different cloud interface providers www.ijera.com are managed by library. His work aimed to demonstrate data storage for a big rain cloud system. According to S. Jaya Prakash et al. [4] a multi cloud system where data is replicated into different cloud providers is a solution to reduce the service availability risk or loss of data. To overcome security risk of single point of contact, multiple clouds from different unrelated cloud providers should be used. III. MULTI- CLOUD Data availability, security, privacy, and integrity are the most critical issues to solve in cloud computing. Even though the cloud service providers have powerful infrastructure along with standard regulations to provide a better availability and ensure customer’s data privacy, there still exist many reports of service outage and privacy breach in last few years. Solution is using multiple clouds for storing critical data. An example of multi- cloud architecture is as shown in Fig. 1. Fig. 1: Multi-Cloud Architecture. 1625 | P a g e
  • 2. Richa H. Ranalkar et al. Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628 Better security can be obtained by dispersing the user data over multiple cloud service providers (CSP) in such a way that, none of the CSP can successfully retrieve meaningful information from the data pieces allocated at their servers. Also, because of redundancy in data distribution, user is assured of data availability. If a service provider goes bankrupt or suffers service outage, the user still can access his critical data from other CSPs. Thus advantages of using Multi-cloud storage are data availability, avoid vendor lock-in, business continuity and disaster recovery. Given p number of cloud service providers, User will divide his data into N data pieces where atleast k data pieces out of N data pieces are necessary to recover any meaningful information of the data; as data redundancy is used. This (k, N) is the first threshold. Second threshold is of (q, p); which implies, at least q out of p number of CSPs must be a part of retrieval process for successful data retrieval [5]. Thus minimum number of pieces that must be chosen for data retrieval is k, for which at least q service providers are required. ai is the data pieces allocated to be stored at CSPi, Thus, we have: Where, N ≥ k and p ≥ q is jtℎ data unit on itℎ service provider. Now, to assure no meaningful information retrieval by single CSP, less than k number of data pieces should be allotted to each CSP: 0 < ai < k Each of such data pieces should be converted to binary in order to apply DNA encryption and data hiding using DNA sequence. IV. DNA ENCRYPTION MODEL Data hiding is one of the most popular ways to protect data through the unsecured networks like Internet. Sureshraj and Bhaskaran proposed new data hiding technique based on DNA sequences [6]. First DNA encryption is applied by using two rules viz. base pairing rules and complementary rules. Then generated cipher-text is embedded in DNA reference sequence, thus data hiding is used. In real environment (biology) DNA is a pair of biopolymers, Polynucleotide, forming the www.ijera.com www.ijera.com double helix. Nucleotides synthesis is done in real natural environment using below constant rules: 4.1 Watson-Crick Base Pairing Rules  Purine Adenine (A) always pairs with the pyrimidine Thymine (T).  Pyrimidine Cytosine (C) always pairs with the purine Guanine (G). For that See Fig. 2. Fig. 2: Synthesizing Nucleotides in Natural Environment. 4.2 Application in Computing Area Base pairing rule - These natural rules will be changed in order to increase complexity and make it difficult to intrude by attacker. For example, in biology G is synthesized to C while we can assume G to T, A or C, anything and so on, as we selected. Thus, all the base pairing rules are 4×3×2×1 = 24. The possibility of correct guess by attacker is 1 /24. The letters are A, C, G, and T known as nucleotides, any composition from them will make a DNA sequence. Binary coding rule or Complementary pairing rule - This rule is used to convert binary data to DNA sequences. Consider G = 00, A = 01, T = 10, and C = 11. In order to further increase the complexity, again this will change every time, So Next time G = 00 or it can be T, A or C. As these are four basic nucleotides, hence four possibilities of complementary rule for every DNA sequences. The final numbers of possible rules are 4×3×2×1 = 24. Hence, likelihood of correct guess is 1/24. Generate DNA reference sequence - One way is to directly pick up reference sequence from European Bioinformatics Institute (EBI). This is online database that consists of around 163 million unique DNA sequences. However more secure method is generating DNA sequence based on the user-id and shift-key. Each user will be assigned with four character user-id e.g. “TAGC” and at random system will generate the shift-key range from one to sixteen. Thus, system can generate 1616 combinations, as sixteen combinations can be shifted based on the key, i.e. generating more than 163 million unique DNA reference sequences [6], [7]. 1626 | P a g e
  • 3. Richa H. Ranalkar et al. Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628 V. PROPOSED METHOD There exist clients (client-1 and client-2) of a same company which are using cloud environment. The client-1 wants to upload critical data on cloud such that data confidentiality should be maintained. First, client-1 must apply the method of DNA encryption and data hiding on its data. This is divided into two phases.  Embedding data.  Extracting the original data. 5.1 Embedding Data – Client-1 Pseudo code steps are as follows: 1. 2. 3. 4. 5. 6. 7. M is original data piece in binary. Apply binary coding rule. M’ = DNA sequence (Converted to DNA nucleotides from binary). Apply base pairing rule. M” = new form of M’. Find index of Nucleotides in DNA reference sequence. M’” = Cipher text. Assume original data M = 111001001011 should be uploaded to the cloud. The following steps shows original data convert to Cipher-Text. DNA reference sequence is: AT1CG2AA3TT4CG5CG6CT7GA8GT9AC10 CA11AT12TC13GC14GC15TG16AG17TC18AA 19CC20. 2. M = 111001001011. 3. Sub-Part1 (A = 00, T = 01, C = 10, G = 11). 4. M’ = GCTACG. 5. Sub-Part2 ((AC), (CG), (GT), (TA)). 6. M” = TGACGT. 7. Sub-Part3 (Picking Indexes); M”’=16109. Thus, embedding phase is completed; sender sends 16109 to the cloud. 1. 5.2 Extracting Data – Client-2 Pseudo code steps are as given below: M’” = Cipher text. Find Index of Nucleotides in DNA reference Sequence. 3. M” = Previous Form of M’. 4. Apply base pairing Rules on M’ (In reverse way). 5. Get M’ = DNA Sequence. 6. Convert M’ to binary using binary coding rule. 7. Get M= original data Client-2 takes the secret data in form of some numbers. Assume secret data M = 16109 should be downloaded from the cloud. Below steps shows cipher-text convert to Original data DNA reference requence is: 1. AT1CG2AA3TT4CG5CG6CT7GA8GT9AC10 CA11AT12TC13GC14GC15TG16AG17TC18AA 19CC20. 2. M”’ = 16109. 3. Sub-Part1 (Picking Indexes); M”= TGACGT. 4. Sub-Part2 ((AC) (CG) (GT) (TA)). 5. M’ = GCTACG. 6. Sub-Part3 (A = 00, T = 01, C = 10, G = 11). 7. M = 111001001011. So, the receiver extracted the original data, accurately. VI. SECURITY MEASURES In terms of security, each intruder must have correct knowledge of following information. Without this basic knowledge, possibility of decrypting original data is scientifically near to zero. DNA reference sequence: As stated previously system generates more than 163 million DNA reference sequences. Base pairing rule: As stated in section IV-B, likelihood of correct guess of this rule is 1/24. Binary coding rule: As stated in section IV-B, The possibility of correct guess by any attacker is 1 /24. Hence, the final probability of correct and successful guess by attacker is [6] VII. Sr. No. SUMMARY OF LITERARURE REVIEW Authors Work 1 Compares Multi cloud M. Alzain et al. database model Vs Amazon cloud. 2 Proposed Operating system based multiarchitecture, A. Kurmus et al. tenancy OS resource segregation. 3 Proposed Rain cloud system model, Rain cloud library-Interface, Demonstrated Data storage. 1. 2. www.ijera.com www.ijera.com 4 S. Lee et al. J. Prakash et al. Suggests replication of data reduces Service 1627 | P a g e
  • 4. Richa H. Ranalkar et al. Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628 availability risk or loss of data, Multiple unrelated cloud architecture should be used. 5 www.ijera.com [6] D. Sureshraj, and V. Bhaskaran, "Automatic DNA Sequence Generation for Secured Costeffective Multi-Cloud Storage", IEEE Conference on Mobile Application Modelling and Cloud Computing, pp. 1 – 6, December – 2012. [7] European Bioinformatics Institute, http://www.ebi.ac.uk/. Proposed new data hiding technique using DNA sequence. DNA Encryption is used to D. Sureshraj et al. protect data while storing on Multi-cloud. VIII. CONCLUSION Cloud computing is restructuring how IT resources and services to be used and managed, but major problem in cloud implementation is security challenges. By dividing user’s data and applying DNA encryption using data hiding, and then storing it on multiple clouds; this model has shown its ability of providing a cloud customer with a more secured storage. The proposed concepts discussed here will help to build strong security architecture in cloud computing. This will also improve customer satisfaction and will attract more investors for industrial as well as future research farms. REFERENCES [1] M. A. Alzain, B. Soh and E. Pardede, “MCDB: Using Multi-Clouds to Ensure Security in Cloud Computing”, IEEE transactions on Dependable, Autonomic and Secure Computing (DASC), pp. 784 – 791, Dec– 2011. [2] A. Kurmus, M. Gupta, R. Pletka, C. Cachin, and R. Haas, “A Comparison of Secure Multi-tenancy Architectures for File System Storage Clouds”, ACM International Conference on Middleware. pp. 471- 490, June - 2011. [3] S. Lee, H. Park, and Y. Shin, “Cloud Computing Availability: Multi-clouds for Big Data Service”, 6th International Springer Conference, pp. 799 - 806, August – 2012. [4] S. Prakash, Dr. K. Subramanyam, and S. Prasad, “Multi Clouds Model for Service Availability and Security”, IJCST Vol. 2, Issue -1, March – 2012. [5] Y. Singh, F. Kandah, and W. Zhang, “A Secured Cost-effective Multi-Cloud Storage in Cloud Computing”, IEEE Workshop on Computer Communications and Cloud Computing, pp. 619 – 624, April – 2011. www.ijera.com 1628 | P a g e