Browse > Article
http://dx.doi.org/10.3837/tiis.2019.07.025

DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique  

Majumdar, Abhishek (National Institute of Technology Silchar)
Biswas, Arpita (National Institute of Technology Silchar)
Baishnab, Krishna Lal (National Institute of Technology Silchar)
Sood, Sandeep K. (Guru Nanak Dev University, Regional Campus)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.7, 2019 , pp. 3794-3820 More about this Journal
Abstract
In recent years, a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability is much needed. This study presents a cloud storage framework, wherein a 128-bit encryption key has been generated by combining deoxyribonucleic acid (DNA) cryptography and the Hill Cipher algorithm to make the framework unbreakable and ensure a better and secured distributed cloud storage environment. Moreover, the study proposes a DNA-based encryption technique, followed by a 256-bit secure socket layer (SSL) to secure data storage. The 256-bit SSL provides secured connections during data transmission. The data herein are classified based on different qualitative security parameters obtained using a specialized fuzzy-based classification technique. The model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers. A fuzzy-based technique for order of preference by similarity to ideal solution (TOPSIS) multi-criteria decision-making (MCDM) model has been employed for this, which can decide on the set of suitable storage servers on which the data must be stored and results in a reduction in execution time by keeping up the level of security to an improved grade.
Keywords
Cloud Storage Security; DNA Cryptography; Fuzzy Logic; MCDM;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Gartner, "Newsroom: Consumers Will Store More Than a Third of Their Digital Content in the Cloud by 2016," Press Release, 2012.
2 A. T. Velte, T. J. Velte, R. C. Elsenpeter and R.C. Elsenpeter, "Cloud Computing: A Practical Approach," New York: McGraw-Hill, pp. 44, 2010.
3 S. Kamara and K. Lauter, "Cryptographic cloud storage," in Proc. of International Conference on Financial Cryptography and Data Security, Springer Berlin Heidelberg, pp. 136-149, January, 2010.
4 N. Cao, C. Wang, M. Li, K. Ren and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, 2014.   DOI
5 R. Chen, Y. Mu, G. Yang and F. Guo, Wang, X, "Dual-server public-key encryption with keyword search for secure cloud storage," IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 789-798, 2016.   DOI
6 M. Chase and S. Kamara, "Structured encryption and controlled disclosure," in International Conference on the Theory and Application of Cryptology and Information Security, Springer Berlin Heidelberg, pp. 577-594, December 2010.
7 C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring data storage security in cloud computing," in Proc. of IWQoS, pp. 1-9, July, 2009.
8 Q. Wang, C.Wang, K. Ren, W. Lou and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.   DOI
9 R. Buyya and M. Murshed, "Gridsim: A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing," Concurrency and Computation: Practice and Experience, vol. 14, no. 13-15, pp. 1175-1220, 2002.   DOI
10 J. E. Smith and R. Nair, "The architecture of virtual machines," Computer, vol. 38, no. 5, pp. 32-38, 2005.   DOI
11 S. K. Sood, "A combined approach to ensure data security in cloud computing," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831-1838, 2012.   DOI
12 C. Balding, "Is Your Amazon Machine Image Vulnerable to SSH Spoofing Attacks?," Cloud Security, 2008.
13 H. Takabi, J. B. Joshi and G. J. Ahn, "Securecloud: Towards a comprehensive security framework for cloud computing environments," in Proc. of 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), IEEE, pp. 393-398, July 2010.
14 S. Venkatesan and A. Vaish, "Multi-agent based dynamic data integrity protection in cloud computing," in Proc. of International Conference on Advances in Communication, Network, and Computing, Springer Berlin Heidelberg, pp. 76-82, March 2011.
15 P. Prasad, B. Ojha, R. R. Shahi, R. Lal, A. Vaish and U. Goel, "3 dimensional security in cloud computing," in Proc. of Computer Research and Development (ICCRD), 2011 3rd International Conference on IEEE, pp. 198-201, March 2011.
16 S. K. Sood, A.K. Sarje and K. Singh, "A secure dynamic identity based authentication protocol for multi-server architecture," Journal of Network and Computer Applications, vol. 34, no. 2, pp. 609-618, 2011.   DOI
17 J. Spillner, J. MuLler and A. Schill, "Creating optimal cloud storage systems," Future Generation Computer Systems, vol. 29, no.4, pp. 1062-1072, 2013.   DOI
18 B. Dong, Q. Zheng, F. Tian, K. M. Chao, R. Ma and R. Anane, "An optimized approach for storing and accessing small files on cloud storage," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 184-1862, 2012.
19 H. Cui, R. H. Deng, and Y. Li, "Attribute-based cloud storage with secure provenance over encrypted data," Future Generation Computer Systems, vol. 79, pp.461-472, 2018.   DOI
20 Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE transactions on parallel and distributed systems, vol. 27, no. 2, pp.340-352, 2016.   DOI
21 M. R. Abbasy and B. Shanmugam, "Enabling data hiding for resource sharing in cloud computing environments based on dna sequences," in Proc. of the 2011 IEEE World Congress on Services, SERVICES'11, pp. 385-390, 2011.
22 A. Khalifa and A. Atito, "High-capacity DNA-based steganography," in Proc. of 8th International Conference on Informatics and Systems (INFOS2012), IEEE, pp. BIO-76-80, 2012.
23 S. Sadeg, M. Gougache, N. Mansouri and H. Drias, "An encryption algorithm inspired from DNA," in Proc. of International Conference on Machine and Web Intelligence (ICMWI), IEEE, pp. 344-349, October 2010.
24 A. Atito, A. Khalifa and S. Z. Rida, "DNA-based data encryption and hiding using playfair and insertion techniques," Journal of Communications and Computer Engineering, vol. 2, no. 3, pp. 44, 2012.
25 S. Pramanik and S. K. Setua, "DNA cryptography," in Proc. of 7th International Conference on Electrical & Computer Engineering (ICECE), IEEE, pp. 551-554, December 2012.
26 N. Kar, A. Majumder, A. Saha, S. Deb and M. C. Pal, "Data security and cryptography based on DNA sequencing," International Journal of Information Technology & Computer Science (IJITCS), vol. 10, no. 3, 2013.
27 L. Pray, "Discovery of DNA structure and function: Watson and Crick," Nature Education, vol. 1, no. 1, pp. 100, 2008.
28 X. Wang and Q. Zhang, "DNA computing-based cryptography," in Proc. of Fourth International Conference on Bio-Inspired Computing, BIC-TA'09. IEEE, pp. 1-3, October 2009.
29 A. Gehani, T. H. LaBean and J. H. Reif, "DNA-based Cryptography," in Proc. of 5th DIMACS Workshop on DNA-based Computers, pp. 167-188, 1999.
30 S. Marwan, A. Shawish and K. Nagaty, "DNA-based cryptographic methods for data hiding in DNA media," Biosystems, vol. 150, pp. 110-118, 2016.   DOI
31 M. Toorani and A. Falahati, "A secure variant of the Hill cipher," in Proc. of 2009 IEEE Symposium on Computers and Communications, pp. 313-316, 2009.
32 T. L. Saaty, "The analytic hierarchy and analytic network processes for the measurement of intangible criteria and for decision-making," Multiple criteria decision analysis: state of the art surveys, Springer, New York, NY, vol. 78, pp. 345-405, 2005.
33 A. Majumdar, T. Podder, A. Majumder, N. Kar and M. Sharma, "DNA-based cryptographic approach toward information security," in Proc. of Intelligent Computing, Communication and Devices, Springer India, pp. 209-219, 2014.
34 A. Majumder, A. Majumdar, T. Podder, N. Kar and M. Sharma, "Secure data communication and cryptography based on DNA based message encoding," in Proc. of International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), IEEE, pp. 360-363, May 2014.