Cloud computing has been defined as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. But there is a risk of widespread data loss or downtime due to internet connectivity problems or a localized component failure in a cloud computing environment. In order to reduce the service availability risk or loss of data, a multi cloud system where data is replicated into multiple clouds offered by different cloud providers are used. Once the assets are in the cloud, the clients lose control over them, as data in the cloud typically resides in a shared environment. With the growth of a large number of cloud service providers, there is a need to protect confidential images stored in the cloud from unauthorized users and also from the cloud service providers. This paper proposes an integrated encryption scheme based on DNA sequences and scrambling using zigzag pattern or Magic Square of doubly even order pattern to ensure double-fold security for the secure storage of confidential images on multi-cloud.
2. DEFINITIONS FOR THE PROPOSED SYSTEM
2.1. Cryptosystem : A cryptosystem is a five tuple (M, C, , , D) where
i. M is a finite set of plain-text (images).
ii. C is a finite set of possible cipher-text.
iii. is a finite set of possible keys.
iv. For each K , there is an encryption rule, EK and a corresponding decryption rule, DK D.
Each EK : M C and DK : C M are functions such that DK (EK (x)) = x, for every plain-text x M.
2.2. Synthesis: Creation of DNA sequences for the image data is referred to as Synthesis. DNA sequences are made up of four ...
... middle of paper ...
...eb, Salah El-Gindi, "A DNA based Implementation of YAEA Encryption Algorithm", IASTED International Conference on Computational Intelligence,2006
[4] Grasha Jacob, Murugan A, “A Hybrid Encryption Scheme using DNA Technology”, IJCSCS Vol 3, Feb 2013
[5] G.Xiao, M. Lu, L. Qin, X. Lai, "New field of cryptography: DNA cryptography," Chinese Science Bulletin, vol. 51( ), pp. 1139-1144, Jun. 2006
[6] G. Cui, L. Qin, "Information Security Technology Based on DNA Computing", IEEE International, 2007
[7] Grasha Jacob, A. Murugan, “An Encryption Scheme with DNA Technology and JPEG Zigzag Coding for Secure Transmission of Images”, http://arxiv.org/abs/1305.1270, 2013
[8] Richa H. Ranalkar, B.D. Phulpagar, “Review on Multi-Cloud DNA Encryption Model for Cloud Security”, Int. Journal of Engineering Research and Applications, Vol. 3, Issue 6, Nov-Dec 2013, pp.1625-1628
should manage the confidentiality of the identities of human subjects whose DNA is being modeled in a simulator.
“On February 21, 1953, Watson could see the finished structure, he had recognized how two pairs of complementary bases (adenine-thymine and guanine-cytosine) would have identical shapes if held together by hydrogen bonds, two long chains of such base pairs would likely form a double helix—roughly, the shape of an enormously long, winding, doubled-railed staircase. The DNA molecule, comprised of long strands of such base pairs in specific and varied sequences, could embed genetic information that, if the strands were separated, could be copied.”
The collection of DNA in an investigation is used most often to determine who the perpetrator(s) might be in a crime. There has been a rapid growth since its inception and legal and ethical issues have arisen. In the Double –Helix Double-Edged ...
Asymmetric Encryption is used to protect the data while in movement. Asymmetric Encryption is also known as Public Key Encryption. It uses two related keys, a public key and a private key which is not shared with anyone. This pair of keys are developed by mathematical methods which can be solved in one direction. So anyone can encode a data using the public key but only the user with a private key can decode that specific data. The length of Asymmetric Key Encryption is normally 1024 or 2048 bits. However, in Asymmetric framework the keys with smaller than 2048bits are considered as not safe to use.
Deoxyribonucleic acid (DNA) is an acclaimed extraordinary discovery that has contributed great benefits in several fields throughout the world. DNA evidence is accounted for in the majority of cases presented in the criminal justice system. It is known as our very own unique genetic fingerprint; “a chromosome molecule which carries genetic coding unique to each person with the only exception of identical twins (that is why it is also called 'DNA fingerprinting ')” (Duhaime, n.d.). DNA is found in the nuclei of cells of nearly all living things.
"Using DNA to Solve Crimes." U.S. Department of Justice: National Institute of Justice. (September 9, 2014). Web. 29 May 2015.
Watson, J. D., Gilman, M., Witkowski, J., Zoller, M. (1992). Recombinant DNA. New York: W. H. Freeman and Company.
The work of this company revolves around DNA. They have formulated techniques to decipher the very code of a human’s existence. DNA has always been the most complex structure in a human body. 23andMe has invested all its resources into unravelling this very structure, in a way that it benefits an individual to improve the health conditions, based on future health predictions.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used.
First of all, a little background on DNA and genetics. DNA, or deoxyribonucleic acid, is a complex structure consisting of a double stranded helix made up of complementary base pairs. Adenine (A) pairs up with thymine (T) and guanine (G) matches with cytosine (C). They are held together with the help of hydrogen bonds. The helix is spiral shaped, and the outside of DNA is alternating sugar and phosphate groups. Watson and Crick presented this structure in 1953.
The scientific and medical progress of DNA as been emense, from involving the identification of our genes that trigger major diseases or the creation and manufacture of drugs to treat these diseases. DNA has many significant uses to society, health and culture of today. One important area of DNA research is that used for genetic and medical research. Our abi...
The protection of data being transferred between ATMs and the bank, and the use of cell phones is the most common everyday encounter with encryption. To encrypt and decrypt information a cipher is used. In a cipher there is a set of well-defined steps that can be followed to encrypt and decrypt messages. The use of a cipher relies greatly on the use of an encryption key. The key may contain any auxiliary information added to the cipher to produce certain