Modified DNA-based Cryptography System in the Cloud: Deep Maxout-based Fined Tuned Key Generation
DOI:
https://doi.org/10.13052/jwe1540-9589.2281Keywords:
Cloud security, cryptography, encryption, DNA, deep learningAbstract
Cloud security is a set of practices and tools created to address both internal and external security threats to businesses. Organizations must have cloud security as they implement their digital transformation schemes and include cloud-based tools and services in their infrastructure. Cryptography is a mechanism for preventing illegal access to data. In this paper, modified DNA-based cryptography (MDNAC), which is defined as data hiding with respect to DNA sequence is used. The steps involved in the proposed MDNAC is: encryption and decryption with optimal key generation. A way of converting plain text into cipher text is known as encryption. Two components make up the encryption process: a key and an encryption algorithm. For the encryption algorithm, we employed a modified DNA algorithm. In the decryption phase, the reverse operation is performed to get the plain text from the cipher text. Moreover, a deep learning model is used for generating the keys; the model used is deep maxout. To ensure the appropriate key generation process, the weights of the deep maxout are optimally tuned by the new feedback assisted Archimedes optimization (FAAO) algorithm. Based on the generated keys, the encryption process takes place. Finally, the performance of MDNAC is evaluated using conventional methods with respect to different measures. Additionally, the MDNAC obtained a correlation value of 0.20297 for the mean case scenario, despite the fact that the corresponding values are 0.02%, 0.17%, 0.2%, 0.7%, 0.12%,0.41%, 0.86%, and 0.46% as compared to the other models such as FAT, AOA, BMO, COOT, BOA, SSO, WOA, and LES respectively.
Downloads
References
Pandey, Gyan Prakash, Implementation of DNA Cryptography in Cloud Computing and Using Huffman Algorithm, Socket Programming and New Approach to Secure Cloud Data (August 7, 2019). Available at SSRN: https://ssrn.com/abstract=3501494 or http://dx.doi.org/10.2139/ssrn.3501494.
Majumdar, A., Biswas, A., Majumder, A. et al. A novel DNA-inspired encryption strategy for concealing cloud storage. Front. Comput. Sci. 15, 153807 (2021). https://doi.org/10.1007/s11704-019-9015-2.
Kumar S. Ray, Mandrita Mondal, “Review on DNA Cryptography”, 2019.
JarJar, A. Two Feistel rounds in image cryptography acting at the nucleotide level exploiting dna and rna property. SN Appl. Sci. 1, 1411 (2019). https://doi.org/10.1007/s42452-019-1305-7.
Thangamani, N., Murugappan, M. A Lightweight Cryptography Technique with Random Pattern Generation. Wireless Pers Commun 104, 1409–1432 (2019). https://doi.org/10.1007/s11277-018-6092-8.
Zhang, Y., Wang, F., Chao, J. et al. DNA origami cryptography for secure communication. Nat Commun 10, 5469 (2019). https://doi.org/10.1038/s41467-019-13517-3.
Varsha Kolate1, R.B. Joshi, “An Information Security Using DNA Cryptography along with AES Algorithm”, Turkish Journal of Computer and Mathematics Education, 2021.
Maria Imdad, Sofia Najwa Ramli, HairulnizamMahdin, “Increasing Randomization of Ciphertext in DNA Cryptography”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 10, 2021.
Prema T. Akkasaligar and Sumangala Biradar (2020) Selective medical image encryption using DNA cryptography, Information Security Journal: A Global Perspective, 29:2, 91–101, DOI: 10.1080/19393555.2020.1718248.
Prasanna Balaji Narasingapuram, M. Ponnavaikko, “DNA Cryptography Based User Level Security for Cloud Computing and Applications”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-5, January 2020.
BaraaTareq Hammad, Ali Maki Sagheer, Ismail Taha Ahmed, Norziana Jamil, “A comparative review on symmetric and asymmetric DNA-based cryptography”, Bulletin of Electrical Engineering and Informatics Vol. 9, No. 6, December 2020, pp. 2484–2491 ISSN: 2302-9285, DOI: 10.11591/eei.v9i6.2470.
Anand M, Anusha G, Aravind Kumar MJ, Bharath Kumar R, Hema Varna M, “Cryptography Based on DNA Analysis”, Perspectives in Communication, Embedded-Systems and Signal-Processing (PiCES) – An International Journal ISSN: 2566-932X, Vol. 4, Issue 12, March 2021.
Mohammed Abbas Fadhil Al-Husainy, Bassam Al-Shargabi, ShadiAljawarneh, “Lightweight cryptography system for IoT devices using DNA”, Computers and Electrical Engineering, Volume 95, October 2021.
M.M. Indrasena Reddy, D.A.P. Siva Kumar, D.K. Subba Reddy, A secured cryptographic system based on DNA and a hybrid key generation approach, Bio Systems (2020), https://doi.org/10.1016/j.biosystems.2020.104207.
Pramod Pavithran, Sheena Mathew, SuyelNamasudra, Pascal Lorenz, “A novel cryptosystem based on DNA cryptography and randomly generated mealy machine”, Computers & Security Volume 104, May 2021.
Md. Rafiul Biswas, Kazi Md. RokibulAlama, Shinsuke Tamura, Yasuhiko Morimoto, “A technique for DNA cryptography based on dynamic mechanisms”, Journal of Information Security and Applications Volume 48, October 2019.
SayantaniBasu, Marimuthu Karuppiah, MitaNasipuri, Anup Kumar Halder, Niranchana Radhakrishnan, “Bio-inspired cryptosystem with DNA cryptography and neural networks”, Journal of Systems Architecture, Volume 94, March 2019.
Nandy, N., Banerjee, D. and Pradhan, C. Color image encryption using DNA based cryptography. Int. J. Inf. Tecnol. 13, 533–540 (2021). https://doi.org/10.1007/s41870-018-0100-9.
Elamir, M.M., Mabrouk, M.S. and Marzouk, S.Y. Secure framework for IoT technology based on RSA and DNA cryptography. Egypt J Med Hum Genet 23, 116 (2022). https://doi.org/10.1186/s43042-022-00326-5.
Chirakkarottu, S., Mathew, S. A novel encryption method for medical images using 2D Zaslavski map and DNA cryptography. SN Appl. Sci. 2, 1 (2020). https://doi.org/10.1007/s42452-019-1685-8.
AL-Shargabi, B., and Dar Assi, A. (2023). A modified lightweight DNA-based cryptography method for internet of things devices. Expert Systems, e13270.
Sharfuddin, N., Anwer, F., and Ali, S. (2023). A Novel Cryptographic Technique for Cloud Environment Based on Feedback DNA. Int. J. Exp. Res. Rev, 32, 323–339.
Yajie Miao, Florian Metze, and Shourabh Rawat, “Deep Maxout Networks for Low-resource Speech Recognition”, 2013.
Fatma A. Hashim, Kashif Hussain, Essam H. Houssein, Mai S. Mabrouk, Walid Al-Atabany, “Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems”, Applied Intelligence, https://doi.org/10.1007/s10489-020-01893-z.
Varun Kumar S, and Dr. R. Panneerselvam, “A Study of Crossover Operators for Genetic Algorithms to Solve VRP and its Variants and New Sinusoidal Motion Crossover Operator”, International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 7 (2017), pp. 1717–1733 © Research India Publications http://www.ripublication.com.