SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 2 (Nov. - Dec. 2013), PP 86-94
www.iosrjournals.org
www.iosrjournals.org 86 | Page
Automatic DNA Sequence Generation for Secured Effective Multi
-Cloud Storage
D.Sureshraj1, Dr.V.Murali Bhaskaran2
1
PhD Research Scholar, M.S.University, Tirunelveli District, TN
2
Principal, Dhirajlal Gandhi College of Technology, Salem District, TN
Abstract: The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences
to increase the confidentiality and complexity by using software point of view in cloud computing environments.
By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in
cloud. The algorithm which has been proposed here is based on binary coding and complementary pair rules.
Therefore, DNA reference sequence is chosen and a secret data M is hidden into it as well. As result of applying
some steps, M´´´ is come out to upload to cloud environments. The process of identifying and extracting the
original data M, hidden in DNA reference sequence begins once clients decide to use data. Furthermore,
security issues are demonstrated to inspect the complexity of the algorithm. In addition, providing better privacy
as well as ensure data availability, can be achieved by dividing the user’s data block into data pieces and
distributing them among the available SPs in such a way that no less than a threshold number of SPs can take
part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi-
cloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the
available SPs in the market, to provide customers with data availability as well as secure storage.
Keywords: DNA sequence; DNA base pairing rules; complementary rules; DNA binary coding; cloud service
provider.
I. Introduction
In order to protect data through the unsecure networks like the Internet, using various types of data
protection is necessary. One of the famous ways to protect data through the Internet is data hiding. Because of
the increasing number of Internet users, utilizing data hiding or Steganographic techniques is inevitable.
Therefore, the role of data hiding has become more eminent nowadays. Before employing biological properties
of DNA sequences, the common way of embedding a secret data into the host images was the traditional way of
data hiding. The most important ones was the detection of the distortions of the image when the host image
changed to some degrees. By advent of biological aspects of DNA sequences to the computing areas, new data
hiding methods have been proposed by researchers, based on DNA sequences In order to convert binary data
into amino acids as a DNA sequence, the base pairing rules must be used. Synthesizing nucleotides in real
environment (biology) [1] is done in constant rules:
 Purine Adenine (A) always pairs with the pyrimidine Thymine (T)
 Pyrimidine Cytosine (C) always pairs with the purine Guanine (G)
Always, those rules are done naturally because the opportunities to synthesize hydrogen bonds between A and T
(two bonds), and also between C and G. These concepts are named Watson-Crick base pairing rules.
Figure 1. Synthesizing nucleotides in real environment
In binary computing area, it is possible to change the natural rules by own decision. For example, in biology A
is synthesized to T while we can assume A to C or A to G, and so on, as we prefer. Increasing the complexity of
the algorithm is the main purpose of the changing the rules. Consider A=00, T=01, C=10, and G=11 to convert
Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage
www.iosrjournals.org 87 | Page
binary data to DNA sequences. A way to increase the complexity is complementary pair rule. Complementary
pair rule is a unique equivalent pair which is assigned to every nucleotides base pair. There are four basic
alphabets therefore four likelihood of complementary rule for every DNA sequences. So, the final number of
possible those rules are 4×3×2×1=24. On the other hand, the possibility to happen a correct guess is 1/24.
II. Associated Works
The most important part of each DNA base data hiding algorithm is, manipulating four letters which
has been called as nucleotides in biology. The letters are A, C, G, and T. Any composition from them will make
a sequence. For instance, two DNA sequences have been taken and this DAN sequences from European
Bioinformatics Institute (which is known as EBI Database) for the purpose of extracting DNA sequences of
Litmus and Balsaminaceae. So, Litmus with 154 nucleotides and Balsaminaceae with 2283 are shown in below,
respectively:
Litmus:
“ATCGAATTCGCGCTGAGTCACAATTCGCGCTG
AGTCACAATTCGCGCTGAGTCACAATTGTGACTCA
GCCGCGAATTCCTGCAGCCCCGAATTCCGCATTGC
AGAGATAATTGTATTTAAGTGCCTGCTCGATACAA
TAAACGCCATTTGACC”.
Balsaminaceae:
“TTTTTATTATTTTTTTTCATTTTTTTCTCAGTTTT
TAGCACATATCATTACATTTTATTTTTTCATTACTTC
TATCATTCTATCTATAAAATCGATTATTTTTATCAC
TTATTTTTCTAATTTCCATATTTCATCTAATGATTAT
ATTACATTAAAGAAATCG”.
All binary sequences are illustrated in form of s{0|1}e. Primer has key role to decrypt a coded strand. Using a
public DNA strand was utilized as a reference sequence in their DNA based encryption technique. In this
scheme, the receiver must also be informed about the reference sequence. Namely, the receiver will receive a
selected primer and an encrypted strand. The intruder is not able to decrypt the binary data without knowing
about both of primer and reference strand, certainly. A primer is a complementary subset from a sort of DNA
strand. Normally, the primer is called a short substring.
For example, assume S is a DNA strand:
S= “ATGCTTAGTTCCATCGGAGACTAATGGCCTA” [2] and “two primers ATCAA and GATTAC”. So
“ATCAA and GATTAC are complementary substring of TAGTT and CTAATG”, correspondingly. Definitely,
a complementary rule is needed to handle the manipulations, correctly. For this reason, they defined a
complementary rule which is AT, T-A, C-G, and finally G-C. So, according to the above, the proper output of
the hybridization is:
Figure 2. Binary representation
Therefore, the final secret message in form of binary is “01010”.
III. Concepts
In this method, there is a cloud environment and its clients in a same company. The clients (client1 and
client 2) want to upload data on cloud in such a manner that confidentiality of data be in highest point [3].
Therefore, the clients need to employ a method to increase the level of confidentiality of data so that no one can
see data when someone intentionally or unintentionally accessed to them.
Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage
www.iosrjournals.org 88 | Page
Figure 3. System Architecture
First, client1 must apply the method of data hiding on its data which it wants to hide to the cloud computing
environments.
Data Hiding is divided into two phases.
 Embedding data [4].
 Extracting the original data [5].
3.1 Embedding Data - Client 1
Figure 4. Embedding Data
Assume original data M=100111000011[6] should be uploaded to the cloud. DNA Reference Sequence:
Figure 6. Original data convert to Secret data.
Now, embedding phase is finally completed. Then, sender sends 8137 to the cloud.
3.2 Extracting Data - Client 2
Figure 5. Extracting Data
Client2 takes the secret data in form of some numbers. For the purpose of extracting the original data from DNA
reference sequence, phase two with its sub phases will extract the original data, correctly. Assume secret data
M=8137 [6] should be downloaded from the cloud. DNA Reference Sequence:
Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage
www.iosrjournals.org 89 | Page
Figure 6.Secret Data convert to Original data
So, the receiver extracted the original data, accurately by using a simple algorithm.
IV. Security Measures
In terms of security, each intruder must be aware from the following information, correctly. Without this
fundamental information, possibility of extracting original data is near to zero, scientifically.
4.1 DNA reference sequence: There are 163 million DNA reference sequence on EBI database. Therefore, the
likelihood of making a doing well conjecture by attacker is 1 /24.
4.2 Binary coding rule: Clients are free to select any equivalent binary form for every nucleotide. It means that,
A can be „00‟, „01‟, „10‟, or „11‟; C can be „00‟, and so on. In other words, all the binary coding rules are
4×3×2×1=24. So, the likelihood of making correct guess by attacker is 1 /24.
4.3 Complementary pairing rule: Like binary coding rule, there is 4×3×2×1=24 complementary alphabet
among basic nucleotides. Therefore, the possibility of making successful attack is 1 / 24. Eventually, the final
probability of making a correct and successful guess by attacker is
V. Drawbacks in this System
5.1 The DNA Reference Sequence is selected from the EBI database, where 163 million DNA reference
are stored.
The problem in the above concept is this system use huge size of Data base and we need the algorithm
to pick the DNA sequence. It is time consuming process to pick the one DNA sequence out of 163 million
sequences. Consider a Reference DNA Sequence [7].
Figure 7. DNA sequence
The problem in above sequence is receptiveness CG is mentioned in three places 2, 5 and 6, CA is mentioned in
two places 10 and 11. This will create problems in implementation.
1. Consider a Reference DNA Sequence
a. Some time system may fetch the sequence similar to the above sequence, The problem in this sequence is
CC is missing. That means there is no guarantee that all the 16 combinations are available in the stored
sequence. If this is happen system cannot able to fulfill the encryption.
2. Compulsory 16 Combinations
AA, AC, AT, AG,
CA, CC, CT, CG,
TA, TC, TT, TG,
GA, GC, GT, GG
3. In this system the extracting data has been uploaded without Encryption in cloud. Moreover, a single cloud
service provider offered.
4. Even though in this system messages are spited and stored in different places, since it is not encrypted there
is chance for the others to easy the part of the data and they can able to guess the content of the entire file.
Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage
www.iosrjournals.org 90 | Page
VI. Proposed System
In the base paper DNA sequence is taken from the database where as in this application our program
will create the DNA sequence based on the user id and shift key, which is more secure than the method specified
in the paper.
In terms of security, each intruder must be aware from the following information, correctly. Without
this fundamental information, possibility of extracting original data is near to zero, scientifically. For each user
system will assign 4 character DNA key eg: “ACTG” and it will generate the shift key range from 1 to 16
randomly.
So 16 combinations can be shifted based on the key give so we cab able to produce 1616
combinations (i.e.) there are more than 163 million DNA unique reference sequence system can generate. Only
with small two inputs, Therefore, the likelihood of making a doing well conjecture by attacker is 1 / 24.
Binary coding rule: as mentioned, the clients are free to select any equivalent binary form for every
nucleotide. It means that, A can be „00‟, „01‟, „10‟, or „11‟; C can be „00‟, and so on. In other words, all the
binary coding rules are 4×3×2×1=24. So, the likelihood of making correct guess by attacker is 1 / 24.
Complementary pairing rule: like binary coding rule, there is 4×3×2×1=24 complementary alphabet among
basic nucleotides. Therefore, the possibility of making successful attack is 1 /24. Eventually, the final
probability of making a correct and successful guess by attacker is
Also we can overcome the other two disadvantages mention previously without changing the
probability of making guess by attackers. Now we have to use the Encrypted data and pushed to Cloud.
One of the prominent services offered in cloud computing is the cloud data storage, in which; subscribers do not
have to store their own data on their servers, where instead their data will be stored on the cloud service
provider‟s servers. In cloud computing, subscribers have to pay the providers for this storage service. This
service does not only provides flexibility and scalability data storage, it also provides customers with the benefit
of paying only for the amount of data they needs to store for a particular period of time, without any concerns of
efficient storage mechanisms and maintainability issues with large amounts of data storage. Customers can
easily access their data from any geographical region where the Cloud Service Provider‟s network or Internet
can be accessed
To providing better privacy as well as ensure data availability, can be achieved by dividing the user‟s data
block into data pieces and distributing them among the available SPs in such a way that no less than a threshold
number of SPs can take part in successful retrieval of the whole data block.
In our model the customer divides his data among several SPs available in the market, based on his available
budget. Also we provide a decision for the customer, to which SPs he must chose to access data, with respect to
data access quality of service offered by the SPs at the location of data retrieval. This not only rules out the
possibility of a SP misusing the customers‟ data, breaching the privacy of data, but can easily ensure the data
availability with a better quality of service.
From the business point of view, since cloud data storage is a subscription service, the higher the data
redundancy, the higher will be the cost to be paid by the user. We provide an optimization scheme to handle the
tradeoff between the cost that a cloud computing user is willing to pay to achieve a particular level of security
for his data.
Privacy preservation and data integrity are two of the most critical security issues related to user data.
But in case of cloud computing, the data is stored on an autonomous business party that provides data storage as
a subscription service. The users have to trust the cloud service provider (SP) with security of their data. One
Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage
www.iosrjournals.org 91 | Page
bigger concern that arises in such schemes of cloud storage services, is that, there is no full-proof way to be
certain that the service provider doe not retains the user data, even after the user opts out of the subscription.
With enormous amount of time, such data can be decrypted and meaningful information can be retrieved and
user privacy can easily be breached the user might not be availing the storage services from that service
provider, To provide users with better and fair chances to avail efficient security services for their cloud storage
at affordable costs, our model distributes the data pieces among more than one service providers, in such a way
that no one of the SPs can retrieve any meaningful information from the pieces of data stored on its servers,
without getting some more pieces of data from other service providers. We will describe our system model and
the threat model.
Advantage of the proposed system is a secured cost-effective multi cloud storage (SCMCS) in cloud
computing, which seeks to provide each customer with a better cloud data storage decisions, taking into
consideration the user budget as well as providing client with the best quality of service (Security and
availability of data) offered by available cloud service providers. By dividing and distributing customer‟s data,
this model has shown its ability of providing a customer with a secured storage under affordable budget.
System Overview
We consider the storage services for cloud data storage between two entities, cloud users (U) and cloud
service providers (SP). The cloud storage service is generally priced on two factors, how much data is to be
stored on the cloud servers and for how long the data is to be stored. In our model, we assume that all the data is
to be stored for same period of time. We consider p number of cloud service providers (SP), each available
cloud service provider is associated with a QoS factor, along with its cost of providing storage service per unit
of stored data (C). Every SP has a different level of quality of service (QoS) offered as well as a different cost
associated with it. Hence, the cloud user can store his data on more than one SPs according to the required level
of security and their
affordable budgets.
Threat Model
Customers‟ stored data at cloud service providers is vulnerable to various threats. Cloud service provider
can be a victim to Denial of service attacks or its variants. We consider two types of threat models.
1. Single point of failure
This will affect the data availability that could occur if a server at the cloud service provider failed or
crashed, which make it hard for the costumer to retrieve his stored data from the server. Availability of data is
also an important issue which could be affected, if the cloud service provider (SP) runs out of business. Such
worries are no more hypothetical issues; therefore, a cloud service customer can not entirely rely upon a solo
cloud service provider to ensure the storage of his vital data.
Assume that three customers (C1, C2 and C3) stored their data on three different service providers (CSP1, CSP2
and CSP3) respectively. Each customer can retrieve his own data from the cloud service provider who it has a
contract with. If a failure occur at CSP1, due to internal problem with the server or some issues with the cloud
service provider, all C1‟s data which was stored on CSP1‟s servers will be lost and cannot be retrieved. One
solution for this threat is that, the user will seek to store his data at multiple service providers to ensure better
availability of his data.
2. Colluding service providers
Colluding service providers which the cloud service providers might collude together to reconstruct
and access the user stored data.
Let us assume that two cloud service providers are available for customer (C1), who wants to store his
own data securely. In here he will divide his data into two parts (D1 and D2) and distribute these parts on the
two available CSPs (CSP1 and CSP2) respectively. The two cloud service providers might collude with each
other, and exchange the parts of data that the customer has stored on their server and reconstruct the whole data
without being detected by the user.
Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage
www.iosrjournals.org 92 | Page
Assume that we have 9 cloud service providers (SP1, SP2, ..., SP9). Let us assume that a customer (C1) has
divided his own data he wish to store on some SP‟s servers into 9 data pieces. A customer required to retrieve at
least 6 data pieces from different SPs to reconstruct his own data to get the full information, where in our
example, six SPs will participate in the data retrieval (SP1, SP4, SP5, SP6, SP8 and SP9).
This will provide each customer with a better cloud data storage decisions, taking into consideration the user
budget as well
6 as providing him with the best quality of service (Security and availability of data) offered by available cloud
service providers. By dividing and distributing customer‟s data, our model has shown its ability of providing a
customer with a secured storage under his affordable budget.
REPORTS
Admin Module reports
User Module reports
Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage
www.iosrjournals.org 93 | Page
Sample Program Report
Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage
www.iosrjournals.org 94 | Page
References
[1]. C.C. Chang, C.C. Lin, C.S. Tseng, W.L. Tai, Reversible hiding in DCTbased compressed images, Information Sciences 177 (2007).
[2]. C.C. Chang, W.C. Wu, Y.H. Chen, Joint coding and embedding techniques for multimedia images, Information Sciences 178 (2008).
[3]. A. Leier, C. Richter, W. Banzhaf, H. Rauhe, Cryptography with DNA binary strands, BioSystems 57 (2000).
[4]. I. Peterson, Hiding in DNA, Muse (2001).
[5]. Chunye Gong; Jie Liu; Qiang Zhang; Haitao Chen; Zhenghu Gong; , "The Characteristics of Cloud Computing," Parallel Processing
[6]. Workshops (ICPPW), 2010 39th International Conference on , vol., no., pp.275-279, 13-16 Sept. 2010.
[7]. Amazon.com, “Amazon s3 availablity event: July 20, 2008”, Online at http://status.aws.amazon.com/s3-20080720.html, 2008
[8]. .http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009. [16] P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M.
M´edard, “Trusted storage over untrusted networks”, IEEE GLOBECOM 2010, Miami, FL. USA.

Más contenido relacionado

La actualidad más candente

Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyAM Publications
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...CSCJournals
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Eswar Publications
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
 
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...IJCSIS Research Publications
 
Double layered dna based cryptography
Double layered dna based cryptographyDouble layered dna based cryptography
Double layered dna based cryptographyeSAT Journals
 
Mini-batch Variational Inference for Time-Aware Topic Modeling
Mini-batch Variational Inference for Time-Aware Topic ModelingMini-batch Variational Inference for Time-Aware Topic Modeling
Mini-batch Variational Inference for Time-Aware Topic ModelingTomonari Masada
 
Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...Dr.(Mrs).Gethsiyal Augasta
 
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...ijaia
 
Achieving data privacy through secrecy views and null based virtual upadates
Achieving data privacy through secrecy views and null based virtual upadatesAchieving data privacy through secrecy views and null based virtual upadates
Achieving data privacy through secrecy views and null based virtual upadatesMuthu Samy
 

La actualidad más candente (20)

Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
 
Hs3613611366
Hs3613611366Hs3613611366
Hs3613611366
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
Is3314841490
Is3314841490Is3314841490
Is3314841490
 
Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
 
Private datawarehouse queries
Private datawarehouse queriesPrivate datawarehouse queries
Private datawarehouse queries
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
 
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Double layered dna based cryptography
Double layered dna based cryptographyDouble layered dna based cryptography
Double layered dna based cryptography
 
Mini-batch Variational Inference for Time-Aware Topic Modeling
Mini-batch Variational Inference for Time-Aware Topic ModelingMini-batch Variational Inference for Time-Aware Topic Modeling
Mini-batch Variational Inference for Time-Aware Topic Modeling
 
Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...
 
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
 
41 125-1-pb
41 125-1-pb41 125-1-pb
41 125-1-pb
 
Achieving data privacy through secrecy views and null based virtual upadates
Achieving data privacy through secrecy views and null based virtual upadatesAchieving data privacy through secrecy views and null based virtual upadates
Achieving data privacy through secrecy views and null based virtual upadates
 

Destacado

Survey of Machine Learning Techniques in Textual Document Classification
Survey of Machine Learning Techniques in Textual Document ClassificationSurvey of Machine Learning Techniques in Textual Document Classification
Survey of Machine Learning Techniques in Textual Document ClassificationIOSR Journals
 
кайртаева жадыра театр - предприниматели
кайртаева жадыра   театр - предпринимателикайртаева жадыра   театр - предприниматели
кайртаева жадыра театр - предпринимателиIOSR Journals
 
A Novel Approach for Examination of Visually Challenged Candidates by E-Evalu...
A Novel Approach for Examination of Visually Challenged Candidates by E-Evalu...A Novel Approach for Examination of Visually Challenged Candidates by E-Evalu...
A Novel Approach for Examination of Visually Challenged Candidates by E-Evalu...IOSR Journals
 
Sports and Conflict Prevention; the Way Forward For Global Peace
Sports and Conflict Prevention; the Way Forward For Global PeaceSports and Conflict Prevention; the Way Forward For Global Peace
Sports and Conflict Prevention; the Way Forward For Global PeaceIOSR Journals
 
Design of Ball Screw Mechanism for Retro Fit of External Grinding Machine
Design of Ball Screw Mechanism for Retro Fit of External Grinding MachineDesign of Ball Screw Mechanism for Retro Fit of External Grinding Machine
Design of Ball Screw Mechanism for Retro Fit of External Grinding MachineIOSR Journals
 
An Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal AuthenticationAn Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal AuthenticationIOSR Journals
 
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.IOSR Journals
 
Exploring Values and Value Streams by BPM method solved by Lean Management tool
Exploring Values and Value Streams by BPM method solved by Lean Management toolExploring Values and Value Streams by BPM method solved by Lean Management tool
Exploring Values and Value Streams by BPM method solved by Lean Management toolIOSR Journals
 
Computer aided environment for drawing (to set) fill in the blank from given ...
Computer aided environment for drawing (to set) fill in the blank from given ...Computer aided environment for drawing (to set) fill in the blank from given ...
Computer aided environment for drawing (to set) fill in the blank from given ...IOSR Journals
 
Effect of glycine as an impurity on the properties of Epsomite single crystals
Effect of glycine as an impurity on the properties of Epsomite single crystalsEffect of glycine as an impurity on the properties of Epsomite single crystals
Effect of glycine as an impurity on the properties of Epsomite single crystalsIOSR Journals
 
Shear Stress Prediction Using FEA-ANN Hybrid Modeling Of Eicher 11.10 Chassis...
Shear Stress Prediction Using FEA-ANN Hybrid Modeling Of Eicher 11.10 Chassis...Shear Stress Prediction Using FEA-ANN Hybrid Modeling Of Eicher 11.10 Chassis...
Shear Stress Prediction Using FEA-ANN Hybrid Modeling Of Eicher 11.10 Chassis...IOSR Journals
 
Asymptotic Behavior of Solutions of Nonlinear Neutral Delay Forced Impulsive ...
Asymptotic Behavior of Solutions of Nonlinear Neutral Delay Forced Impulsive ...Asymptotic Behavior of Solutions of Nonlinear Neutral Delay Forced Impulsive ...
Asymptotic Behavior of Solutions of Nonlinear Neutral Delay Forced Impulsive ...IOSR Journals
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...IOSR Journals
 
Fluidization Characteristics of Nano Particles with the Assist of Stirrer
Fluidization Characteristics of Nano Particles with the Assist of StirrerFluidization Characteristics of Nano Particles with the Assist of Stirrer
Fluidization Characteristics of Nano Particles with the Assist of StirrerIOSR Journals
 
Has Hiroshima Bombing Continued
Has Hiroshima Bombing ContinuedHas Hiroshima Bombing Continued
Has Hiroshima Bombing ContinuedIOSR Journals
 
A Survey on Fuzzy Association Rule Mining Methodologies
A Survey on Fuzzy Association Rule Mining MethodologiesA Survey on Fuzzy Association Rule Mining Methodologies
A Survey on Fuzzy Association Rule Mining MethodologiesIOSR Journals
 
Speed and Position Control of Train Sytem Using GPS
Speed and Position Control of Train Sytem Using GPS Speed and Position Control of Train Sytem Using GPS
Speed and Position Control of Train Sytem Using GPS IOSR Journals
 
Sustaining Value Creation through Knowledge of Customer Expectations
Sustaining Value Creation through Knowledge of Customer ExpectationsSustaining Value Creation through Knowledge of Customer Expectations
Sustaining Value Creation through Knowledge of Customer ExpectationsIOSR Journals
 

Destacado (20)

Survey of Machine Learning Techniques in Textual Document Classification
Survey of Machine Learning Techniques in Textual Document ClassificationSurvey of Machine Learning Techniques in Textual Document Classification
Survey of Machine Learning Techniques in Textual Document Classification
 
кайртаева жадыра театр - предприниматели
кайртаева жадыра   театр - предпринимателикайртаева жадыра   театр - предприниматели
кайртаева жадыра театр - предприниматели
 
A Novel Approach for Examination of Visually Challenged Candidates by E-Evalu...
A Novel Approach for Examination of Visually Challenged Candidates by E-Evalu...A Novel Approach for Examination of Visually Challenged Candidates by E-Evalu...
A Novel Approach for Examination of Visually Challenged Candidates by E-Evalu...
 
Sports and Conflict Prevention; the Way Forward For Global Peace
Sports and Conflict Prevention; the Way Forward For Global PeaceSports and Conflict Prevention; the Way Forward For Global Peace
Sports and Conflict Prevention; the Way Forward For Global Peace
 
Design of Ball Screw Mechanism for Retro Fit of External Grinding Machine
Design of Ball Screw Mechanism for Retro Fit of External Grinding MachineDesign of Ball Screw Mechanism for Retro Fit of External Grinding Machine
Design of Ball Screw Mechanism for Retro Fit of External Grinding Machine
 
An Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal AuthenticationAn Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal Authentication
 
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
 
A017410108
A017410108A017410108
A017410108
 
Exploring Values and Value Streams by BPM method solved by Lean Management tool
Exploring Values and Value Streams by BPM method solved by Lean Management toolExploring Values and Value Streams by BPM method solved by Lean Management tool
Exploring Values and Value Streams by BPM method solved by Lean Management tool
 
Computer aided environment for drawing (to set) fill in the blank from given ...
Computer aided environment for drawing (to set) fill in the blank from given ...Computer aided environment for drawing (to set) fill in the blank from given ...
Computer aided environment for drawing (to set) fill in the blank from given ...
 
Effect of glycine as an impurity on the properties of Epsomite single crystals
Effect of glycine as an impurity on the properties of Epsomite single crystalsEffect of glycine as an impurity on the properties of Epsomite single crystals
Effect of glycine as an impurity on the properties of Epsomite single crystals
 
Shear Stress Prediction Using FEA-ANN Hybrid Modeling Of Eicher 11.10 Chassis...
Shear Stress Prediction Using FEA-ANN Hybrid Modeling Of Eicher 11.10 Chassis...Shear Stress Prediction Using FEA-ANN Hybrid Modeling Of Eicher 11.10 Chassis...
Shear Stress Prediction Using FEA-ANN Hybrid Modeling Of Eicher 11.10 Chassis...
 
Asymptotic Behavior of Solutions of Nonlinear Neutral Delay Forced Impulsive ...
Asymptotic Behavior of Solutions of Nonlinear Neutral Delay Forced Impulsive ...Asymptotic Behavior of Solutions of Nonlinear Neutral Delay Forced Impulsive ...
Asymptotic Behavior of Solutions of Nonlinear Neutral Delay Forced Impulsive ...
 
K016136062
K016136062K016136062
K016136062
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
Fluidization Characteristics of Nano Particles with the Assist of Stirrer
Fluidization Characteristics of Nano Particles with the Assist of StirrerFluidization Characteristics of Nano Particles with the Assist of Stirrer
Fluidization Characteristics of Nano Particles with the Assist of Stirrer
 
Has Hiroshima Bombing Continued
Has Hiroshima Bombing ContinuedHas Hiroshima Bombing Continued
Has Hiroshima Bombing Continued
 
A Survey on Fuzzy Association Rule Mining Methodologies
A Survey on Fuzzy Association Rule Mining MethodologiesA Survey on Fuzzy Association Rule Mining Methodologies
A Survey on Fuzzy Association Rule Mining Methodologies
 
Speed and Position Control of Train Sytem Using GPS
Speed and Position Control of Train Sytem Using GPS Speed and Position Control of Train Sytem Using GPS
Speed and Position Control of Train Sytem Using GPS
 
Sustaining Value Creation through Knowledge of Customer Expectations
Sustaining Value Creation through Knowledge of Customer ExpectationsSustaining Value Creation through Knowledge of Customer Expectations
Sustaining Value Creation through Knowledge of Customer Expectations
 

Similar a Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage

A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption TechniqueSajedul Karim
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsIRJET Journal
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyBALAKUMARC1
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
 
An Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyAn Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyYasmine Anino
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONDATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONijcisjournal
 
A novel image encryption scheme based on DCT transform and DNA sequence
A novel image encryption scheme based on DCT transform and  DNA sequenceA novel image encryption scheme based on DCT transform and  DNA sequence
A novel image encryption scheme based on DCT transform and DNA sequencenooriasukmaningtyas
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acidIJECEIAES
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERcscpconf
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6sophiabelthome
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences cscpconf
 

Similar a Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage (20)

A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA Cryptography
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
An Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyAn Survey On DNA Based Cryptography
An Survey On DNA Based Cryptography
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
D017433134
D017433134D017433134
D017433134
 
C010521418
C010521418C010521418
C010521418
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONDATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
 
A novel image encryption scheme based on DCT transform and DNA sequence
A novel image encryption scheme based on DCT transform and  DNA sequenceA novel image encryption scheme based on DCT transform and  DNA sequence
A novel image encryption scheme based on DCT transform and DNA sequence
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6
 
P017329498
P017329498P017329498
P017329498
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
 

Más de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Último (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 2 (Nov. - Dec. 2013), PP 86-94 www.iosrjournals.org www.iosrjournals.org 86 | Page Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage D.Sureshraj1, Dr.V.Murali Bhaskaran2 1 PhD Research Scholar, M.S.University, Tirunelveli District, TN 2 Principal, Dhirajlal Gandhi College of Technology, Salem District, TN Abstract: The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in cloud. The algorithm which has been proposed here is based on binary coding and complementary pair rules. Therefore, DNA reference sequence is chosen and a secret data M is hidden into it as well. As result of applying some steps, M´´´ is come out to upload to cloud environments. The process of identifying and extracting the original data M, hidden in DNA reference sequence begins once clients decide to use data. Furthermore, security issues are demonstrated to inspect the complexity of the algorithm. In addition, providing better privacy as well as ensure data availability, can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi- cloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage. Keywords: DNA sequence; DNA base pairing rules; complementary rules; DNA binary coding; cloud service provider. I. Introduction In order to protect data through the unsecure networks like the Internet, using various types of data protection is necessary. One of the famous ways to protect data through the Internet is data hiding. Because of the increasing number of Internet users, utilizing data hiding or Steganographic techniques is inevitable. Therefore, the role of data hiding has become more eminent nowadays. Before employing biological properties of DNA sequences, the common way of embedding a secret data into the host images was the traditional way of data hiding. The most important ones was the detection of the distortions of the image when the host image changed to some degrees. By advent of biological aspects of DNA sequences to the computing areas, new data hiding methods have been proposed by researchers, based on DNA sequences In order to convert binary data into amino acids as a DNA sequence, the base pairing rules must be used. Synthesizing nucleotides in real environment (biology) [1] is done in constant rules:  Purine Adenine (A) always pairs with the pyrimidine Thymine (T)  Pyrimidine Cytosine (C) always pairs with the purine Guanine (G) Always, those rules are done naturally because the opportunities to synthesize hydrogen bonds between A and T (two bonds), and also between C and G. These concepts are named Watson-Crick base pairing rules. Figure 1. Synthesizing nucleotides in real environment In binary computing area, it is possible to change the natural rules by own decision. For example, in biology A is synthesized to T while we can assume A to C or A to G, and so on, as we prefer. Increasing the complexity of the algorithm is the main purpose of the changing the rules. Consider A=00, T=01, C=10, and G=11 to convert
  • 2. Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage www.iosrjournals.org 87 | Page binary data to DNA sequences. A way to increase the complexity is complementary pair rule. Complementary pair rule is a unique equivalent pair which is assigned to every nucleotides base pair. There are four basic alphabets therefore four likelihood of complementary rule for every DNA sequences. So, the final number of possible those rules are 4×3×2×1=24. On the other hand, the possibility to happen a correct guess is 1/24. II. Associated Works The most important part of each DNA base data hiding algorithm is, manipulating four letters which has been called as nucleotides in biology. The letters are A, C, G, and T. Any composition from them will make a sequence. For instance, two DNA sequences have been taken and this DAN sequences from European Bioinformatics Institute (which is known as EBI Database) for the purpose of extracting DNA sequences of Litmus and Balsaminaceae. So, Litmus with 154 nucleotides and Balsaminaceae with 2283 are shown in below, respectively: Litmus: “ATCGAATTCGCGCTGAGTCACAATTCGCGCTG AGTCACAATTCGCGCTGAGTCACAATTGTGACTCA GCCGCGAATTCCTGCAGCCCCGAATTCCGCATTGC AGAGATAATTGTATTTAAGTGCCTGCTCGATACAA TAAACGCCATTTGACC”. Balsaminaceae: “TTTTTATTATTTTTTTTCATTTTTTTCTCAGTTTT TAGCACATATCATTACATTTTATTTTTTCATTACTTC TATCATTCTATCTATAAAATCGATTATTTTTATCAC TTATTTTTCTAATTTCCATATTTCATCTAATGATTAT ATTACATTAAAGAAATCG”. All binary sequences are illustrated in form of s{0|1}e. Primer has key role to decrypt a coded strand. Using a public DNA strand was utilized as a reference sequence in their DNA based encryption technique. In this scheme, the receiver must also be informed about the reference sequence. Namely, the receiver will receive a selected primer and an encrypted strand. The intruder is not able to decrypt the binary data without knowing about both of primer and reference strand, certainly. A primer is a complementary subset from a sort of DNA strand. Normally, the primer is called a short substring. For example, assume S is a DNA strand: S= “ATGCTTAGTTCCATCGGAGACTAATGGCCTA” [2] and “two primers ATCAA and GATTAC”. So “ATCAA and GATTAC are complementary substring of TAGTT and CTAATG”, correspondingly. Definitely, a complementary rule is needed to handle the manipulations, correctly. For this reason, they defined a complementary rule which is AT, T-A, C-G, and finally G-C. So, according to the above, the proper output of the hybridization is: Figure 2. Binary representation Therefore, the final secret message in form of binary is “01010”. III. Concepts In this method, there is a cloud environment and its clients in a same company. The clients (client1 and client 2) want to upload data on cloud in such a manner that confidentiality of data be in highest point [3]. Therefore, the clients need to employ a method to increase the level of confidentiality of data so that no one can see data when someone intentionally or unintentionally accessed to them.
  • 3. Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage www.iosrjournals.org 88 | Page Figure 3. System Architecture First, client1 must apply the method of data hiding on its data which it wants to hide to the cloud computing environments. Data Hiding is divided into two phases.  Embedding data [4].  Extracting the original data [5]. 3.1 Embedding Data - Client 1 Figure 4. Embedding Data Assume original data M=100111000011[6] should be uploaded to the cloud. DNA Reference Sequence: Figure 6. Original data convert to Secret data. Now, embedding phase is finally completed. Then, sender sends 8137 to the cloud. 3.2 Extracting Data - Client 2 Figure 5. Extracting Data Client2 takes the secret data in form of some numbers. For the purpose of extracting the original data from DNA reference sequence, phase two with its sub phases will extract the original data, correctly. Assume secret data M=8137 [6] should be downloaded from the cloud. DNA Reference Sequence:
  • 4. Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage www.iosrjournals.org 89 | Page Figure 6.Secret Data convert to Original data So, the receiver extracted the original data, accurately by using a simple algorithm. IV. Security Measures In terms of security, each intruder must be aware from the following information, correctly. Without this fundamental information, possibility of extracting original data is near to zero, scientifically. 4.1 DNA reference sequence: There are 163 million DNA reference sequence on EBI database. Therefore, the likelihood of making a doing well conjecture by attacker is 1 /24. 4.2 Binary coding rule: Clients are free to select any equivalent binary form for every nucleotide. It means that, A can be „00‟, „01‟, „10‟, or „11‟; C can be „00‟, and so on. In other words, all the binary coding rules are 4×3×2×1=24. So, the likelihood of making correct guess by attacker is 1 /24. 4.3 Complementary pairing rule: Like binary coding rule, there is 4×3×2×1=24 complementary alphabet among basic nucleotides. Therefore, the possibility of making successful attack is 1 / 24. Eventually, the final probability of making a correct and successful guess by attacker is V. Drawbacks in this System 5.1 The DNA Reference Sequence is selected from the EBI database, where 163 million DNA reference are stored. The problem in the above concept is this system use huge size of Data base and we need the algorithm to pick the DNA sequence. It is time consuming process to pick the one DNA sequence out of 163 million sequences. Consider a Reference DNA Sequence [7]. Figure 7. DNA sequence The problem in above sequence is receptiveness CG is mentioned in three places 2, 5 and 6, CA is mentioned in two places 10 and 11. This will create problems in implementation. 1. Consider a Reference DNA Sequence a. Some time system may fetch the sequence similar to the above sequence, The problem in this sequence is CC is missing. That means there is no guarantee that all the 16 combinations are available in the stored sequence. If this is happen system cannot able to fulfill the encryption. 2. Compulsory 16 Combinations AA, AC, AT, AG, CA, CC, CT, CG, TA, TC, TT, TG, GA, GC, GT, GG 3. In this system the extracting data has been uploaded without Encryption in cloud. Moreover, a single cloud service provider offered. 4. Even though in this system messages are spited and stored in different places, since it is not encrypted there is chance for the others to easy the part of the data and they can able to guess the content of the entire file.
  • 5. Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage www.iosrjournals.org 90 | Page VI. Proposed System In the base paper DNA sequence is taken from the database where as in this application our program will create the DNA sequence based on the user id and shift key, which is more secure than the method specified in the paper. In terms of security, each intruder must be aware from the following information, correctly. Without this fundamental information, possibility of extracting original data is near to zero, scientifically. For each user system will assign 4 character DNA key eg: “ACTG” and it will generate the shift key range from 1 to 16 randomly. So 16 combinations can be shifted based on the key give so we cab able to produce 1616 combinations (i.e.) there are more than 163 million DNA unique reference sequence system can generate. Only with small two inputs, Therefore, the likelihood of making a doing well conjecture by attacker is 1 / 24. Binary coding rule: as mentioned, the clients are free to select any equivalent binary form for every nucleotide. It means that, A can be „00‟, „01‟, „10‟, or „11‟; C can be „00‟, and so on. In other words, all the binary coding rules are 4×3×2×1=24. So, the likelihood of making correct guess by attacker is 1 / 24. Complementary pairing rule: like binary coding rule, there is 4×3×2×1=24 complementary alphabet among basic nucleotides. Therefore, the possibility of making successful attack is 1 /24. Eventually, the final probability of making a correct and successful guess by attacker is Also we can overcome the other two disadvantages mention previously without changing the probability of making guess by attackers. Now we have to use the Encrypted data and pushed to Cloud. One of the prominent services offered in cloud computing is the cloud data storage, in which; subscribers do not have to store their own data on their servers, where instead their data will be stored on the cloud service provider‟s servers. In cloud computing, subscribers have to pay the providers for this storage service. This service does not only provides flexibility and scalability data storage, it also provides customers with the benefit of paying only for the amount of data they needs to store for a particular period of time, without any concerns of efficient storage mechanisms and maintainability issues with large amounts of data storage. Customers can easily access their data from any geographical region where the Cloud Service Provider‟s network or Internet can be accessed To providing better privacy as well as ensure data availability, can be achieved by dividing the user‟s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In our model the customer divides his data among several SPs available in the market, based on his available budget. Also we provide a decision for the customer, to which SPs he must chose to access data, with respect to data access quality of service offered by the SPs at the location of data retrieval. This not only rules out the possibility of a SP misusing the customers‟ data, breaching the privacy of data, but can easily ensure the data availability with a better quality of service. From the business point of view, since cloud data storage is a subscription service, the higher the data redundancy, the higher will be the cost to be paid by the user. We provide an optimization scheme to handle the tradeoff between the cost that a cloud computing user is willing to pay to achieve a particular level of security for his data. Privacy preservation and data integrity are two of the most critical security issues related to user data. But in case of cloud computing, the data is stored on an autonomous business party that provides data storage as a subscription service. The users have to trust the cloud service provider (SP) with security of their data. One
  • 6. Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage www.iosrjournals.org 91 | Page bigger concern that arises in such schemes of cloud storage services, is that, there is no full-proof way to be certain that the service provider doe not retains the user data, even after the user opts out of the subscription. With enormous amount of time, such data can be decrypted and meaningful information can be retrieved and user privacy can easily be breached the user might not be availing the storage services from that service provider, To provide users with better and fair chances to avail efficient security services for their cloud storage at affordable costs, our model distributes the data pieces among more than one service providers, in such a way that no one of the SPs can retrieve any meaningful information from the pieces of data stored on its servers, without getting some more pieces of data from other service providers. We will describe our system model and the threat model. Advantage of the proposed system is a secured cost-effective multi cloud storage (SCMCS) in cloud computing, which seeks to provide each customer with a better cloud data storage decisions, taking into consideration the user budget as well as providing client with the best quality of service (Security and availability of data) offered by available cloud service providers. By dividing and distributing customer‟s data, this model has shown its ability of providing a customer with a secured storage under affordable budget. System Overview We consider the storage services for cloud data storage between two entities, cloud users (U) and cloud service providers (SP). The cloud storage service is generally priced on two factors, how much data is to be stored on the cloud servers and for how long the data is to be stored. In our model, we assume that all the data is to be stored for same period of time. We consider p number of cloud service providers (SP), each available cloud service provider is associated with a QoS factor, along with its cost of providing storage service per unit of stored data (C). Every SP has a different level of quality of service (QoS) offered as well as a different cost associated with it. Hence, the cloud user can store his data on more than one SPs according to the required level of security and their affordable budgets. Threat Model Customers‟ stored data at cloud service providers is vulnerable to various threats. Cloud service provider can be a victim to Denial of service attacks or its variants. We consider two types of threat models. 1. Single point of failure This will affect the data availability that could occur if a server at the cloud service provider failed or crashed, which make it hard for the costumer to retrieve his stored data from the server. Availability of data is also an important issue which could be affected, if the cloud service provider (SP) runs out of business. Such worries are no more hypothetical issues; therefore, a cloud service customer can not entirely rely upon a solo cloud service provider to ensure the storage of his vital data. Assume that three customers (C1, C2 and C3) stored their data on three different service providers (CSP1, CSP2 and CSP3) respectively. Each customer can retrieve his own data from the cloud service provider who it has a contract with. If a failure occur at CSP1, due to internal problem with the server or some issues with the cloud service provider, all C1‟s data which was stored on CSP1‟s servers will be lost and cannot be retrieved. One solution for this threat is that, the user will seek to store his data at multiple service providers to ensure better availability of his data. 2. Colluding service providers Colluding service providers which the cloud service providers might collude together to reconstruct and access the user stored data. Let us assume that two cloud service providers are available for customer (C1), who wants to store his own data securely. In here he will divide his data into two parts (D1 and D2) and distribute these parts on the two available CSPs (CSP1 and CSP2) respectively. The two cloud service providers might collude with each other, and exchange the parts of data that the customer has stored on their server and reconstruct the whole data without being detected by the user.
  • 7. Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage www.iosrjournals.org 92 | Page Assume that we have 9 cloud service providers (SP1, SP2, ..., SP9). Let us assume that a customer (C1) has divided his own data he wish to store on some SP‟s servers into 9 data pieces. A customer required to retrieve at least 6 data pieces from different SPs to reconstruct his own data to get the full information, where in our example, six SPs will participate in the data retrieval (SP1, SP4, SP5, SP6, SP8 and SP9). This will provide each customer with a better cloud data storage decisions, taking into consideration the user budget as well 6 as providing him with the best quality of service (Security and availability of data) offered by available cloud service providers. By dividing and distributing customer‟s data, our model has shown its ability of providing a customer with a secured storage under his affordable budget. REPORTS Admin Module reports User Module reports
  • 8. Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage www.iosrjournals.org 93 | Page Sample Program Report
  • 9. Automatic Dna Sequence Generation For Secured Effective Multi -Cloud Storage www.iosrjournals.org 94 | Page References [1]. C.C. Chang, C.C. Lin, C.S. Tseng, W.L. Tai, Reversible hiding in DCTbased compressed images, Information Sciences 177 (2007). [2]. C.C. Chang, W.C. Wu, Y.H. Chen, Joint coding and embedding techniques for multimedia images, Information Sciences 178 (2008). [3]. A. Leier, C. Richter, W. Banzhaf, H. Rauhe, Cryptography with DNA binary strands, BioSystems 57 (2000). [4]. I. Peterson, Hiding in DNA, Muse (2001). [5]. Chunye Gong; Jie Liu; Qiang Zhang; Haitao Chen; Zhenghu Gong; , "The Characteristics of Cloud Computing," Parallel Processing [6]. Workshops (ICPPW), 2010 39th International Conference on , vol., no., pp.275-279, 13-16 Sept. 2010. [7]. Amazon.com, “Amazon s3 availablity event: July 20, 2008”, Online at http://status.aws.amazon.com/s3-20080720.html, 2008 [8]. .http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009. [16] P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. M´edard, “Trusted storage over untrusted networks”, IEEE GLOBECOM 2010, Miami, FL. USA.