Provide a secured automatic program algorithm for DNA sequence storage arrangement in cloud

  • Authors

    • G Geetha
    • G Surekha
    • P Aditya Sharma
    • E Uma Shankari
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.11733
  • DNA Sequence, DNA Binary Coding, Cloud Service Provider, Multi-Cloud Storage, Complementary Paring Rules.
  • The primary target of this paper is to provide a secured implementing algorithm for hiding DNA sample sequence data confidently by using special software in cloud computing environments. The suggested algorithm here for hiding DNA sequences is based on binary coding and complementary pairing rules. Hence DNA reference sequence is taken as a sample secret data with a notation of M. But after applying some steps the final result obtained in cloud environment is M’’’. The procedure of identifying or extracting the original data M from the hidden DNA Reference sequence is depended on the user if and only if the user wants to use the data for process. Likewise there are security issues for the manipulating from claiming information. In this way that accessible user’s information arrangement may be isolated under SPs in such a way that it has to reach minimum number of specified threshold SPs number from the whole data block. In this paper, we recommend A low cost secured and multi- cloud storage  (SCMCS) model over cloud computing which holds an prudent appropriation about information Around the accessible SPs in the market, with gatherings gives client information accessibility and additionally secure capacity.

     

     

  • References

    1. [1] C.C. Chang, C.C. Lin, C.S. Tseng, W.L. Tai, Reversible hiding in DCTbased compressed images, Information Sciences 177 (2007).

      [2]. C.C. Chang, W.C. Wu, Y.H. Chen, Joint coding and embedding techniques for multimedia images, Infor mation Sciences 178 (2008).

      [3]. A. Leier, C. Richter, W. Banzhaf, H. Rauhe, Cryptography with DNA binary strands, BioSystems 57 (2000).

      [4] I. Peterson, Hiding in DNA, Muse (2001).

      [5] Chunye Gong; Jie Liu; Qiang Zhang; Haitao Chen; Zhenghu Gong; , "The Characteristics of Cloud Computing," Parallel Processing

      [6]. Workshops (ICPPW), 2010 39th International Conference on , vol., no., pp.275-279, 13-16 Sept. 2010.

      [7] P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. M´edard, “Trusted storage over untrusted networksâ€, IEEE GLOBECOM 2010, Miami, FL. USA.

      [8] Prajapati Ashishkumar B, Prajapati Barkha Implementation of dna cryptography in cloud computing and using socket programming 2016 International Conference on Communication System and Network Technologies (IEEE Computer Society).

      [9] PrashantRewagad, YogitaPawar, “Use of Digital Signature with Diffie-Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing†2013 International Conference on Communication System and Network Technologies (IEEE Computer Society).

      [10] Tushar Mandge, Vijay Choudhary. “A DNA encryption technique based on matrix manipulation and secure key generation

  • Downloads

  • How to Cite

    Geetha, G., Surekha, G., Aditya Sharma, P., & Uma Shankari, E. (2018). Provide a secured automatic program algorithm for DNA sequence storage arrangement in cloud. International Journal of Engineering & Technology, 7(2.20), 10-13. https://doi.org/10.14419/ijet.v7i2.20.11733