A DNA-based Authentication System for Securing Cloud Data Storage and Transactions

Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication methods rely on mathematically complex but computationally insecure protocols. This paper suggests using new developments in deoxyribonucleic ac...

Full description

Saved in:
Bibliographic Details
Published in2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) pp. 1692 - 1698
Main Authors Kumar, Tarun, Kumar, Prabhat, Namasudra, Suyel
Format Conference Proceeding
LanguageEnglish
Published Bharati Vidyapeeth, New Delhi 28.02.2024
Subjects
Online AccessGet full text
DOI10.23919/INDIACom61295.2024.10499164

Cover

Loading…
More Information
Summary:Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication methods rely on mathematically complex but computationally insecure protocols. This paper suggests using new developments in deoxyribonucleic acid (DNA) computing to make the cloud safer by using biological authentication protocols that can be used by a lot of people. A DNA-based cryptographic key system is developed for leveraging synthetic DNA's dense information capacity. This approach interfaces biochemically secure DNA signatures with existing cloud architectures to provide multi-factor authentication (MFA), encrypting access to sensitive user data and transactions. The developed DNA cryptography protocols offer resilience against common attacks like password leaks, while the massive parallelism inherent in biochemical reactions allows efficient processing of authentication requests even under immense cloud workloads. This paper proposes the system's security using established threat frameworks, analyzing attack vectors related to storage, access control, data leakage, etc. This interdisciplinary approach highlights how DNA computing's advantages in encryption, steganography, and blockchain can address real-world cybersecurity needs.
DOI:10.23919/INDIACom61295.2024.10499164