A DNA-based Authentication System for Securing Cloud Data Storage and Transactions
Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication methods rely on mathematically complex but computationally insecure protocols. This paper suggests using new developments in deoxyribonucleic ac...
Saved in:
Published in | 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) pp. 1692 - 1698 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
Bharati Vidyapeeth, New Delhi
28.02.2024
|
Subjects | |
Online Access | Get full text |
DOI | 10.23919/INDIACom61295.2024.10499164 |
Cover
Abstract | Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication methods rely on mathematically complex but computationally insecure protocols. This paper suggests using new developments in deoxyribonucleic acid (DNA) computing to make the cloud safer by using biological authentication protocols that can be used by a lot of people. A DNA-based cryptographic key system is developed for leveraging synthetic DNA's dense information capacity. This approach interfaces biochemically secure DNA signatures with existing cloud architectures to provide multi-factor authentication (MFA), encrypting access to sensitive user data and transactions. The developed DNA cryptography protocols offer resilience against common attacks like password leaks, while the massive parallelism inherent in biochemical reactions allows efficient processing of authentication requests even under immense cloud workloads. This paper proposes the system's security using established threat frameworks, analyzing attack vectors related to storage, access control, data leakage, etc. This interdisciplinary approach highlights how DNA computing's advantages in encryption, steganography, and blockchain can address real-world cybersecurity needs. |
---|---|
AbstractList | Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication methods rely on mathematically complex but computationally insecure protocols. This paper suggests using new developments in deoxyribonucleic acid (DNA) computing to make the cloud safer by using biological authentication protocols that can be used by a lot of people. A DNA-based cryptographic key system is developed for leveraging synthetic DNA's dense information capacity. This approach interfaces biochemically secure DNA signatures with existing cloud architectures to provide multi-factor authentication (MFA), encrypting access to sensitive user data and transactions. The developed DNA cryptography protocols offer resilience against common attacks like password leaks, while the massive parallelism inherent in biochemical reactions allows efficient processing of authentication requests even under immense cloud workloads. This paper proposes the system's security using established threat frameworks, analyzing attack vectors related to storage, access control, data leakage, etc. This interdisciplinary approach highlights how DNA computing's advantages in encryption, steganography, and blockchain can address real-world cybersecurity needs. |
Author | Kumar, Prabhat Namasudra, Suyel Kumar, Tarun |
Author_xml | – sequence: 1 givenname: Tarun surname: Kumar fullname: Kumar, Tarun email: tarunsharma2910@gmail.com organization: National Institute of Technology,Dept. of Computer Sc. & Engineering,Patna,India – sequence: 2 givenname: Prabhat surname: Kumar fullname: Kumar, Prabhat email: prabhat@nitp.ac.in organization: National Institute of Technology,Dept. of Computer Sc. & Engineering,Patna,India – sequence: 3 givenname: Suyel surname: Namasudra fullname: Namasudra, Suyel email: suyelnamasudra@gmail.com organization: National Institute of Technology,Dept. of Computer Sc. & Engineering,Agartala,India |
BookMark | eNo1j7tOwzAUQI0EA5T-AYMH1hRfPxJ7jBIekaoikTJXN8lNidTYKHGG_j0gYDrTOdK5YZc-eGLsHsRGKgfuodqVVV6EMQXpzEYKqTcgtHOQ6gu2dpl1ygqjtQF3zd5yXu7ypMGZOp4v8YN8HFqMQ_C8Ps-RRt6HidfULtPgj7w4haXjJUbkdQwTHomj7_h-Qj9j-6PNt-yqx9NM6z-u2PvT4754Sbavz1WRb5MBwMWkA2eBUFjj0EkhkEBpBS1KQQ1ktknRZEZjm0qb6azvRYfqW7F9J1ppUa3Y3W93IKLD5zSMOJ0P_6vqC5afTw4 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.23919/INDIACom61295.2024.10499164 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9789380544519 9380544510 |
EndPage | 1698 |
ExternalDocumentID | 10499164 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i119t-d1981ea0859a9200ae13431ca20eb178b6a5754ac628747ff0da39818fd0c28a3 |
IEDL.DBID | RIE |
IngestDate | Wed May 01 11:49:09 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-d1981ea0859a9200ae13431ca20eb178b6a5754ac628747ff0da39818fd0c28a3 |
PageCount | 7 |
ParticipantIDs | ieee_primary_10499164 |
PublicationCentury | 2000 |
PublicationDate | 2024-Feb.-28 |
PublicationDateYYYYMMDD | 2024-02-28 |
PublicationDate_xml | – month: 02 year: 2024 text: 2024-Feb.-28 day: 28 |
PublicationDecade | 2020 |
PublicationTitle | 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) |
PublicationTitleAbbrev | INDIACom |
PublicationYear | 2024 |
Publisher | Bharati Vidyapeeth, New Delhi |
Publisher_xml | – name: Bharati Vidyapeeth, New Delhi |
Score | 1.9284155 |
Snippet | Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1692 |
SubjectTerms | Authentication Biometrics Cloud computing security Cloud Data Security Computer architecture DNA DNA Cryptography Multi-factor Authentication Protocols Synthetic Biology Technological innovation Vectors |
Title | A DNA-based Authentication System for Securing Cloud Data Storage and Transactions |
URI | https://ieeexplore.ieee.org/document/10499164 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5uB_Gk4sTf5LBratNmaXIcq2MTLKIb7DbyqyJKJ9pe_Ot9STeHguCttKQteX35vry-7z2E-oBxVqbaEplSThh1kggbZyRhpYRL2srQY-mu4JM5u10MFmuxetDCOOdC8pmL_GH4l29XpvGhMvBw5ukM66AOfGetWGsX9UM6M9zzelrk0yH4EaC2HMDeL2HRZsiP5ikBO8b7qNg8tU0ZeYmaWkfm81dBxn-_1gHqbWV6-P4bgA7RjquO0MMQ58WQeHSy2AfAfDpQG5fDbXlyDDwVr-PsT3j0umoszlWt8CPsv2F5waqyeLbtI_7RQ_PxzWw0IevGCeSZUlkTS6WgTvnaZUqCGyhHUyAKRiUxLM2Z0FwBS2PKcF_tPivL2KoUhojSxiYRKj1G3WpVuROEtUhTM8i04dybD-iKFs6xLOHWainMKer5CVm-tbUxlpu5OPvj_Dna83ZpReEXqFu_N-4SYL3WV8GcX2rVokM |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB60gnpSseLbPfS6MY9NsnssraXVNoi20FvZV0WUVDS5-OudTVqLguAtJGwSdpj9vp2dbwaghRhnRKQMFVGQUBZYQbnxUxqyucBHyoiqx9IoS_oTdjuNp0uxeqWFsdZWyWfWc5fVWb5Z6NKFytDDmaMzbBO2EPhZXMu1tqFVJTTjW68HWXfQRk9C3BYx7v5C5q0G_WifUqFHbw-y1XfrpJEXryyUpz9_lWT894_tQ3Mt1CP33xB0ABs2P4SHNulmberwyRAXAnMJQXVkjtQFygkyVbKMtD-RzuuiNKQrC0kecQeOCwyRuSHjdSfxjyZMejfjTp8uWyfQ5yAQBTWB4IGVrnqZFOgI0gYRUgUtQx8X55SrRCJPY1Inrt59Op_7RkY4hM-Nr0MuoyNo5IvcHgNRPIp0nCqdJM6ASFgUt5alYWKMElyfQNNNyOytro4xW83F6R_3r2CnPx4NZ8NBdncGu85GtUT8HBrFe2kvEOQLdVmZ9gsaaKWQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+11th+International+Conference+on+Computing+for+Sustainable+Global+Development+%28INDIACom%29&rft.atitle=A+DNA-based+Authentication+System+for+Securing+Cloud+Data+Storage+and+Transactions&rft.au=Kumar%2C+Tarun&rft.au=Kumar%2C+Prabhat&rft.au=Namasudra%2C+Suyel&rft.date=2024-02-28&rft.pub=Bharati+Vidyapeeth%2C+New+Delhi&rft.spage=1692&rft.epage=1698&rft_id=info:doi/10.23919%2FINDIACom61295.2024.10499164&rft.externalDocID=10499164 |