A DNA-based Authentication System for Securing Cloud Data Storage and Transactions
Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication methods rely on mathematically complex but computationally insecure protocols. This paper suggests using new developments in deoxyribonucleic ac...
Saved in:
Published in | 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) pp. 1692 - 1698 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
Bharati Vidyapeeth, New Delhi
28.02.2024
|
Subjects | |
Online Access | Get full text |
DOI | 10.23919/INDIACom61295.2024.10499164 |
Cover
Loading…
Summary: | Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication methods rely on mathematically complex but computationally insecure protocols. This paper suggests using new developments in deoxyribonucleic acid (DNA) computing to make the cloud safer by using biological authentication protocols that can be used by a lot of people. A DNA-based cryptographic key system is developed for leveraging synthetic DNA's dense information capacity. This approach interfaces biochemically secure DNA signatures with existing cloud architectures to provide multi-factor authentication (MFA), encrypting access to sensitive user data and transactions. The developed DNA cryptography protocols offer resilience against common attacks like password leaks, while the massive parallelism inherent in biochemical reactions allows efficient processing of authentication requests even under immense cloud workloads. This paper proposes the system's security using established threat frameworks, analyzing attack vectors related to storage, access control, data leakage, etc. This interdisciplinary approach highlights how DNA computing's advantages in encryption, steganography, and blockchain can address real-world cybersecurity needs. |
---|---|
DOI: | 10.23919/INDIACom61295.2024.10499164 |