DNA Cryptography Based User Level Security for Cloud Computing and Applications
Prasanna Balaji Narasingapuram1, M. Ponnavaikko2
1Prasanna Balaji Narasingapuram, Research Scholar, Computer Science Engineering, Information Technology, Bharath Institute of Higher Education and Research (BIHER), Chennai, India.
2Dr. M. Ponnavaikko, Provost, Bharath University, Chennai, India.
Manuscript received on January 05, 2020. | Revised Manuscript received on January 25, 2020. | Manuscript published on January 30, 2020. | PP: 3738-3745 | Volume-8 Issue-5, January 2020. | Retrieval Number: B2845078219/2020©BEIESP | DOI: 10.35940/ijrte.B2845.018520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: This paper proposed a novel cryptography method for enhancing the user level security to avoid malicious user entering into cloud applications. Existing research works have been proposed various cryptographic methods, algorithms and techniques for validating the user for accessing data or operating cloud applications. But still the malicious user activity like sybil, sinkhole, Denial of Service, Distributed Denial of Service, Economic Denial of Sustainability, selective forwarding and so on, is increasing day by day in cloud. This paper taken this problem as a major problem and motivated to provide a better solution which can eliminate the malicious user activity in cloud. To do this, this paper used DNA cryptography method for generating a strong key for user and data encryption – decryption process. User information is converted into human deoxyribonucleic acid form for generating strong key and data encryption. The implementation of the proposed approach is carried out in DOTNET framework and the experimental results are verified. Based on the results the performance is evaluated by comparing with the existing results.
Keywords: Cryptography, DNA Cryptography, Cloud Security, User level security, Strong Key Generation, Data Encryption, Data Decryption.
Scope of the Article: Cloud, Sensor Cloud and Mobile Cloud Security.