Skip to main content

Novel Hybrid Technique Enhancing Data Privacy and Security

  • Conference paper
  • First Online:
Computer, Communication, and Signal Processing (ICCCSP 2022)

Abstract

Internet of Things is playing a major role by connecting everything via Internet to the Cloud. Data from things are collected at gateways and processed at the application servers. The processed data is sanitized and masked to preserve it on Cloud. The security and privacy issues such as data misuse, loss or theft make IoT Cloud more untrusted. While providing numerous benefits IoT Cloud help the business organizations grow by limiting the time and economy. Fixing the security and privacy issues would enhance the use of these technologies. This work is aimed at proposing a novel DNA based algorithm to enhance the security and privacy of data on cloud. The detailed study is conducted on the existing security schemes. Finally, clear picture on the pits and holes in existing IoT Cloud based security schemes have been presented. The proposed scheme has been tested by implementing it using opensource tools. Results generated depicts the level of security and privacy provided by the proposed scheme. This would also help researchers to analyse the efficiency of existing hybrid security schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Van Kranenburg, R.: The Internet of Things: A Critique of Ambient Technology and the All-Seeing Network of RFID. Institute of Network Cultures, Amsterdam, The Netherlands (2007)

    Google Scholar 

  2. Tan, L., Wang, N.: Future internet: the internet of things. In: Proceedings of the. 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) , pp. 376–380. Chengdu, China (2010)

    Google Scholar 

  3. Wu, Y., Sheng, Q.Z., Zeadally, S.: RFID: opportunities and challenges. In: Chilamkurti, N. (ed.) Next-Generation Wireless Technologies. CCN, pp. 105–129. Springer, New York (2013). https://doi.org/10.1007/978-1-4471-5164-7_7

  4. Vijayan, V., Elias, E.P.: Hybrid method for securing data in IoT cloud. Int. J. Innov. Technol. Explor. Eng. (2019)

    Google Scholar 

  5. Swamy, S.N., Jadhav, D., Kulkarni, N.: Security threats in the application layer in IOT applications. In: International Conference on I-SMAC (2017)

    Google Scholar 

  6. Joel, J.P.C., et al.: Enabling Technologies for the Internet of Health Things. IEEE (2018) ISSN: 2169-3536

    Google Scholar 

  7. Kanthavar, S.: Design of an Architecture for Cloud Storage to Provide Infrastructure as a Service (IaaS). IEEE (2017)

    Google Scholar 

  8. Hussein, N.A., Shujaa, M.I.: DNA computing-based stream cipher for internet of things using MQTT protocol. Int. J. Electric. Comput. Eng. 10(1), 1035–1042 (2020)

    Google Scholar 

  9. Cherukupalli, N.S., Maruvada, S.S.: Securing data in IoT devices using DNA cryptography. Int. J. Mod. Trends Sci. Technol. 6(8S) (2020)

    Google Scholar 

  10. Agarwal, N., Mahendran, A., Lakshmanan, R.: Trusted third party auditing for cloud security using digital signature and DNA cryptography. IJSTR 8(12) (2019)

    Google Scholar 

  11. Tiwari, H.D., Kim, J.H.: Novel method for DNA-based elliptic curve cryptography for IoT devices. ETRI J. 40(3) (2018). http://wileyonlinelibrary.com/journal/etrij)

  12. Barman, P., Saha, B.: DNA encoded elliptic curve cryptography system for IoT security. Int. J. Comput. Intell. IoT 2 (2019)

    Google Scholar 

  13. Prabhu, D., Adimoolam, M.: Bi-serial DNA Encryption Algorithm. https://pdfs.Semanticscholar.org/1754/f0eb5852500598a70af4002e186cd2f3c6ce.pdf

  14. Ning, K.: A Pseudo DNA Cryptography Method. arXiv:0903.2693, [cs.CR]. Cornell University Library (2009)

  15. Gupta, K., Singh, S.: DNA based cryptographic techniques: a review. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3) (2013)

    Google Scholar 

  16. Harish Kumar, N., Patil, R.M., Deepak, G., Murthy, B.M.: A novel approach for securing data in IoTCloud using DNA cryptography and huffman coding algorithm. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (2017)

    Google Scholar 

  17. Bansal, M., Gupta, S., Mathur, S.: Comparison of ECC and RSA algorithm with DNA encoding for IoT security. In: Proceedings of the Sixth International Conference on Inventive Computation Technologies (ICICT 2021). IEEE Xplore (2021)

    Google Scholar 

  18. Jose, A., Subramaniam, K.: DNA based SHA512-ECC cryptography and CM-CSA based steganography for data security. Materials Today: Proceedings, Elsevier (2020)

    Google Scholar 

  19. El-Latif, E.I.A., Moussa, M.I.: Information hiding using artificial DNA sequences based on Gaussian kernel function. J. Inf. Optimiz. Sci. (2019). ISSN: 0252-266

    Google Scholar 

  20. Ahmed, Z., Adil, S., Al-Alak, S.M.K.: ECC based blind steganography-DNA for hidden information. J. Eng. Appl. Sci. 14 (2019)

    Google Scholar 

  21. Kumar, M.: Implementation of DNA cryptosystem using Hybrid approach. Res. J. Comput. Inf. Technol. Serv. 6(3) (2018)

    Google Scholar 

  22. Rathi, M., Bhaskare, S., Kale, T., Shah, N., Vaswani, N.: Data security using DNA cryptograph. Int. J. Comput. Sci. Mobile Comput. 5, 123–129 (2016)

    Google Scholar 

  23. Abusaimeh, H.: Security attacks in cloud computing and corresponding defending mechanisms. Int. J. Adv. Trends Comput. Sci. Eng. 9(3), 4141–4148 (2020)

    Article  Google Scholar 

  24. Aditya, K., Mohanty, A.K., Ragav, G.A., Thanikaiselvan, V., Amirtharajan, R.: Image encryption using dynamic DNA encoding and pixel scrambling using composite chaotic maps. IOP Conf. Ser. Mater. Sci. Eng. 872(1), 12045 (2020)

    Article  Google Scholar 

  25. Al-Shargabi, B., Al-Husainy, M.A.F.: A new dna based encryption algorithm for Internet of Things. In: International Conference of Reliable Information and Communication Technology, IRICT 2020, pp. 786–795 (2021)

    Google Scholar 

  26. Raj, Y.S., Rabara, S.A., Ramesh, K.S.B.: A security architecture for cloud data using hybrid security scheme. In: Proceedings of the Fourth International Conference on Smart Systems and Inventive Technology (ICSSIT-2022), pp. 1803–1811, IEEE (2022). ISBN: 978-1-6654-0117-3

    Google Scholar 

  27. Raj, Y.S., Rabara, S.A.: An integrated architecture for IoT based data storage in secure smart monitoring environment. Int. J. Sci. Technol. Res. 8(10) (2019). ISSN: 2277-8616

    Google Scholar 

  28. Kolate, V., Joshi, R.B.: An information security using DNA cryptography along with AES algorithm. Turkish J. Comput. Math. Educ. 12(1S), 183–192 (2021)

    Article  Google Scholar 

  29. Alferidah, D.K., Jhanjhi, N.Z.: A review on security and privacy issues and challenges in Internet of Things. IJCSNS Int. J. Comput. Sci. Network Secur. 20(4) (2020)

    Google Scholar 

  30. Yu, Y., Li, Y., Tian, J., Liu, J.: Blockchain-based solutions to security and privacy issues in the Internet of Things. IEEE Wirel. Commun. 25(6), 12–18 (2018)

    Article  Google Scholar 

  31. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017)

    Article  Google Scholar 

  32. Assiri, A., Almagwashi, H.: IoT security and privacy issues. In: 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–5 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Sunil Raj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Raj, Y.S., Rabara, S.A., Gnanaraj, A.A., Kumar, S.B.R. (2022). Novel Hybrid Technique Enhancing Data Privacy and Security. In: Neuhold, E.J., Fernando, X., Lu, J., Piramuthu, S., Chandrabose, A. (eds) Computer, Communication, and Signal Processing. ICCCSP 2022. IFIP Advances in Information and Communication Technology, vol 651. Springer, Cham. https://doi.org/10.1007/978-3-031-11633-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-11633-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-11632-2

  • Online ISBN: 978-3-031-11633-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics