Skip to main content
Log in

Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing enables the access of the resources such as network hardware’s, storage, applications and services that are configurable based on the demand in a network especially specific to the operations on the data. The need for data security in the cloud is progressively higher as the abundant sensitive data in the cloud are transferred among various stakeholders for data operations leads to loss of data confidentiality. To maintain data confidentiality in the cloud, the data need to be encrypted with cryptographic algorithms. Existing cryptographic algorithms face the challenges of key management, dynamic encryption, and computational complexity. In this paper, a novel variant of DNA cryptosystem is proposed to secure the original data within the DNA nucleotides providing greater storage space, reduced overhead and dynamic operations. The significance of DNA is incorporated in the proposed Novel DNA cryptosystem, which encrypts the data transferred between the Data Owner and the Data User in the cloud. Enhanced ElGamal cryptosystem is the proposed asymmetric cryptosystem used to address key management issues in the cloud, by securely transferring the key file between the Data Owner and the Data User. Enhanced ElGamal cryptosystem provides better user authentication and performance with respect to the security accomplishment against attacks. At the same time, Novel DNA cryptosystem achieves better performance, reduced the complexity of implementing the properties of DNA and embarks upon a standardized algorithmic approach among the existing DNA cryptographic methodologies. The performance analysis, mathematical proof as well as security analysis forms the security metrics and it meets out the proposed objectives. Thus, on utilizing the proposed Novel DNA and Enhanced ElGamal cryptosystems (i.e) both symmetric and asymmetric cryptosystems, enhances the security and performance of data storage and retrieval in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31

Similar content being viewed by others

References

  1. Pant, V., Kumar, A.: DNA cryptography an new approach to secure cloud data. Int. J. Sci. Eng. Res. 7(6) (2016)

  2. Arockiam, L., Monikandan, S.: Efficient cloud storage confidentiality to ensure data security. In: IEEE International Conference on Computer Communication and Informatics (ICCCI) (2014)

  3. Chandramouli, R., Iorga, M., Chokhani, S.: Cryptographic Key Management Issues & Challenges in Cloud Services. National Institute of Standards and Technology. U.S, Department of Commerce (2013)

  4. European Payment Council: Guidelines on Cryptographic Algorithms Usage and Key Management. https://www.europeanpaymentscouncil.eu/document-library/guidance-documents/guidelines-cryptographic-algorithms-usage-and-key-management

  5. Adleman, L.: Molecular computation of solutions to combinatorial problems. Science 266, 1021–1024 (1994)

    Article  Google Scholar 

  6. Jain, S., Bhatnagar, V.: A novel DNA sequence dictionary method for securing data in DNA using spiral approach and framework of DNA cryptography. In: IEEE, ICAETR, pp. 1–5 (2014)

  7. Ubaidur Rahman, N.H., Balamurugan, C., Mariappan, R.: A novel DNA computing based encryption and decryption algorithm. In: Proceedia Computer Science, International Conference on Information and Communication Technologies, pp. 463 – 475 (2015)

  8. Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Pearson Education (2013)

  9. Agarwala, A., Saravanan, R.: A public key cryptosystem based on number theory. 978-1-4673-0255-5/12, IEEE (2012)

  10. ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  11. Boneh, D., Joux, A., Nguyen, P.: Breaking plain ElGamal and plain RSA encryption. https://www-almasty.lip6.fr/~joux/pages/papers/PlainRSA.pdf

  12. Bryce, D.A.: Implementing several attacks on plain ElGamal encryption. http://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=2577&context=etd

  13. Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapter 9), 2nd edn. CRC Press, Boca Raton (2016)

    MATH  Google Scholar 

  14. McCurley, K.: The discrete logarithm problem. In: Proceedings of Symposia in Applied Mathematics, vol. 42 (1990)

  15. Hwang, M.-S., Chang, C.-C., Hwang, K.-F.: An ElGamal-like cryptosystem for enciphering large messages. IEEE Trans. Knowl. Data Eng. 14(2), 445–446 (2002)

    Article  MATH  Google Scholar 

  16. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  17. Mohit, P., Biswas, G.P.: Design of ElGamal PKC for encryption of large messages. In: INDIACom, International Conference. IEEE (2015)

  18. Sharma, P., Sharma, S, Dhakar, R.S.: Modified elgamal cryptosystem algorithm (MECA). In: International Conference on Computer & Communication Technology, pp. 439–443 (2011)

  19. Asbullah, M.A., Ariffin, M.R.K.: A proposed CCA-secure encryption on an ElGamal variant. In: 7th International Conference on Computing and Convergence Technology (ICCCT), pp. 499–503 (2012)

  20. Nguyen, M.T., Nguyen, B.: Some hybrid crypto systems constructed on discrete logarithm problem. In: ATC, International Conference. IEEE (2015)

  21. Hashim, H.R., Neamaa, I.A.: Image encryption and decryption in a modification of ElGamal cryptosystem in MATLAB. Int. J. Sci. 14(2), 141–147 (2014)

    Google Scholar 

  22. Alam, K., Alam, K.R., Faruq, O., Morimoto, Y.: A comparison between RSA and Elgamal based untraceable blind signature schemes. In: NSysS, International Conference. IEEE (2016)

  23. Prajapati, A., Barkha, P.: Implementation of DNA cryptography in cloud computing and using socket programming. In: ICCCI. IEEE (2016)

  24. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  25. Malhotra, M.: A new encryption scheme based on enhanced RSA and ElGamal. Int. J. Emerg. Technol. Comput. Appl. Sci. (IJETCAS) 8(2), 138–142 (2014)

    Google Scholar 

  26. Madhur, K., Yadav, J.S., Vijay, A.: Modified ElGamal over RSA digital signature algorithm (MERDSA). Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(8), 289–293 (2012)

    Google Scholar 

  27. Wang, H., Sun, Z.: Study on the improvement of ELGamal cryptosystem based on elliptic curve. J. Netw. 9(11), 3025–3029 (2014)

    Google Scholar 

  28. Dawahdeh, Z.E., Yaakob, S.N., Sagheer, A.M.: Modified ElGamal elliptic curve cryptosystem using hexadecimal representation. Indian J. Sci. Technol. 8(15) (2015)

  29. Gennaro, R.: Randomness in cryptography. IEEE Secur. Priv. 4(2), 64–67 (2006)

    Article  Google Scholar 

  30. Yunpeng, Z., Yu, Z., Zhong, W., Sinnott, R.O.: Index-based symmetric DNA encryption algorithm. In: Image and Signal Processing (CISP), pp. 2290–2294 (2011)

  31. Abbasy, M.R., Nikfard, P., Ordi, A., Torkaman, M.R.N.: DNA base data hiding algorithm. In: IJNCAA, pp. 183–192 (2012)

  32. Gao, Q.: A few DNA based security techniques. In: Systems, Applications and Technology Conference, pp. 1–5. IEEE, Long Island (2011)

  33. Dhawan, S., Saini, A.: A new DNA encryption technique for secure data transmission. In: IJETCAS, pp. 36–42 (2012)

  34. Mandge, T., Choudhary, V.: A DNA encryption technique based on matrix manipulation and secure key generation. In: ICICES, pp. 47–52. IEEE (2013)

  35. Majumder, A., Majumdar, A., Podder, T., Kar, N., Sharma, M.: DNA-based cryptographic approach toward information security. In: Advances in Intelligent Systems and Computing, vol. 308, pp. 209–219. Springer (2015)

  36. Aich, A., Sen, A., Dash, S.R., Dehuri, S.: A symmetric key cryptosystem using DNA sequence with OTP key. In: Advances in Intelligent Systems and Computing, pp. 207–215 (2015)

  37. Majumder, A., Majumdar, A., Podder, T., Kar, N., Sharma, M.: Secure data communication and cryptography based on DNA based message encoding. In: ICACCCT. IEEE (2014)

  38. Cui, G., Han, D., Wang, Y.: An improved method of DNA information encryption. In: BIC-TA, CCIS, pp. 73–77. Springer (2014)

  39. Sundaram, G.S., Pavithra, S., Arthi, A., Bala, B.M., Mahalakshmi, S.: Cellular automata based DNA cryptography algorithm. In: ISCO. IEEE (2015)

  40. Aich, A., Sen, A., Dash, S.R., Dehuri, S.: Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie hellman key sharing technique. In: CCCIT, pp. 1–6 (2015)

  41. Gugnani, G., Ghrera, S.P., Gupta, P.K., Malekian, R., Maharaj, B.T.J.: Implementing DNA . In: Advances in Intelligent Systems and Computing, vol. 381. Springer (2016)

  42. Thangavel, M., Varalakshmi, P., Sindhuja, R.: A Comparative study on DNA cryptosystem. In: IEEE International Conference on Recent Trends in Information Technology (ICRTIT) (2016)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Thangavel.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thangavel, M., Varalakshmi, P. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Comput 21, 1411–1437 (2018). https://doi.org/10.1007/s10586-017-1368-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1368-4

Keywords

Navigation