SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 578
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING
AND USING SOCKET PROGRAMMING
Y SOWJANYA1, Dr P VENKATESWARA RAO2
1Student, Dept. of Computer Engineering, Adikavi Nannaya University, Rajamahendravaram.
2Associate Professor, Dept. of Computer Engineering, Adikavi Nannaya University, Rajamahendravaram
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Cloud computing is the latest technology in the
field of distributed computing. It provides various online and
on-demand services for data storage, network services,
platform services and etc. Many organizations are
unenthusiastic to use cloud services due to datasecurityissues
as the data resides on the cloud services provider’s servers. To
address this issue, there have been several approachesapplied
by various researchers worldwide tostrengthensecurityof the
stored data on cloud computing. The Bi-directional DNA
Encryption Algorithm (BDEA) is one such data security
techniques. However, the existing technique focuses only on
the ASCII character set, ignoring the non-English user of the
cloud computing. Thus, this proposed work focuses on
enhancing the BDEA to use with the Unicode characters
Key Words: Cloud computing, Data security issues, Bi-
Directional DNAEncryptionAlgorithm, DNAdigitalcode,
Socket Programming.
1. INTRODUCTION
Cloud computing has recently reached popularity and
developed into a major trend in IT. We perform such a
systematic review of cloud computing and explain the
technical challenges facing in this paper. In Public cloud the
“Pay per use” model is used. In private cloud, the computing
service is distributed for a single society.InHybridcloud, the
computing services is consumed both the private cloud
service and public cloud service. Cloud computing has three
types of services. Software as a Service (SaaS), in which
customer prepared one service and run on a single cloud,
then multiple consumer can access this service as per on
demand. Platform as a Service (PaaS), in which, it provides
the platform to create application and maintains the
application. Infrastructure as a Service (IaaS), as per term
suggest to provides the data storage, Network capacity, rent
storage, Data centers etc. It is also known as Hardware as a
Service (HaaS).
2. Literature Survey
In cloud computing the major issue is to provide the security
of data. In Cloud computing data security is prepared by the
Authentication, Encryption & Decryption, Message
authentication code, Hash function,andDigitalsignatureand
so on. So here we discuss about some security problems and
their solutions.
Use of Digital Signature with Diffie Hellman Key
Exchange and AESEncryptionAlgorithmtoEnhanceData
Security in Cloud Computing [1].
Mr.PrashantRewagad and Ms.YogitaPawar [1]. Here in this
paper, theresearcherusingthreewayarchitectureprotection
schemes. Firstly Diffie-Hellman algorithm isusedtogenerate
keys for key exchange step. Then digital signature is used for
authentication, thereafter AES encryption algorithm is used
to encrypt or decrypt user’s data file. Diffie- Hellman key
exchange algorithm is vulnerable to main in the middle
attack. The most serious limitation is the lack of the
authentication.
Union of RSA algorithm, Digital Signature and Kerberos
in Cloud Security [2].
Mehdi Hojabri and Mona Heidari [2]. Here in this paper, the
researcher first performs the concept of Kerberos
authentication services. At the next step the Authenticate
Server (AS) of Kerberos do verifies users and created the
ticket granting ticket and session keyanditsenttotheusers.
The next step users send the ticket granting ticket and
session key to Ticket Granting Server (TGS) for getting the
service. Then TGS send ticket and session key for user. In
final step the users send the request service to cloud service
provider for using the cloud service and also cloud service,
provide service to users. After doing this step user can used
the cloud service provider. But for more security they
performed RSA algorithm for encryption & decryption and
then they use Digital Signature for Authentication.
Implementation Digital signature with RSA Encryption
algorithm to enhancethe DatasecurityofcloudinCloud
Computing [3].
Uma Somani, Kanika Lakhani, and Manish Mundra [3]. In
this paper, there are two enterprises A and B. An enterprise
A has some data that are public data and enterprise has
public cloud. Now B wants some secure data fromA’scloud.
So RSA algorithm and Digital signature are used for secure
communication. In this method, enterprise A takes data
from cloud, which B wants. Now the data or document is
crushed into little line using Hash code function that is
called Message digest. Then A encrypts the message digest
within private key the result is in the Digital signatureform.
Using RSA algorithm, A will encrypt the digital signed
signature with B’s public key and B will decrypt the cipher
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 579
text to plain text with his private key and A’s public key for
verification of signature.
3. PROPOSED SYSTEM
Previous section describes the study about the cloud
computing, basics of cloud computingandsecurityproblems
occurs in cloud. Then study some papers to solve these
security problems. Here in this paper, the Bi-serial DNA
encryption algorithm is performing, that providing the two
level of security.
DNA DIGITAL CODING
In information science, the binary digital coding encoded by
two state 0 or 1 and a combination of 0 and 1. But DNA
digital coding can be encoded by four kind of base as shown
in table 1. That is ADENINE (A) and THYMINE (T) or
CYTOSINE (C) and GUANINE (G). There are possibly 4! =24
pattern by encoding format like (0123/ATGC) [4].
Table 1. DNA Digital Coding
Binary value DNA digital coding
00 A
01 T
10 G
11 C
KEY COMBINATION
Here in this work, we are using ATGC as a key. Everybithave
2 bits like A=00, T=01, G=10, and C=11 and by using ATGC,
key combinations is generated and give numbering
respectively that is given into table. From the table 2, wecan
generate 64 bit key values and adding ATGC, we can
generate 72-bit key (64 bits of key combination and 8 bits of
ATGC). ATGC key is sending to the receiver side by using
Diffie Hellman key sharing algorithm. In this work, every
time the key value will be randomly changed.
Table 2: Key combination
KEY
COMBINATION
PATTERNS VALUES
AA 0101 5
AT 0011 3
AG 0001 1
AC 0010 2
TA 0110 6
TT 1111 15
TG 0111 7
TC 1001 9
GA 1010 10
GT 0100 4
GG 1000 8
GC 1100 12
CA 1110 14
CT 1011 11
CG 0000 0
CC 1101 13
A. ENCRYPTION PROCESS
Fig 1: Encryption process
To understand the scenario of proposed work flow chart we
consider one example. In this the example plaintext is
“Hello Technocrete” and performing encryption operation.
Plaintext:
Hello Technocrete
Unicode:
આશિષ
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 580
ASCII:
u0e0u0aau02020u0e0u0aau0b6u0e0u0aau0bf
u0e0u0a au0b7
Hexadecimal value:
5c753065305c753061615c7530323032305c753065305c
753061615c753062365c753065305c753061615c753062
665c753065305c753061615c7530623
Binary value:
01011100011101010011000001100101001100000101110
00111010100110000011000010110000101011100011101
01001100000011001000110000001100100011000001011
10001110101001100000110010100110000010111000111
01010011000001100001011000010101110001110101001
10000011000100011011001011100011101010011000001
10010100110000010111000111010100110000011000010
11000010101110001110101001100000110001001100110
01011100011101010011000001100101001100000101110
00111010100110000011000010110000101011100011101
01001100000110001000110111
DNA Digital coding:
From Table 1 we can write
TTCATCTTACAATGTTACAATTCATCTTACAATGATT
GATTTCATCTTACAAACAGACAAACAGACAATTCATCTTACAA
TGTTACAATTCATCTTACAATGATTGATTTCATCTTACAATGA
GACTGTTCATCTTACAATGTTACAATTCATCTTACAATGATTG
ATTTCATCTTACAATGAGTGTGTTCATCTTACAATGTTACAAT
TCATCTTACAATGATTGATTTCATCTTACAATGAGACTC
Now from table 2, the amplified message is generated,
Amplified Message
11111110100111110010010101111111001001011111111
01001111100100101011100110111001111111010011111
00100101001100010010010100100001001001011111111
10100111110010010101111111001001011111111010011
11100100101011100110111001111111110100111110010
01010111000100100111111111101001111100100101011
11111001001011111110100111110010010101110011011
10011111111010011111001001010111000101110111111
11110100111110010010101111111001001011111111010
01111100100101011100110111001111111110100111110
0100101011100010010100
B. DECRYPTION PROCESS
Now at receiver side, the receiver receives the amplified
message and ATGC key for decryption.
Fig: 2: Decryption process
Amplified Message
11111110100111110010010101111111001001011111111
01001111100100101011100110111001111111101001111
10010010100110001001001010010000100100101111111
11010011111001001010111111100100101111111101001
11110010010101110011011100111111111010011111001
00100111000100100111111111101001111100100101011
11111001001011111111010011111001001011110011011
10011111111101001111100100101011100010111011111
11111010011111001001010111111100100101111111101
00111110010010101100110111001111111110100111110
01001010111000100101001
Now using ATGC key and key combination, retrieve
original DNA Digital code.
TTCATCTTACAATGTTACAATTCATCTTACAATGATT
GATTTCATCTTACAAACAGACAAACAGACAATTCAT
CTTACAATGTTACAATTCATCTTACAATGATTGATTT
CATCTTACAATGAGACTGTTCATCTTACAATGTTACA
ATTCATCTTACAATGATTGATTTCATCTTACAATGAG
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 581
TGTGTTCATCTTACAATGTTACAATTCATCTTACAAT
GATTGATTTCATCTTACAATGAGACTC
From the table of DNA digital coding we can generate.
01011100011101010011000001100101001100000101100
01110101001100000110000101100001010111000111010
10011000000110010001100000011001000110000010111
00011101010011000001100101001100000101110001110
10100110000011000010110000101011100011101010011
00000110001000110110010111000111010100110000011
00101001100000101110001110101001100000110000101
10000101011100011101010011000001100010011001100
10111000111010100110000011001010011000001011100
01110101001100000110000101100001010111000111010
1001100000110001000110111
Hexadecimal value:
5c753065305c753061615c7530323032305c753065305c75
3061615c753062365c753065305c753061615c753062665c
753065305c753061615c75306237
ASCII:
u0e0u0aau02020u0e0u0aau0b6u0e0u0aau0bfu
0e0u0a au0b7
Unicode:
આશિષ
Plaintext:
Hello Technocrat
4. SNAPS OF PROPOSED WORK (ENCRYPTION).
Fig. 3: Encryption operation
Fig.4: Encryption flow
5. SNAPS OF PROPOSED WORK (DECRYPTION).
Fig.5: Decryption Process
Fig.6: Decryption flow
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 582
WORKING ON AMAZON WEB SERVICE.
.
Fig.8: Encryption in AWS
Fig.8: Encryption in AWS
Fig.9: Decryption in AWS
3. CONCLUSION
Data security is the main challenge for cloud usability.
Various algorithms like RSA, Diffie-Hellman,DNAencryption
etc. are available to provide data security for the data stored
on cloud. Digital signatures, Extensible Authentication
Protocols are used for authentications. Using BDEA
algorithm, we achieve 2-layer security for ASCII character
sets. The proposed system focuses on extending the BDEA
algorithm to be used with Unicode character set. This can
help reach to the wider community of the cloud users. The
future work will focus on the possible attacks and
cryptanalysis of the cipher text and measure its strength.
REFERENCES
[1] PrashantRewagad, YogitaPawar, “Use of Digital
Signature with Diffie-Hellman Key Exchange and
AES Encryption Algorithm to EnhanceData Security
in Cloud Computing”2013International Conference
on Communication System and Network
Technologies (IEEE Computer Society).
[2] Uma Somani, Kanika Lakhani, ManishaMundra,
”Implementing Digital Signature with RSA
Encryption Algorithm to Enhance the Data Security
of Cloud in Cloud Computing”-2010 IEEE 1st
International Conference on Parallel, Distributed
and Grid Computing (PDGC-2010).
[3] Mehdi Hojabri & Mona Heidari “Union of RSA
algorithm, Digital Signature and KERBEROS in
Cloud Computing” International Conference on
Software Technology and Computer Engineering
(STACE-2012).
[4] Ashish Prajapati, Amit Rathod “Enhancing security
in cloud computing using Bi-Directional DNA
Encryption Algorithm”,International Conferenceon
Intelligent Computing, Communication & Devices.
(ICCD-2014), Springer.

More Related Content

What's hot

Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudeSAT Journals
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline QueriesEfficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queriesijtsrd
 
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET- Enhancing Network Security by Modified Secure Dynamic Path IdentifiersIRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET- Enhancing Network Security by Modified Secure Dynamic Path IdentifiersIRJET Journal
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalIAEME Publication
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitBuilding IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitAngelo Corsaro
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 

What's hot (19)

Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline QueriesEfficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
 
82 86
82 8682 86
82 86
 
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET- Enhancing Network Security by Modified Secure Dynamic Path IdentifiersIRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamal
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitBuilding IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter Kit
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 

Similar to IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket Programming

Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...IJECEIAES
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 

Similar to IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket Programming (20)

Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket Programming

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 578 IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND USING SOCKET PROGRAMMING Y SOWJANYA1, Dr P VENKATESWARA RAO2 1Student, Dept. of Computer Engineering, Adikavi Nannaya University, Rajamahendravaram. 2Associate Professor, Dept. of Computer Engineering, Adikavi Nannaya University, Rajamahendravaram ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cloud computing is the latest technology in the field of distributed computing. It provides various online and on-demand services for data storage, network services, platform services and etc. Many organizations are unenthusiastic to use cloud services due to datasecurityissues as the data resides on the cloud services provider’s servers. To address this issue, there have been several approachesapplied by various researchers worldwide tostrengthensecurityof the stored data on cloud computing. The Bi-directional DNA Encryption Algorithm (BDEA) is one such data security techniques. However, the existing technique focuses only on the ASCII character set, ignoring the non-English user of the cloud computing. Thus, this proposed work focuses on enhancing the BDEA to use with the Unicode characters Key Words: Cloud computing, Data security issues, Bi- Directional DNAEncryptionAlgorithm, DNAdigitalcode, Socket Programming. 1. INTRODUCTION Cloud computing has recently reached popularity and developed into a major trend in IT. We perform such a systematic review of cloud computing and explain the technical challenges facing in this paper. In Public cloud the “Pay per use” model is used. In private cloud, the computing service is distributed for a single society.InHybridcloud, the computing services is consumed both the private cloud service and public cloud service. Cloud computing has three types of services. Software as a Service (SaaS), in which customer prepared one service and run on a single cloud, then multiple consumer can access this service as per on demand. Platform as a Service (PaaS), in which, it provides the platform to create application and maintains the application. Infrastructure as a Service (IaaS), as per term suggest to provides the data storage, Network capacity, rent storage, Data centers etc. It is also known as Hardware as a Service (HaaS). 2. Literature Survey In cloud computing the major issue is to provide the security of data. In Cloud computing data security is prepared by the Authentication, Encryption & Decryption, Message authentication code, Hash function,andDigitalsignatureand so on. So here we discuss about some security problems and their solutions. Use of Digital Signature with Diffie Hellman Key Exchange and AESEncryptionAlgorithmtoEnhanceData Security in Cloud Computing [1]. Mr.PrashantRewagad and Ms.YogitaPawar [1]. Here in this paper, theresearcherusingthreewayarchitectureprotection schemes. Firstly Diffie-Hellman algorithm isusedtogenerate keys for key exchange step. Then digital signature is used for authentication, thereafter AES encryption algorithm is used to encrypt or decrypt user’s data file. Diffie- Hellman key exchange algorithm is vulnerable to main in the middle attack. The most serious limitation is the lack of the authentication. Union of RSA algorithm, Digital Signature and Kerberos in Cloud Security [2]. Mehdi Hojabri and Mona Heidari [2]. Here in this paper, the researcher first performs the concept of Kerberos authentication services. At the next step the Authenticate Server (AS) of Kerberos do verifies users and created the ticket granting ticket and session keyanditsenttotheusers. The next step users send the ticket granting ticket and session key to Ticket Granting Server (TGS) for getting the service. Then TGS send ticket and session key for user. In final step the users send the request service to cloud service provider for using the cloud service and also cloud service, provide service to users. After doing this step user can used the cloud service provider. But for more security they performed RSA algorithm for encryption & decryption and then they use Digital Signature for Authentication. Implementation Digital signature with RSA Encryption algorithm to enhancethe DatasecurityofcloudinCloud Computing [3]. Uma Somani, Kanika Lakhani, and Manish Mundra [3]. In this paper, there are two enterprises A and B. An enterprise A has some data that are public data and enterprise has public cloud. Now B wants some secure data fromA’scloud. So RSA algorithm and Digital signature are used for secure communication. In this method, enterprise A takes data from cloud, which B wants. Now the data or document is crushed into little line using Hash code function that is called Message digest. Then A encrypts the message digest within private key the result is in the Digital signatureform. Using RSA algorithm, A will encrypt the digital signed signature with B’s public key and B will decrypt the cipher
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 579 text to plain text with his private key and A’s public key for verification of signature. 3. PROPOSED SYSTEM Previous section describes the study about the cloud computing, basics of cloud computingandsecurityproblems occurs in cloud. Then study some papers to solve these security problems. Here in this paper, the Bi-serial DNA encryption algorithm is performing, that providing the two level of security. DNA DIGITAL CODING In information science, the binary digital coding encoded by two state 0 or 1 and a combination of 0 and 1. But DNA digital coding can be encoded by four kind of base as shown in table 1. That is ADENINE (A) and THYMINE (T) or CYTOSINE (C) and GUANINE (G). There are possibly 4! =24 pattern by encoding format like (0123/ATGC) [4]. Table 1. DNA Digital Coding Binary value DNA digital coding 00 A 01 T 10 G 11 C KEY COMBINATION Here in this work, we are using ATGC as a key. Everybithave 2 bits like A=00, T=01, G=10, and C=11 and by using ATGC, key combinations is generated and give numbering respectively that is given into table. From the table 2, wecan generate 64 bit key values and adding ATGC, we can generate 72-bit key (64 bits of key combination and 8 bits of ATGC). ATGC key is sending to the receiver side by using Diffie Hellman key sharing algorithm. In this work, every time the key value will be randomly changed. Table 2: Key combination KEY COMBINATION PATTERNS VALUES AA 0101 5 AT 0011 3 AG 0001 1 AC 0010 2 TA 0110 6 TT 1111 15 TG 0111 7 TC 1001 9 GA 1010 10 GT 0100 4 GG 1000 8 GC 1100 12 CA 1110 14 CT 1011 11 CG 0000 0 CC 1101 13 A. ENCRYPTION PROCESS Fig 1: Encryption process To understand the scenario of proposed work flow chart we consider one example. In this the example plaintext is “Hello Technocrete” and performing encryption operation. Plaintext: Hello Technocrete Unicode: આશિષ
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 580 ASCII: u0e0u0aau02020u0e0u0aau0b6u0e0u0aau0bf u0e0u0a au0b7 Hexadecimal value: 5c753065305c753061615c7530323032305c753065305c 753061615c753062365c753065305c753061615c753062 665c753065305c753061615c7530623 Binary value: 01011100011101010011000001100101001100000101110 00111010100110000011000010110000101011100011101 01001100000011001000110000001100100011000001011 10001110101001100000110010100110000010111000111 01010011000001100001011000010101110001110101001 10000011000100011011001011100011101010011000001 10010100110000010111000111010100110000011000010 11000010101110001110101001100000110001001100110 01011100011101010011000001100101001100000101110 00111010100110000011000010110000101011100011101 01001100000110001000110111 DNA Digital coding: From Table 1 we can write TTCATCTTACAATGTTACAATTCATCTTACAATGATT GATTTCATCTTACAAACAGACAAACAGACAATTCATCTTACAA TGTTACAATTCATCTTACAATGATTGATTTCATCTTACAATGA GACTGTTCATCTTACAATGTTACAATTCATCTTACAATGATTG ATTTCATCTTACAATGAGTGTGTTCATCTTACAATGTTACAAT TCATCTTACAATGATTGATTTCATCTTACAATGAGACTC Now from table 2, the amplified message is generated, Amplified Message 11111110100111110010010101111111001001011111111 01001111100100101011100110111001111111010011111 00100101001100010010010100100001001001011111111 10100111110010010101111111001001011111111010011 11100100101011100110111001111111110100111110010 01010111000100100111111111101001111100100101011 11111001001011111110100111110010010101110011011 10011111111010011111001001010111000101110111111 11110100111110010010101111111001001011111111010 01111100100101011100110111001111111110100111110 0100101011100010010100 B. DECRYPTION PROCESS Now at receiver side, the receiver receives the amplified message and ATGC key for decryption. Fig: 2: Decryption process Amplified Message 11111110100111110010010101111111001001011111111 01001111100100101011100110111001111111101001111 10010010100110001001001010010000100100101111111 11010011111001001010111111100100101111111101001 11110010010101110011011100111111111010011111001 00100111000100100111111111101001111100100101011 11111001001011111111010011111001001011110011011 10011111111101001111100100101011100010111011111 11111010011111001001010111111100100101111111101 00111110010010101100110111001111111110100111110 01001010111000100101001 Now using ATGC key and key combination, retrieve original DNA Digital code. TTCATCTTACAATGTTACAATTCATCTTACAATGATT GATTTCATCTTACAAACAGACAAACAGACAATTCAT CTTACAATGTTACAATTCATCTTACAATGATTGATTT CATCTTACAATGAGACTGTTCATCTTACAATGTTACA ATTCATCTTACAATGATTGATTTCATCTTACAATGAG
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 581 TGTGTTCATCTTACAATGTTACAATTCATCTTACAAT GATTGATTTCATCTTACAATGAGACTC From the table of DNA digital coding we can generate. 01011100011101010011000001100101001100000101100 01110101001100000110000101100001010111000111010 10011000000110010001100000011001000110000010111 00011101010011000001100101001100000101110001110 10100110000011000010110000101011100011101010011 00000110001000110110010111000111010100110000011 00101001100000101110001110101001100000110000101 10000101011100011101010011000001100010011001100 10111000111010100110000011001010011000001011100 01110101001100000110000101100001010111000111010 1001100000110001000110111 Hexadecimal value: 5c753065305c753061615c7530323032305c753065305c75 3061615c753062365c753065305c753061615c753062665c 753065305c753061615c75306237 ASCII: u0e0u0aau02020u0e0u0aau0b6u0e0u0aau0bfu 0e0u0a au0b7 Unicode: આશિષ Plaintext: Hello Technocrat 4. SNAPS OF PROPOSED WORK (ENCRYPTION). Fig. 3: Encryption operation Fig.4: Encryption flow 5. SNAPS OF PROPOSED WORK (DECRYPTION). Fig.5: Decryption Process Fig.6: Decryption flow
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 582 WORKING ON AMAZON WEB SERVICE. . Fig.8: Encryption in AWS Fig.8: Encryption in AWS Fig.9: Decryption in AWS 3. CONCLUSION Data security is the main challenge for cloud usability. Various algorithms like RSA, Diffie-Hellman,DNAencryption etc. are available to provide data security for the data stored on cloud. Digital signatures, Extensible Authentication Protocols are used for authentications. Using BDEA algorithm, we achieve 2-layer security for ASCII character sets. The proposed system focuses on extending the BDEA algorithm to be used with Unicode character set. This can help reach to the wider community of the cloud users. The future work will focus on the possible attacks and cryptanalysis of the cipher text and measure its strength. REFERENCES [1] PrashantRewagad, YogitaPawar, “Use of Digital Signature with Diffie-Hellman Key Exchange and AES Encryption Algorithm to EnhanceData Security in Cloud Computing”2013International Conference on Communication System and Network Technologies (IEEE Computer Society). [2] Uma Somani, Kanika Lakhani, ManishaMundra, ”Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”-2010 IEEE 1st International Conference on Parallel, Distributed and Grid Computing (PDGC-2010). [3] Mehdi Hojabri & Mona Heidari “Union of RSA algorithm, Digital Signature and KERBEROS in Cloud Computing” International Conference on Software Technology and Computer Engineering (STACE-2012). [4] Ashish Prajapati, Amit Rathod “Enhancing security in cloud computing using Bi-Directional DNA Encryption Algorithm”,International Conferenceon Intelligent Computing, Communication & Devices. (ICCD-2014), Springer.