Secured Outsourcing Towards a Cloud Computing Environment Based on DNA Cryptography
Cloud computing denotes an IT infrastructure where data and software are stored and processed remotely in a data center of a cloud provider, which are accessible via an Internet service. This new paradigm is increasingly reaching the ears of companies and has revolutionized the marketplace of today owing to several factors, in particular its cost-effective architectures covering transmission, storage and intensive data computing. However, like any new technology, the cloud computing technology brings new problems of security, which represents the main restrain on turning to this paradigm. For this reason, users are reluctant to resort to the cloud because of security and protection of private data as well as lack of trust in cloud service providers. The working this paper allows the readers to familiarize themselves with the field of security in the cloud computing paradigm while suggesting our contribution in this context. The security schema we propose allowing a distant user to ensure completely secure migration of all their data anywhere in the cloud through DNA cryptography. Carried out experiments showed that our security solution outperforms its competitors in terms of integrity and confidentiality of data.
The cloud computing exhibits, remarkable potential to provide cost effective, easy to manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization.
The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure, for example, power generation and distribution plants are being migrated to the cloud computing paradigm. However, the services provided by third-party cloud service providers entail additional security threats. The migration of user’s assets (data, applications, etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions presented in the literature to counter the security issues. Furthermore, a brief view of security vulnerabilities in the mobile cloud computing are also highlighted
PRPOSED SYSTEM :
In this paper allows the readers to familiarize themselves with the field of security in the cloud computing paradigm while suggesting our contribution in this context. The security schema we propose allowing a distant user to ensure completely secure migration of all their data anywhere in the cloud through DNA cryptography.
Carried out experiments showed that our security solution outperforms its competitors in terms of integrity and confidentiality of data. In order to provide an effective solution for the security of the data of remote users against any analysis aimed at their disclosure when migrating to the cloud, we propose a security scheme allowing a remote user to ensure completely secure migration of all their data any wherein the cloud through DNA cryptography.
The latter is anew and promising field for information security. Indeed, it is possible to benefit from the advantages of biological DNA to store and hide data inside it. In addition, secret information is placed in a molecule of DNA and hidden among other DNA molecules.
The work in this paper has been to develop a security plan taking advantage of combining the benefits given by the recently appearing security mechanisms to provide sufficiently robust data confidentiality, while adapting easily to emerging and converging technologies. The solution we have presented in this paper contributes to the data security problem of the cloud paradigm. This solution has the following characteristics: (i) applying a biological system to secure the data of distant users, (ii) ensuring a protected migration of data in the form of data encrypted into DNA nucleotides forming genetic information, (iii) offering a mechanism based on the DNA test whose aim is to verify the integrity of migrated data during their reception, by means of matching calculation between the hash result of the obtained data and that of the sent ones, and (iv)providing an efficient performance with regard to other previously studied security mechanisms as it ensures