Skip to content
2000
Volume 19, Issue 1
  • ISSN: 1872-2121
  • E-ISSN: 2212-4047

Abstract

Introduction

Cloud computing has become an essential technology for data storage and sharing, but security concerns remain significant challenges. Authentication is one of the critical components of cloud security. Various authentication schemes have been proposed to ensure the confidentiality and integrity of cloud data.

Methods

This research paper reviews the state-of-the-art three-factor authentication schemes based on smart cards, biometric authentication, and elliptic curve cryptography. The patent paper also presents a comprehensive overview of DNA cryptography algorithms, which have recently gained popularity due to their unique features in cloud data security. The paper further compares the DNA cryptography algorithms and discusses their advantages and disadvantages in terms of security and performance.

Results

Finally, the patent paper proposes an efficient and secure DNA-based authentication scheme for cloud computing. This scheme is validated using all these types of data, and its performance is evaluated in terms of encryption and decryption times. Decryption takes 60 seconds on average and encryption 40 seconds on average.

Conclusion

As a final evaluation, it establishes that the proposed system can provide secure cloud services.

Loading

Article metrics loading...

/content/journals/eng/10.2174/1872212118666230905141926
2025-01-01
2024-11-26
Loading full text...

Full text loading...

References

  1. LiX. LiK. LiK. LiY. An efficient and secure authentication scheme for cloud computing using smart cards.Future Gener. Comput. Syst.2020102369380
    [Google Scholar]
  2. ZhangY. WangS. LiuR. YangC. A privacy-preserving three-factor authentication scheme for cloud-assisted cyber-physical systems.IEEE Internet Things J.20218533553365
    [Google Scholar]
  3. MishraD. KumarA. KumarR. A secure authentication scheme for cloud computing based on three-factor and biometric authentication.Comput. Secur.202092101727
    [Google Scholar]
  4. ZouD. LiY. LiC. A three-factor authenticated key exchange protocol for cloud computing based on elliptic curve cryptography.IEEE Access20197151718151727
    [Google Scholar]
  5. LiJ. LiL. LiZ. An efficient and secure three-factor remote user authentication scheme with key agreement for cloud computing.J. Supercomput.2020761522539
    [Google Scholar]
  6. ChangV. RamachandranM. DNA cryptography for cloud computing: A review.J. Ambient Intell. Humaniz. Comput.2019101037473759
    [Google Scholar]
  7. SinghD. KumarV. A novel DNA-based cryptography for cloud data security.J. Inform. Sec. Appl.202160102748
    [Google Scholar]
  8. ThapliyalH. AgarwalA. KumarN. Design of novel DNA cryptography algorithm based on mathematical operations for data security in cloud computing.J. Ambient Intell. Humaniz. Comput.2020111183194
    [Google Scholar]
  9. BhattacharyyaA. A new DNA-based cryptography scheme for cloud data security.J. Inform. Sec. Appl.202054102566
    [Google Scholar]
  10. YousufT. AljohaniN.R. AlbeshriA. KousiourisT. A comparative study of DNA cryptography algorithms for cloud data security.J. Ambient Intell. Humaniz. Comput.202112216311641
    [Google Scholar]
  11. AlZainM. SohailM.S. AlarifiA. AlfaresiF. Enhanced security framework for cloud storage based on DNA cryptography.IEEE Access20197170974170986
    [Google Scholar]
  12. DingX. WuQ. JinH. An efficient and secure DNA-based authentication scheme for cloud computing.IEEE Access20208143455143463
    [Google Scholar]
  13. GhoshA. ChakrabortyM. A novel DNA cryptography algorithm for secure data transmission in cloud computing.J. Ambient Intell. Humaniz. Comput.202011417631774
    [Google Scholar]
  14. Jose AnandD. SrinathR. JanarthananR. thayakumarC.U. Efficient security for desktop data grid using fault resilient content distributionInt. J. Eng. Res. Indus. Appl.20092VII301313
    [Google Scholar]
  15. AkanbiA.S. AliyuA.M. A DNA-based authentication scheme for cloud computing.Int. J. Eng. Res. Indus. Appl.202054102537
    [Google Scholar]
  16. KumarN. ThapliyalH. AgarwalA. DNA cryptography-based data encryption in cloud computing.J. Ambient Intell. Humaniz. Comput.201910727452754
    [Google Scholar]
  17. AnandJ. GowthamH. LingeshwaranR. AjinJ. KarthikeyanJ. IoT based smart electrolytic bottle monitoring.Adv. Paral. Comp. Technol. Appl. IOS Press202140391399
    [Google Scholar]
  18. JosephT. KalaiselvanS.A. AswathyS.U. RadhakrishnanR. ShamnaA.R. Retracted article: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment.J. Ambient Intell. Humaniz. Comput.20211266141614910.1007/s12652‑020‑02184‑8
    [Google Scholar]
  19. Shiju RawtherS. Entropy analysis of cyber attack propagation in network 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT),, 2022pp. 1-4 03-05 October 2022 , Kharagpur, India2022
    [Google Scholar]
  20. AlamI. SinghS.N. Designing and implementing cloud security using multi- layer dna cryptography in python.Trend. Wirel. Commun. Inform. Secur2021375385
    [Google Scholar]
  21. PavithranP. MathewS. NamasudraS. LorenzP. A novel cryptosystem based on DNA cryptography and randomly generated mealy machine.Comput. Secur.202110410216010.1016/j.cose.2020.102160
    [Google Scholar]
  22. ArokiamaryM.V. AnandJ. Analysis of dynamic interference constraints in cognitive radio cloud networks.Int. J. Adv. Res. Sci. Commun. Technol.20216181582310.48175/IJARSCT‑1484
    [Google Scholar]
  23. RawtherS. and S. S, "Cyber attack link formation in a networkInt. J. Eng. Tren.Technol.202371519119610.14445/22315381/IJETT‑V71I5P220
    [Google Scholar]
/content/journals/eng/10.2174/1872212118666230905141926
Loading
/content/journals/eng/10.2174/1872212118666230905141926
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test