Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Enabling Data Hiding for Resource Sharing in Cloud Computing
#1

Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences

[attachment=347]

INTRODUCTION

In order to protect data through the unsecure networks
like the Internet, using various types of data protection is
necessary. With advent of Cloud Computing idea, a
common problem, confidentiality of data, was emerged [19,
20, 21, 22, and 23]. Thus, to solve the raised difficulty,
combining different ideas can help to achieve an acceptable
level of confidentiality in Cloud Computing environments.
One of the famous ways to protect data through the
Internet is data hiding. Because of the increasing number of
Internet users, utilizing data hiding or Steganographic
techniques is inevitable. Eliminating the role of the intruder
and authorizing the clients are eventual goals of these
techniques.

RELATED WORKS

For the purpose of clarifying the algorithm in current
paper, introducing some backgrounds of the knowledge is
necessary [8, 11, 12, and 13]. The most important part of
each DNA base data hiding algorithm is, manipulating four
letters which has been called as nucleotides in biology. The
letters are A, C, G, and T.
Any composition from them will make a sequence. For
instance, two DNA sequences have been appeared in [16].
They mentioned sequences from European Bioinformatics
Institute (which is known as EBI Database) [15] for the
purpose of extracting DNA sequences of Litmus and
Balsaminaceae. So, Litmus with 154 nucleotides and
Balsaminaceae with 2283 are shown in below, respectively:

PROPOSED METHOD

In our method, there is a cloud environment and its
clients in a same company. The clients (client1 and client 2)
want to upload data on cloud in such a manner that
confidentiality of data be in highest point. Therefore, the
clients need to employ a method to increase the level of
confidentiality of data so that no one can see data when
someone intentionally or unintentionally accessed to them.
In figure 3, we demonstrate the flow of data as well as the
flow data hiding method by describing the method.

CONCLUSION
One of basic problem in cloud computing environments
is data confidentiality. Considering DNA characteristics
brings new ideas in data hiding in order to increase the level
of data confidentiality among clients. DNA sequences are
potential to implement new data hiding techniques or even
transforming previous schemes to new one. In this paper, a
reference DNA sequence has been shared among clients.
Not only this DNA reference sequence can be retrieved
from EBI [15] or NCBI [14] databases but it can also be
simply selected from any databases. Therefore, by
considering any sort of database, there are 163 million
targets to select it. Guessing the correct DNA sequence by
attacker is virtually unachievable.
Reply



Forum Jump:


Users browsing this thread:
2 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.