Skip to main content
Top

2016 | OriginalPaper | Chapter

Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud

Authors : Gunjan Gugnani, S. P. Ghrera, P. K. Gupta, Reza Malekian, B. T. J. Maharaj

Published in: Proceedings of the Second International Conference on Computer and Communication Technologies

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Hottest buzzword of this decade is “Cloud Computing”—which has been considered as one of the potential solutions to our increasing demand for accessing, processing, storing, and using provisioned resources over the internet. However, with so many boons, it comes along with some curses as security and trust issues. There are many security issues within the cloud, and Information disclosure is a big threat to a cloud user when the information is transferred over the network using web services. In this paper, we have focused on to provide confidentiality to the user while using cloud-based web services, and an approach has been proposed for selective encryption of XML elements so as to provide confidentiality and prevent XML document form improper information disclosure. The technique used for encrypting the selective XML elements is Deoxyribonucleic Acid (DNA) Encryption. Proposed technique selectively encrypts the elements of XML file using DNA sequencing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jensen, M., Schwenk, J., Gruschka, N., Iacono, L. L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109–116 (2009) Jensen, M., Schwenk, J., Gruschka, N., Iacono, L. L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109–116 (2009)
2.
go back to reference Saravanaguru, R.A., Abraham, G., Ventakasubramanian, K., Borasia, K.: Securing web services using XML signature and XML encryption. arXiv preprint arXiv:1303.0910, 1–6 (2013) Saravanaguru, R.A., Abraham, G., Ventakasubramanian, K., Borasia, K.: Securing web services using XML signature and XML encryption. arXiv preprint arXiv:​1303.​0910, 1–6 (2013)
3.
go back to reference Moradian, E. Anne H.: Possible attacks on XML web services. Int. J. Comput. Sci. Netw. Sec. 6.1B, 154–170 (2006) Moradian, E. Anne H.: Possible attacks on XML web services. Int. J. Comput. Sci. Netw. Sec. 6.1B, 154–170 (2006)
4.
go back to reference Chou T.S.: Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. IT, 5, 79–88 (2013) Chou T.S.: Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. IT, 5, 79–88 (2013)
5.
go back to reference Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)CrossRef
6.
go back to reference Gu, Y.S., Ye, M.T., Gan, Y.: Web services security based on XML signature and XML encryption. J. Netw. 5, 1092–1097 (2010) Gu, Y.S., Ye, M.T., Gan, Y.: Web services security based on XML signature and XML encryption. J. Netw. 5, 1092–1097 (2010)
7.
go back to reference Thakur, A.S., Gupta, P.K.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87, 28–32 (2014) Thakur, A.S., Gupta, P.K.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87, 28–32 (2014)
8.
go back to reference Liu, H., Lin, D., Kadir, A.: A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39, 1164–1173 (2013)CrossRef Liu, H., Lin, D., Kadir, A.: A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39, 1164–1173 (2013)CrossRef
9.
go back to reference Terec, R., Vaida, M.F., Alboaie, L., Chiorean, L.: DNA security using symmetric and asymmetric cryptography. Int. J. New Comput. Archit. Their. Appl. 1, 34–51 (2011) Terec, R., Vaida, M.F., Alboaie, L., Chiorean, L.: DNA security using symmetric and asymmetric cryptography. Int. J. New Comput. Archit. Their. Appl. 1, 34–51 (2011)
10.
go back to reference Rana, P., Gupta, P.K., Siddavatam, R.: Combined and improved framework of infrastructure as a service and platform as a service in cloud computing. In: Babu, B.V., Nagar, A., Deep, K., Pant, M., Bansal, J.C., Ray, K., Gupta, U. (eds.) SocPros 2012. LNCS, vol. 236, pp. 831–839. Springer, India (2014) Rana, P., Gupta, P.K., Siddavatam, R.: Combined and improved framework of infrastructure as a service and platform as a service in cloud computing. In: Babu, B.V., Nagar, A., Deep, K., Pant, M., Bansal, J.C., Ray, K., Gupta, U. (eds.) SocPros 2012. LNCS, vol. 236, pp. 831–839. Springer, India (2014)
11.
go back to reference Thakur, A.S., Gupta, P.K., Gupta, P.: Handling data integrity issue in SaaS cloud. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) FICTA 2014. LNCS, vol. 328, pp. 127–134. Springer International Publishing (2015) Thakur, A.S., Gupta, P.K., Gupta, P.: Handling data integrity issue in SaaS cloud. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) FICTA 2014. LNCS, vol. 328, pp. 127–134. Springer International Publishing (2015)
12.
go back to reference Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web Services. Springer, Berlin Heidelberg (2004)CrossRefMATH Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web Services. Springer, Berlin Heidelberg (2004)CrossRefMATH
13.
go back to reference Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)MathSciNetCrossRef Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)MathSciNetCrossRef
Metadata
Title
Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud
Authors
Gunjan Gugnani
S. P. Ghrera
P. K. Gupta
Reza Malekian
B. T. J. Maharaj
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2526-3_42