Skip to main content

2016 | OriginalPaper | Buchkapitel

Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud

verfasst von : Gunjan Gugnani, S. P. Ghrera, P. K. Gupta, Reza Malekian, B. T. J. Maharaj

Erschienen in: Proceedings of the Second International Conference on Computer and Communication Technologies

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Hottest buzzword of this decade is “Cloud Computing”—which has been considered as one of the potential solutions to our increasing demand for accessing, processing, storing, and using provisioned resources over the internet. However, with so many boons, it comes along with some curses as security and trust issues. There are many security issues within the cloud, and Information disclosure is a big threat to a cloud user when the information is transferred over the network using web services. In this paper, we have focused on to provide confidentiality to the user while using cloud-based web services, and an approach has been proposed for selective encryption of XML elements so as to provide confidentiality and prevent XML document form improper information disclosure. The technique used for encrypting the selective XML elements is Deoxyribonucleic Acid (DNA) Encryption. Proposed technique selectively encrypts the elements of XML file using DNA sequencing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jensen, M., Schwenk, J., Gruschka, N., Iacono, L. L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109–116 (2009) Jensen, M., Schwenk, J., Gruschka, N., Iacono, L. L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109–116 (2009)
2.
Zurück zum Zitat Saravanaguru, R.A., Abraham, G., Ventakasubramanian, K., Borasia, K.: Securing web services using XML signature and XML encryption. arXiv preprint arXiv:1303.0910, 1–6 (2013) Saravanaguru, R.A., Abraham, G., Ventakasubramanian, K., Borasia, K.: Securing web services using XML signature and XML encryption. arXiv preprint arXiv:​1303.​0910, 1–6 (2013)
3.
Zurück zum Zitat Moradian, E. Anne H.: Possible attacks on XML web services. Int. J. Comput. Sci. Netw. Sec. 6.1B, 154–170 (2006) Moradian, E. Anne H.: Possible attacks on XML web services. Int. J. Comput. Sci. Netw. Sec. 6.1B, 154–170 (2006)
4.
Zurück zum Zitat Chou T.S.: Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. IT, 5, 79–88 (2013) Chou T.S.: Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. IT, 5, 79–88 (2013)
5.
Zurück zum Zitat Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)CrossRef
6.
Zurück zum Zitat Gu, Y.S., Ye, M.T., Gan, Y.: Web services security based on XML signature and XML encryption. J. Netw. 5, 1092–1097 (2010) Gu, Y.S., Ye, M.T., Gan, Y.: Web services security based on XML signature and XML encryption. J. Netw. 5, 1092–1097 (2010)
7.
Zurück zum Zitat Thakur, A.S., Gupta, P.K.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87, 28–32 (2014) Thakur, A.S., Gupta, P.K.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87, 28–32 (2014)
8.
Zurück zum Zitat Liu, H., Lin, D., Kadir, A.: A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39, 1164–1173 (2013)CrossRef Liu, H., Lin, D., Kadir, A.: A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39, 1164–1173 (2013)CrossRef
9.
Zurück zum Zitat Terec, R., Vaida, M.F., Alboaie, L., Chiorean, L.: DNA security using symmetric and asymmetric cryptography. Int. J. New Comput. Archit. Their. Appl. 1, 34–51 (2011) Terec, R., Vaida, M.F., Alboaie, L., Chiorean, L.: DNA security using symmetric and asymmetric cryptography. Int. J. New Comput. Archit. Their. Appl. 1, 34–51 (2011)
10.
Zurück zum Zitat Rana, P., Gupta, P.K., Siddavatam, R.: Combined and improved framework of infrastructure as a service and platform as a service in cloud computing. In: Babu, B.V., Nagar, A., Deep, K., Pant, M., Bansal, J.C., Ray, K., Gupta, U. (eds.) SocPros 2012. LNCS, vol. 236, pp. 831–839. Springer, India (2014) Rana, P., Gupta, P.K., Siddavatam, R.: Combined and improved framework of infrastructure as a service and platform as a service in cloud computing. In: Babu, B.V., Nagar, A., Deep, K., Pant, M., Bansal, J.C., Ray, K., Gupta, U. (eds.) SocPros 2012. LNCS, vol. 236, pp. 831–839. Springer, India (2014)
11.
Zurück zum Zitat Thakur, A.S., Gupta, P.K., Gupta, P.: Handling data integrity issue in SaaS cloud. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) FICTA 2014. LNCS, vol. 328, pp. 127–134. Springer International Publishing (2015) Thakur, A.S., Gupta, P.K., Gupta, P.: Handling data integrity issue in SaaS cloud. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) FICTA 2014. LNCS, vol. 328, pp. 127–134. Springer International Publishing (2015)
12.
Zurück zum Zitat Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web Services. Springer, Berlin Heidelberg (2004)CrossRefMATH Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web Services. Springer, Berlin Heidelberg (2004)CrossRefMATH
13.
Zurück zum Zitat Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)MathSciNetCrossRef Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)MathSciNetCrossRef
Metadaten
Titel
Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud
verfasst von
Gunjan Gugnani
S. P. Ghrera
P. K. Gupta
Reza Malekian
B. T. J. Maharaj
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2526-3_42

Neuer Inhalt