Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

Protecting Cloud Computing Environments from Malicious Attacks using Multi-factor Authentication and Modified DNA Cryptography

Author(s): Shiju Rawther* and Sathyalakshmi Sivaji

Volume 19, Issue 1, 2025

Published on: 22 September, 2023

Article ID: e050923220730 Pages: 21

DOI: 10.2174/1872212118666230905141926

Price: $65

Abstract

Introduction: Cloud computing has become an essential technology for data storage and sharing, but security concerns remain significant challenges. Authentication is one of the critical components of cloud security. Various authentication schemes have been proposed to ensure the confidentiality and integrity of cloud data.

Method: This research paper reviews the state-of-the-art three-factor authentication schemes based on smart cards, biometric authentication, and elliptic curve cryptography. The patent paper also presents a comprehensive overview of DNA cryptography algorithms, which have recently gained popularity due to their unique features in cloud data security. The paper further compares the DNA cryptography algorithms and discusses their advantages and disadvantages in terms of security and performance.

Result: Finally, the patent paper proposes an efficient and secure DNA-based authentication scheme for cloud computing. This scheme is validated using all these types of data, and its performance is evaluated in terms of encryption and decryption times. Decryption takes 60 seconds on average and encryption 40 seconds on average.

Conclusion: As a final evaluation, it establishes that the proposed system can provide secure cloud services.

[1]
X. Li, K. Li, K. Li, and Y. Li, "An efficient and secure authentication scheme for cloud computing using smart cards", Future Gener. Comput. Syst., vol. 102, pp. 369-380, 2020.
[2]
Y. Zhang, S. Wang, R. Liu, and C. Yang, "A privacy-preserving three-factor authentication scheme for cloud-assisted cyber-physical systems", IEEE Internet Things J., vol. 8, no. 5, pp. 3355-3365, 2021.
[3]
D. Mishra, A. Kumar, and R. Kumar, "A secure authentication scheme for cloud computing based on three-factor and biometric authentication", Comput. Secur., vol. 92, 2020.101727
[4]
D. Zou, Y. Li, and C. Li, "A three-factor authenticated key exchange protocol for cloud computing based on elliptic curve cryptography", IEEE Access, vol. 7, pp. 151718-151727, 2019.
[5]
J. Li, L. Li, and Z. Li, "An efficient and secure three-factor remote user authentication scheme with key agreement for cloud computing", J. Supercomput., vol. 76, no. 1, pp. 522-539, 2020.
[6]
V. Chang, and M. Ramachandran, "DNA cryptography for cloud computing: A review", J. Ambient Intell. Humaniz. Comput., vol. 10, no. 10, pp. 3747-3759, 2019.
[7]
D. Singh, and V. Kumar, "A novel DNA-based cryptography for cloud data security", J. Inform. Sec. Appl., vol. 60, 2021.102748
[8]
H. Thapliyal, A. Agarwal, and N. Kumar, "Design of novel DNA cryptography algorithm based on mathematical operations for data security in cloud computing", J. Ambient Intell. Humaniz. Comput., vol. 11, no. 1, pp. 183-194, 2020.
[9]
A. Bhattacharyya, "A new DNA-based cryptography scheme for cloud data security", J. Inform. Sec. Appl., vol. 54, 2020.102566
[10]
T. Yousuf, N.R. Aljohani, A. Albeshri, and T. Kousiouris, "A comparative study of DNA cryptography algorithms for cloud data security", J. Ambient Intell. Humaniz. Comput., vol. 12, no. 2, pp. 1631-1641, 2021.
[11]
M. AlZain, M.S. Sohail, A. Alarifi, and F. Alfaresi, "Enhanced security framework for cloud storage based on DNA cryptography", IEEE Access, vol. 7, pp. 170974-170986, 2019.
[12]
X. Ding, Q. Wu, and H. Jin, "An efficient and secure DNA-based authentication scheme for cloud computing", IEEE Access, vol. 8, pp. 143455-143463, 2020.
[13]
A. Ghosh, and M. Chakraborty, "A novel DNA cryptography algorithm for secure data transmission in cloud computing", J. Ambient Intell. Humaniz. Comput., vol. 11, no. 4, pp. 1763-1774, 2020.
[14]
D. Jose Anand, R. Srinath, R. Janarthanan, and C.U. thayakumar, "Efficient security for desktop data grid using fault resilient content distribution", Int. J. Eng. Res. Indus. Appl., vol. 2, no. VII, pp. 301-313, 2009.
[15]
A.S. Akanbi, and A.M. Aliyu, "A DNA-based authentication scheme for cloud computing", Int. J. Eng. Res. Indus. Appl., vol. 54, 2020.102537
[16]
N. Kumar, H. Thapliyal, and A. Agarwal, "DNA cryptography-based data encryption in cloud computing", J. Ambient Intell. Humaniz. Comput., vol. 10, no. 7, pp. 2745-2754, 2019.
[17]
J. Anand, H. Gowtham, R. Lingeshwaran, J. Ajin, and J. Karthikeyan, "IoT based smart electrolytic bottle monitoring", Adv. Paral. Comp. Technol. Appl. IOS Press, vol. 40, pp. 391-399, 2021.
[18]
T. Joseph, S.A. Kalaiselvan, S.U. Aswathy, R. Radhakrishnan, and A.R. Shamna, "Retracted article: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment", J. Ambient Intell. Humaniz. Comput., vol. 12, no. 6, pp. 6141-6149, 2021.
[http://dx.doi.org/10.1007/s12652-020-02184-8]
[19]
S. Shiju Rawther, "Entropy analysis of cyber attack propagation in network 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT),, 2022pp. 1-4 03-05 October 2022 , Kharagpur, India",
[20]
I. Alam, and S.N. Singh, Designing and implementing cloud security using multi- layer dna cryptography in python., Trend. Wirel. Commun. Inform. Secur, 2021, pp. 375-385.
[21]
P. Pavithran, S. Mathew, S. Namasudra, and P. Lorenz, "A novel cryptosystem based on DNA cryptography and randomly generated mealy machine", Comput. Secur., vol. 104, 2021.102160
[http://dx.doi.org/10.1016/j.cose.2020.102160]
[22]
M.V. Arokiamary, and J. Anand, "Analysis of dynamic interference constraints in cognitive radio cloud networks", Int. J. Adv. Res. Sci. Commun. Technol., vol. 6, no. 1, pp. 815-823, 2021.
[http://dx.doi.org/10.48175/IJARSCT-1484]
[23]
S. Rawther, " and S. S, "Cyber attack link formation in a network", Int. J. Eng. Tren.Technol., vol. 71, no. 5, pp. 191-196, 2023.
[http://dx.doi.org/10.14445/22315381/IJETT-V71I5P220]

Rights & Permissions Print Cite
© 2025 Bentham Science Publishers | Privacy Policy