JOURNAL ARTICLE

Framework for Data Security Using DNA Cryptography and HMAC Technique in Cloud Computing

Anuj Kumar

Year: 2021 Journal:   2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC) Pages: 898-903

Abstract

The main objective of the proposed work is to build a reliable and secure architecture for cloud servers where users may safely store and transfer their data. This platform ensures secure communication between the client and the server during data transfer. Furthermore, it provides a safe method for sharing and transferring files from one person to another. As a result, for ensuring safe data on cloud servers, this research work presents a secure architecture combining three DNA cryptography, HMAC, and a third party Auditor. In order to provide security by utilizing various strategies, a number of traditional and novel cryptographic methods are investigated. In the first step, data will be encrypted with the help of DNA cryptography, where the encoded document will be stored in the cloud server. In next step, create a HMAC value of encrypted file, which was stored on cloud by using secret key and sends to TPA. In addition, Third Party Auditor is used for authenticate the purity of stored documents in cloud at the time of verification TPA also create HMAC value from Cloud stored data and verify it. DNA-based cryptographic technique, hash based message authentic code and third party auditor will provide more secured framework for data security and integrity in cloud server.

Keywords:
Cloud computing Computer science Hash-based message authentication code Cryptography Encryption Server Computer security Data security Hash function Message authentication code Computer network Operating system

Metrics

10
Cited By
1.72
FWCI (Field Weighted Citation Impact)
22
Refs
0.85
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Enhancing Data Security in Cloud Computing Using Threshold Cryptography Technique

K. SureshaP. Vijaya Karthick

Lecture notes in electrical engineering Year: 2020 Pages: 231-242
JOURNAL ARTICLE

Cloud Computing Security using by Applying Cryptography Technique

Rajesh Keshavrao SadavarteG. D. Kurundkar

Journal:   International Journal of Scientific Research in Computer Science Engineering and Information Technology Year: 2020 Pages: 126-132
BOOK-CHAPTER

Efficient Data Security Using Hybrid Cryptography on Cloud Computing

P. ChinnasamyS. PadmavathiR. SwathyS. Rakesh

Lecture notes in networks and systems Year: 2020 Pages: 537-547
JOURNAL ARTICLE

Cryptography and Data Security in Cloud Computing

Zheng YanRobert H. DengVijay Varadharajan

Journal:   Information Sciences Year: 2017 Vol: 387 Pages: 53-55
© 2026 ScienceGate Book Chapters — All rights reserved.