Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2
Abstract
The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in cloud. The algorithm which has been proposed here is based on binary coding and complementary pair rules. Therefore, DNA reference sequence is chosen and a secret data M is hidden into it as well. As result of applying some steps, M´´´ is come out to upload to cloud environments. The process of identifying and extracting the original data M, hidden in DNA reference sequence begins once clients decide to use data. Furthermore, security issues are demonstrated to inspect the complexity of the algorithm. In addition, providing better privacy as well as ensure data availability, can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multicloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage.
Authors and Affiliations
D. Sureshraj
Online Voting System (Android Application)
Abstract:Voting is the HEART of democracy. Voting provides a way to select a Leader to manage problems and other issues. The basis of this project is to create an Android application based on which voting can be performe...
Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
Abstract: This paper presents an algorithm for bandwidth management in integrated LTE network and WLAN. The proposed algorithm also suitable for multimedia network (image, telephone and videophone). A software tool is im...
11 × 11 Playfair Cipher based on a Cascade of LFSRs
Playfair cipher is one of the better-known multiple letter encryption ciphers. In this method, the diagrams in the plaintext are treated as a single unit and then these units converted into ciphertext diagrams.&n...
Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)
Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending a...
Mapping and Analysis of Crime in Aurangabad City using GIS
Abstract: The study of Earth and its features with the help of Remote Sensing has lead to a fast growing and effective technology called Geographic Information System (GIS) where digital Maps and spatial data can be used...