Matches in SemOpenAlex for { <https://semopenalex.org/work/W3136706709> ?p ?o ?g. }
Showing items 1 to 49 of
49
with 100 items per page.
- W3136706709 abstract "Molecular biology is a branch of life science which plays a pivot role in improving the quality of life whereas Information security is another aspect for social edification, which human beings will never compromise. Both are subjects of high relevance and inevitable for humanity. Thus, an amalgamation of these subjects turns up as an innovation which is beneficial for Information securityand storage. The secure transfer of information was of significant concern from ancient civilizations. Various techniques have been proposed from time immemorial to maintain the security of data so that only intended recipient should be able to receive the message other than the sender.The Information security aspects became prominent with the introduction of the Internet. Regardless of the type of information which varies from a single character to the much-discussed “Big Dataâ€, it is necessary to ensure securestorage and protection which is a matter of concern. Cryptography is an art by itself and the science of secrecy which protects information from unauthorized access. Various techniques have evolved through years of information protection which includes Ciphers, Cryptography, Steganography, Biometrics and the most recent Nano-Cryptography comprising of Quantum Cryptography and DNACryptography.DNA cryptography is an emerging and promising field of Information security.Dr. Leonard Adleman’s experiment to solve the Hamiltonian Path Problem, which is an NP-complete problem using computational properties of DNA, hasredefined the word computing. The emergence of DNA computing marked the beginning of DNA Cryptography. It was a leap forward in the field of security to use biomolecular concepts and the later research followed on DNA encryptiongives us new hope of unbreakable algorithms. DNA based encryption schemes work on the principles of DNA computing techniques.Cryptosystems based on DNA got relevance due to bio-computational properties of DNA. The encryption schemes based on DNA have several advantages and can be used with conventional cryptosystems as well as with Public KeyCryptography. The encryption schemes based on DNA can be performed in two ways, one is by using the biological medium of DNA for data hiding, and another method is by using digital sequences available from the genetic databases. DNAbased symmetric encryption schemes mainly focuses on using the genetic material as One-Time-Pad (OTP), by considering the availability of sequences from the genetic databases and to avoid the requirement of key transmission. DNA based public key encryption schemes uses DNA sequence as a key.Steganographic systems based on DNA concentrated on using DNA as a medium for data hiding and retrieval.The massive parallelism and extraordinary storage capacity of DNA make it more acceptable for computation and as a data storage medium. The genetic material which is considered as magical code for life can serve other applications too.DNA computing has a wide variety of applications which includes but not limited to Data Storage, Anti-Counterfeiting and DNA Fingerprinting. By analyzingresearch gap drawn from literature work and focusing on the applications of DNA this research focuses on using DNA Cryptography to achieve the various Information security objectives such as Confidentiality, Integrity, Authentication, and Non-Repudiation as well as Anti-Counterfeiting. Addressing the Information security and counterfeiting issues has considerable applications in domains like Pharmaceutical, Health Care, etc. In these domains, drug counterfeiting and Information security are critical issues which if not properly addressed will leadto mortality and a negative impact on brand loyalty. This research work considered all the above mentioned aspects; this research work proposes a framework for Information security and Anti-Counterfeiting using DNA basedencryption schemes. This research progresses through various phases and proposes architectures for Confidentiality, Integrity Authentication, AntiCounterfeiting, and Non-Repudiation using DNA cryptography.This research exploits DNA cryptography to achieve various Information security aspects. The proposed architecture has various phases. The first phase explains the proposed DNA based confidentiality and integrity schemes. Threeschemes are proposed in this phase. One of the scheme is based on the principle of indexing the exons (coding region) and introns (non-coding region) of DNA sequences which also incorporates DNA coding and DNA steganography. Thepolymerase chain reaction technique is used as a principle concept in the second methodology to develop the encryption algorithm. The primer generation and Signature DNA method is also proposed. The third methodology in this phase addresses the man in the middle attack of Diffie-Hellman key exchange protocol. This proposed methodology uses DNA based codebook and secret value calculations based on hash computations and DNA encryption.The second phase addresses the authentication concepts and three schemes are proposed. User authentication and product authentication techniques are proposed using DNA cryptography. The first scheme uses DNA cryptography,image steganography, image password and OTP based user authentication. Mathematically, the DNA bases Adenine (A), Guanine (G), Cytosine(C) and Thymine (T), a 4-letter alphabet I£ = {A, G, C, T} is used to encode informationalong with DNA coding rules and hash functions with proposed protocols. Another protocol for DNA based user authentication and architecture for Electronic Health Records (EHR) in conjunction with Aadhaar is proposed. Theproposed authentication methodology has excellent applications in health care considering the emergence of personalized medicines and pharmacogenomics. The proposed health care also has e-prescription which addresses the issue of drug counterfeiting. The DNA based product authentication scheme is an AntiCounterfeiting technique. The synthetic engineering concepts and DNA encryption are used to develop the proposed protocol. The proposed synthetic DNA protocol generates a cipher which is unique and can be used as the product identifier for drugs. The cipher generated is converted to QR code to enable theend user to authenticate the product.The Non-Repudiation based on DNA-Hash is proposed in the third phase. Unlike other proposed protocols, this method uses DNA extraction protocol and suggests using real DNA for positive identification. This protocol generates e-Signaturemethod using DNA-Hash which is based on Short Tandem Repeats (STR) which make each signature unique. It also uses a nonce value and hash computations.Proof of concept for each proposed methodology is also included in the research work. The security analysis is carried out theoretically for each proposed protocol. Probability computations are done to verify the primer attack, and complexity analysis is carried out for the encryption algorithm. Formal analysis of the proposed protocols is done using Scyther tool to validate the security claims. The verification results produced by Scyther validates the claims put forth by the protocols with “no attacks.â€" @default.
- W3136706709 created "2021-03-29" @default.
- W3136706709 creator A5088196729 @default.
- W3136706709 date "2018-12-01" @default.
- W3136706709 modified "2023-09-26" @default.
- W3136706709 title "A FRAMEWORK FOR INFORMATION SECURITY ASSURANCE USING DNA CRYPTOGRAPHY" @default.
- W3136706709 hasPublicationYear "2018" @default.
- W3136706709 type Work @default.
- W3136706709 sameAs 3136706709 @default.
- W3136706709 citedByCount "0" @default.
- W3136706709 crossrefType "dissertation" @default.
- W3136706709 hasAuthorship W3136706709A5088196729 @default.
- W3136706709 hasConcept C178489894 @default.
- W3136706709 hasConcept C2780795517 @default.
- W3136706709 hasConcept C38652104 @default.
- W3136706709 hasConcept C41008148 @default.
- W3136706709 hasConcept C527648132 @default.
- W3136706709 hasConceptScore W3136706709C178489894 @default.
- W3136706709 hasConceptScore W3136706709C2780795517 @default.
- W3136706709 hasConceptScore W3136706709C38652104 @default.
- W3136706709 hasConceptScore W3136706709C41008148 @default.
- W3136706709 hasConceptScore W3136706709C527648132 @default.
- W3136706709 hasLocation W31367067091 @default.
- W3136706709 hasOpenAccess W3136706709 @default.
- W3136706709 hasPrimaryLocation W31367067091 @default.
- W3136706709 hasRelatedWork W1499433261 @default.
- W3136706709 hasRelatedWork W2017110748 @default.
- W3136706709 hasRelatedWork W2023407211 @default.
- W3136706709 hasRelatedWork W2051403944 @default.
- W3136706709 hasRelatedWork W2413641477 @default.
- W3136706709 hasRelatedWork W2539891217 @default.
- W3136706709 hasRelatedWork W2558648769 @default.
- W3136706709 hasRelatedWork W2802138432 @default.
- W3136706709 hasRelatedWork W2901245220 @default.
- W3136706709 hasRelatedWork W2901994568 @default.
- W3136706709 hasRelatedWork W2935777812 @default.
- W3136706709 hasRelatedWork W2946309304 @default.
- W3136706709 hasRelatedWork W2964430857 @default.
- W3136706709 hasRelatedWork W2970513308 @default.
- W3136706709 hasRelatedWork W3156426105 @default.
- W3136706709 hasRelatedWork W3181603331 @default.
- W3136706709 hasRelatedWork W2183034745 @default.
- W3136706709 hasRelatedWork W2186644580 @default.
- W3136706709 hasRelatedWork W2416133642 @default.
- W3136706709 hasRelatedWork W2419550342 @default.
- W3136706709 isParatext "false" @default.
- W3136706709 isRetracted "false" @default.
- W3136706709 magId "3136706709" @default.
- W3136706709 workType "dissertation" @default.