4.6 Article

Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3392665

Keywords

Cloud computing; DNA computing; complementary rule; American Standard Code for Information Interchange; decimal encoding rule; CloudSim

Ask authors/readers for more resources

As multimedia file sizes continue to grow, the need for enhanced security measures becomes crucial. DNA computing presents an advanced solution to protect multimedia files effectively against unauthorized access and attacks.
Today, the size of a multimedia file is increasing day by day from gigabytes to terabytes or even petabytes, mainly because of the evolution of a large amount of real-time data. As most of the multimedia files are transmitted through the internet, hackers and attackers try to access the users' personal and confidential data without any authorization. Thus, maintaining a strong security technique has become a significant concerned to protect the personal information. Deoxyribonucleic Acid (DNA) computing is an advanced field for improving security, which is based on the biological concept of DNA. A novel DNA-based encryption scheme is proposed in this article for protecting multimedia files in the cloud computing environment. Here, a 1024-bit secret key is generated based on DNA computing and the user's attributes and password to encrypt any multimedia file. To generate the secret key, the decimal encoding rule, American Standard Code for Information Interchange value, DNA reference key, and complementary rule are used, which enable the system to protect the multimedia file against many security attacks. Experimental results, as well as theoretical analyses, show the efficiency of the proposed scheme over some well-known existing schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Software Engineering

Effective neighbor node discovery using improved Bayesian clock synchronization-gossip routing protocol in mobile low duty cycle wireless sensor network

Sravankumar Bethi, Nageswara Rao Moparthi

Summary: The MLDC-WSN has advantages such as increasing node life, saving node power, and improving network reliability, but the sleeping features and mobility of MLDC-WSN result in topology changes that restrict the speed of neighbor node discovery. The proposed improved Bayesian clock synchronization-gossip routing protocol effectively reduces end-to-end delay and clock drift problems, while also enhancing clock synchronization by predicting the distance and movement speed of neighbors for neighbor node discovery. Simulation and analytical results showed that the proposed routing protocol significantly decreases end-to-end delay and energy consumption compared to existing algorithms.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2022)

Article Computer Science, Artificial Intelligence

Blockchain-based IoT architecture to secure healthcare system using identity-based encryption

Pratima Sharma, Nageswara Rao Moparthi, Suyel Namasudra, Vimal Shanmuganathan, Ching-Hsien Hsu

Summary: The integration of blockchain technology with the Internet of Things (IoT) can significantly impact the healthcare industry by improving efficiency, security, transparency, and providing more business opportunities. This article proposes a blockchain-based IoT architecture to enhance the security of healthcare data using Identity-Based Encryption (IBE) algorithm. The smart contract defines basic operations of the healthcare system for the benefit of stakeholders, and experiments show the proposed scheme outperforms existing renowned schemes.

EXPERT SYSTEMS (2022)

Article Biochemistry & Molecular Biology

Synthesis, in vitro and structural aspects of cap substituted Suberoylanilide hydroxamic acid analogs as potential inducers of apoptosis in Glioblastoma cancer cells via HDAC /microRNA regulation

Janaki Ramaiah Mekala, Prasanna Srinivasan Ramalingam, Sivagami Mathavan, Rajesh B. R. D. Yamajala, Nageswara Rao Moparthi, Rohil Kumar Kurappalli, Rajasekhar Reddy Manyam

Summary: This study synthesized various SAHA analogs and tested their cytotoxicity against different cancer cells. Among them, 3-Chloro-SAHA and 3-Chloro-4-fluoro SAHA showed effective cytotoxicity in all cancer cells, with the ability to inhibit specific enzyme activity and regulate gene expression. These analogs have the potential to be used in the treatment of glioblastoma.

CHEMICO-BIOLOGICAL INTERACTIONS (2022)

Article Computer Science, Artificial Intelligence

gTour: Multiple itinerary recommendation engine for group of tourists

Joy Lal Sarkar, Abhishek Majumder

Summary: Tourism is crucial for a country's economy, as tourists face challenges in selecting suitable trips. The gTour algorithm is proposed to suggest multiple itineraries for a group, performing better than other baseline algorithms.

EXPERT SYSTEMS WITH APPLICATIONS (2022)

Article Computer Science, Information Systems

Tourism recommendation system: a survey and future research directions

Joy Lal Sarkar, Abhishek Majumder, Chhabi Rani Panigrahi, Sudipta Roy, Bibudhendu Pati

Summary: A Recommendation System (RS) is an intelligent computer based system that provides valuable suggestions to users in various domains. In the tourism industry, Tourism Recommendation Systems (TRS) play a crucial role in helping tourists plan their trips by considering multiple factors such as transportation, accommodation, and tourist attractions. This paper examines various techniques, including Artificial Intelligence (AI), for solving the tourist recommendation problem and proposes future research directions to improve the Quality of Service (QoS) of RS in the tourism industry.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT

Gunaganti Sravanthi, Nageswara Rao Moparthi

Summary: Job scheduling is crucial in cloud computing to enhance the effectiveness of the system. Existing techniques for job scheduling lack efficiency, hence a new method called DIWGAN is proposed. This method accurately predicts future workload in the dynamic cloud environment and utilizes the AOA algorithm to optimize weight parameters, resulting in reduced power consumption at cloud data centers.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Computer Science, Interdisciplinary Applications

Enhanced Neural Network-Based Univariate Time-Series Forecasting Model for Big Data

Suyel Namasudra, S. Dhamodharavadhani, R. Rathipriya, Ruben Gonzalez Crespo, Nageswara Rao Moparthi

Summary: Big data is a combination of structured, semistructured, and unstructured data from various sources that needs to be processed before using it. Anomalies in big data refer to unusual occurrences of data that don't fit general patterns, which is a major problem. The Data Trust Method (DTM) is a technique that identifies and replaces untrustworthy data in big data using interpolation. This article discusses the application of DTM in improving the forecast quality of univariate time series (UTS) in big data using a neural network (NN) model.

BIG DATA (2023)

Article Computer Science, Artificial Intelligence

AESPNet: Attention Enhanced Stacked Parallel Network to improve automatic Diabetic Foot Ulcer identification

Sujit Kumar Das, Suyel Namasudra, Awnish Kumar, Nageswara Rao Moparthi

Summary: This paper presents an efficient approach based on Convolutional Neural Network (CNN) called AESPNet for the identification of Diabetic Foot Ulcer (DFU). Compared with other standard CNN-based schemes, AESPNet demonstrates better performance in DFU classification.

IMAGE AND VISION COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Enhancing Security of Medical Images Using Deep Learning, Chaotic Map, and Hash Table

Piyush Kumar, Mobashshirur Rahman, Suyel Namasudra, Nageswara Rao Moparthi

Summary: The advancement in technology has led to an increase in security attacks, which has resulted in the need for innovative security algorithms. In the healthcare system, the security of medical images sent over the internet is crucial. This paper proposes a novel GAN model to enhance the security of medical images by using a 2D chaotic map, hash-table, and DL. The proposed model has been tested on various medical images and outperforms other related schemes.

MOBILE NETWORKS & APPLICATIONS (2023)

Article Computer Science, Information Systems

Prediction and assessment of credit risk using an adaptive Binarized spiking marine predators' neural network in financial sector

Vadipina Amarnadh, Nageswara Rao Moparthi

Summary: The rapid advancement of technologies has led to the need for additional improvements in banking and credit platforms. This paper proposes a new method for credit risk assessment in the banking sector using an Adaptive Binarized Spiking Marine Predators Neural Network, which achieves high accuracy and a short evaluation period.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Review Computer Science, Artificial Intelligence

Comprehensive review of different artificial intelligence-based methods for credit risk assessment in data science

Vadipina Amarnadh, Nageswara Rao Moparthi

Summary: Credit risk is a significant problem in the banking and financial sectors. Continuous monitoring of payments and other assessment patterns can reduce non-performing assets and fraud risks. Artificial intelligence technology is focused on to handle the large amount of data. This review examines different learning methods to improve the performance and issues in banking and finance sectors.

INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS (2023)

Article Computer Science, Information Systems

Multilayer Neural Network Based Speech Emotion Recognition for Smart Assistance

Sandeep Kumar, MohdAnul Haq, Arpit Jain, C. Andy Jason, Nageswara Rao Moparthi, Nitin Mittal, Zamil S. Alzamil

Summary: This paper presents an intelligent assistant that utilizes voice recognition to identify emotions and provide support through alert actions. The proposed system successfully detects seven emotions and achieves better accuracy and faster processing time compared to existing technologies.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Proceedings Paper Computer Science, Information Systems

MERIT: Multi-Itinerary Tourist Recommendation Engine for Industrial Internet of Things

Abhishek Majumder, Joy Lal Sarkar, Bibudhendu Pati, Chhabi Rani Panigrahi, V Ramasamy, Sudipta Roy, Vikas Kumar

Summary: The expansion and usage of the Industrial Internet of Things (IIoT) in commercial industries and technologies provide numerous possibilities for companies and businesses to expand, and intelligent devices incorporating sensors and data analysis can offer better tourist recommendations for travelers.

IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2022)

Article Education, Special

An Efficient Cross domain feature extraction based classification model for aspect sentiment analysis

Monika Agrawal, Nageswara Rao Moparthi

Summary: A hybrid cross domain classification based feature selection method is proposed in this paper to improve the efficiency of aspect sentiment classification on large databases. Experimental results show that the proposed method has better overall true positive than conventional methods.

INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION (2022)

No Data Available