DNA Based Authentication System
DNA Based Authentication System
DNA Based Authentication System
2 Background
A detailed analysis of current security challenges in cloud computing
and existing authentication approaches is presented.
3 Related Work
A review of relevant research related to DNA computing and its
applications in cybersecurity is included.
Parallel Processing
DNA computing offers a massively parallel approach to computations,
allowing for simultaneous processing of multiple DNA strands.
Introduction
The presentation highlights the integration of DNA cryptography into cloud security. It addresses the growing
vulnerability of cloud systems to cyberattacks and explores DNA-based authentication as a potential solution.
1 2 3
Passwords
Widely used due to simplicity but vulnerable to brute force attacks and password guessing.
Biometric Authentication
Provides stronger security through fingerprint, iris, or facial recognition, but requires specialized
hardware and faces vulnerabilities in spoofing.
DNA Computing Overview
This section provides an introduction to DNA computing, exploring its fundamental
principles and potential applications in cybersecurity.
DNA Structure
DNA's fundamental structure comprises a double helix composed of
nucleotides, each consisting of a phosphate group, a sugar, and a
nitrogenous base.
Information Encoding
The sequence of nitrogenous bases in DNA (adenine, guanine,
cytosine, thymine) serves as a code for storing and transmitting
genetic information.
Enzymatic Replication
The polymerase chain reaction (PCR) enables the duplication of DNA
strands, allowing for efficient information copying and manipulation.
Related Work
This section explores relevant research works in the field of DNA computing and its applications in enhancing cloud security.
A Survey of Three-Factor Authentication DNA-based authentication for cloud computing Demonstrated the effectiveness and security of
Techniques and a DNA-Based Authentication DNA-based authentication.
Strategy for Cloud Computing
Watson-Crick Hoogsteen Base Private Data Secure private data storage in cloud using DNA Proposed a method for storing highly private data
Transaction (WHO-CDT) Method structure in cloud storage using DNA's structural
properties.
Improved DNA Cryptosystem for Secure Data Enhanced DNA cryptosystem for secure data Introduced an improved cryptosystem that
Storage in the Cloud storage ensures secure data storage in the cloud
environment.
Proposed DNA Authentication Framew
System Design DNA Key Generation Workflow
The DNA-based authentication A DNA oligonucleotide synthesis The DNA authentication pipeline
system operates as an additional platform generates unique keyed seamlessly integrates within the
security layer within standard sequences for each user and overall cloud system workflow
cloud access protocols. It device. These act as Challenge- without interfering with other
incorporates DNA analysis Response (CR) elements, with modules, ensuring a smooth user
devices for on-demand key specific fragments disclosed to experience.
verification, integrated with user trigger DNA reproduction and
sign-on and device access fluorescence tagging for
requests. automated sequence readout.
Authentication Framework:
DNA Based Keys
1 Unique Keys
The CRYPTON DNA generator tool creates random 128-bit oligonucleotides
that serve as unique keys. These keys are fragmented and distributed across
user accounts and paired devices.
2 Reference Genome
The vast information density of the human genome allows for the encoding of
these keys within a minimal oligonucleotide footprint. This ensures efficient
key storage and transmission.
3 Biological PUFs
Key storage is achieved through biologically enabled Physical Unclonable
Functions (PUF). The unique sequence complexity of the DNA keys generates
distinct optical diffraction patterns, acting as a secure and tamper-proof
identifier.
DNA Pattern Matching Protocol
Authentication Process
When users attempt to access the cloud, specific DNA subsets linked to their profile activate the corresponding sequence-matched strands.
Fluorescence Response
These strands emit fluorescent optical signals during PCR amplification, providing a visual confirmation of authentication.
Optimized Testing
The DNA authentication process leverages microfluidics and faster PCR cycles, enabling rapid authentication decisions within 5 minutes. Built-in redundancy
addresses segmentation and partial hybridization issues.
Future Developments
Enzymatic logic gate platforms hold promise for enabling complex biological authentication circuits, further reducing execution time.
Algorithm 1: DNA-
Based User
Authentication
Step Description
2 DNA Encoding
4 PCR Amplification
5 Fluorescence Detection
6 Authentication Decision
Algorithm 2: DNA One-Time Pad Encryption
Message Conversion XOR Encryption
The message is converted into a bit string and then Each message chunk is XORed with the
divided into fixed-length chunks (128 bits each). corresponding DNA pad, scrambling the message.
1 2 3 4
Environmental Sensitivity
DNA analysis is susceptible to environmental factors such as temperature, pH, and ionic
properties. These factors must be addressed during implementation and testing.
Cost Considerations
The cost of DNA reagents, enzymes, and synthesis remains a challenge. However, mass
production and cost reductions in DNA sequencing offer future possibilities for wider adoption.
System Integration
Compatibility with various access devices, browsers, and middleware needs to be tested
extensively for seamless cloud integration.
Future Work: Addressing
Limitations
1 Enzyme Optimization
Developing new polymerase enzymes or hydrogels will enable customization of
biological processes for different environments.
2 Photonic Circuits
Photonic circuits embedded in DNA logic gate arrays will automate and
parallelize analytical workflows, improving efficiency and reducing processing
time.
3 Mobile Biosensors
On-demand authentication using mobile microfluidic biosensors will enable
convenient and secure access to cloud services.