DNA Based Authentication System

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

Department of

Computer Science and


Engineering
Rajasthan Technical
University
Topic - DNA Based Authentication System Using
Cloud Storage and Transaction
MADE BY – SUBMITTED TO –

Kartik Gautam – 22/508 Dr. Harish Sharma Sir


Puneet Mishra – 22/527 (HOD)
Akshat Jain – 22/486
Hritvik Bhatia – 22/505
DNA
Computing:
Revolutionizin
g Security
DNA computing utilizes the principles of molecular biology to
solve complex problems. This emerging field has the potential
to revolutionize data security, offering unparalleled levels of
protection against cyber threats.
Table of Contents
1 Introduction
This section provides a concise overview of the motivations and
objectives of the proposed authentication framework.

2 Background
A detailed analysis of current security challenges in cloud computing
and existing authentication approaches is presented.

3 Related Work
A review of relevant research related to DNA computing and its
applications in cybersecurity is included.

4 Proposed DNA Authentication Framework


The core of the presentation, outlining the proposed DNA-based
authentication framework and its components.
What is DNA Computing?
Molecular Computing
DNA computing utilizes the unique properties of DNA molecules for
computational tasks, leveraging the molecular biology domain.

Biomolecular Information Storage


DNA's inherent capacity for storing large amounts of information is
exploited for encoding and manipulating data.

Parallel Processing
DNA computing offers a massively parallel approach to computations,
allowing for simultaneous processing of multiple DNA strands.
Introduction
The presentation highlights the integration of DNA cryptography into cloud security. It addresses the growing
vulnerability of cloud systems to cyberattacks and explores DNA-based authentication as a potential solution.

Cloud Security Concerns Limitations of DNA Cryptography


Traditional Integration
Cloud computing's widespread
Authentication
adoption brings increased security Existing authentication methods Leveraging DNA's information
risks, with cyberattacks posing a like passwords and multi-factor encoding capabilities, the proposed
significant threat to sensitive data. authentication (MFA) face framework aims to enhance cloud
limitations and remain vulnerable authentication by generating
1. Data breaches
to attacks. random DNA strand combinations
2. Account hijacking 1. Password complexity
as biometric keys.
3. Phishing attacks 2. Vulnerability to denial-of-
service attacks
4. Ransomware
Expected Benefits
Enhanced User Binding Increased Resilience Against Attacks
Stronger binding between users and their cloud accounts, reducing Enhanced protection against common attacks, including brute force
unauthorized access and data manipulation. and man-in-the-middle attacks, by utilizing the complexity of DNA
codes.

1 2 3

Improved Device Authentication


Secure association of devices with cloud assets, preventing
unauthorized access from unverified devices.
Background
This section delves into the existing challenges and vulnerabilities associated
with cloud security, providing a comprehensive overview of the existing
authentication approaches.

Category Threats Vulnerabilities

Data Breaches Compromised Weak security


credentials, malware controls, inadequate
user authentication

Phishing Attacks Stolen login Password reuse, lack


credentials of awareness

Account Hijacking Automated attacks Weak authentication


targeting protocols, vulnerable
vulnerabilities in application interfaces
authentication
mechanisms
Existing Authentication Approaches
The section examines existing authentication methods and their strengths and weaknesses in the
context of cloud security.

Passwords
Widely used due to simplicity but vulnerable to brute force attacks and password guessing.

Multi-factor Authentication (MFA)


Offers additional security by requiring multiple authentication factors, but susceptible to diversion
attacks on secondary factors.

Biometric Authentication
Provides stronger security through fingerprint, iris, or facial recognition, but requires specialized
hardware and faces vulnerabilities in spoofing.
DNA Computing Overview
This section provides an introduction to DNA computing, exploring its fundamental
principles and potential applications in cybersecurity.

DNA Structure
DNA's fundamental structure comprises a double helix composed of
nucleotides, each consisting of a phosphate group, a sugar, and a
nitrogenous base.

Information Encoding
The sequence of nitrogenous bases in DNA (adenine, guanine,
cytosine, thymine) serves as a code for storing and transmitting
genetic information.

Enzymatic Replication
The polymerase chain reaction (PCR) enables the duplication of DNA
strands, allowing for efficient information copying and manipulation.
Related Work
This section explores relevant research works in the field of DNA computing and its applications in enhancing cloud security.

Research Focus Contribution

A Survey of Three-Factor Authentication DNA-based authentication for cloud computing Demonstrated the effectiveness and security of
Techniques and a DNA-Based Authentication DNA-based authentication.
Strategy for Cloud Computing

Watson-Crick Hoogsteen Base Private Data Secure private data storage in cloud using DNA Proposed a method for storing highly private data
Transaction (WHO-CDT) Method structure in cloud storage using DNA's structural
properties.
Improved DNA Cryptosystem for Secure Data Enhanced DNA cryptosystem for secure data Introduced an improved cryptosystem that
Storage in the Cloud storage ensures secure data storage in the cloud
environment.
Proposed DNA Authentication Framew
System Design DNA Key Generation Workflow
The DNA-based authentication A DNA oligonucleotide synthesis The DNA authentication pipeline
system operates as an additional platform generates unique keyed seamlessly integrates within the
security layer within standard sequences for each user and overall cloud system workflow
cloud access protocols. It device. These act as Challenge- without interfering with other
incorporates DNA analysis Response (CR) elements, with modules, ensuring a smooth user
devices for on-demand key specific fragments disclosed to experience.
verification, integrated with user trigger DNA reproduction and
sign-on and device access fluorescence tagging for
requests. automated sequence readout.
Authentication Framework:
DNA Based Keys
1 Unique Keys
The CRYPTON DNA generator tool creates random 128-bit oligonucleotides
that serve as unique keys. These keys are fragmented and distributed across
user accounts and paired devices.

2 Reference Genome
The vast information density of the human genome allows for the encoding of
these keys within a minimal oligonucleotide footprint. This ensures efficient
key storage and transmission.

3 Biological PUFs
Key storage is achieved through biologically enabled Physical Unclonable
Functions (PUF). The unique sequence complexity of the DNA keys generates
distinct optical diffraction patterns, acting as a secure and tamper-proof
identifier.
DNA Pattern Matching Protocol
Authentication Process
When users attempt to access the cloud, specific DNA subsets linked to their profile activate the corresponding sequence-matched strands.

Fluorescence Response
These strands emit fluorescent optical signals during PCR amplification, providing a visual confirmation of authentication.

Color Code Verification


Users are granted access based on the accuracy of the fluorescence color codes emitted by the DNA strands. This protocol incorporates physical nanostructured
barcodes to enhance resilience against counterfeiting.

Optimized Testing
The DNA authentication process leverages microfluidics and faster PCR cycles, enabling rapid authentication decisions within 5 minutes. Built-in redundancy
addresses segmentation and partial hybridization issues.

Future Developments
Enzymatic logic gate platforms hold promise for enabling complex biological authentication circuits, further reducing execution time.
Algorithm 1: DNA-
Based User
Authentication
Step Description

1 Hashing User Credentials

2 DNA Encoding

3 Challenge Strand Generation

4 PCR Amplification

5 Fluorescence Detection

6 Authentication Decision
Algorithm 2: DNA One-Time Pad Encryption
Message Conversion XOR Encryption
The message is converted into a bit string and then Each message chunk is XORed with the
divided into fixed-length chunks (128 bits each). corresponding DNA pad, scrambling the message.

1 2 3 4

One-Time Pad Generation Encrypted Output


A random DNA sequence of the same length (128 The encrypted DNA chunks are concatenated to
bits) is generated, acting as a one-time pad. form a seemingly random noise pattern.
Algorithms 3 & 4: Device Validation and
Key Exchange
PCR-Based Device Validation DNA-Based Key Exchange
This algorithm uses DNA primers derived from optical PUF This protocol facilitates secure information exchange between
responses built into the device hardware. Each device's two cloud services using DNA cryptography. Each party
unique optical diffraction signature triggers the release of generates a random number (nonce), hashes it, encodes it as
complementary primers, enabling the identification of a DNA strand, and exchanges it with the other party. These
genuine devices through PCR amplification. nonces are then used to lock and unlock sensitive payload
strands, ensuring secure communication.
Discussion and Future Work:
Practical Limitations

Environmental Sensitivity
DNA analysis is susceptible to environmental factors such as temperature, pH, and ionic
properties. These factors must be addressed during implementation and testing.

Cost Considerations
The cost of DNA reagents, enzymes, and synthesis remains a challenge. However, mass
production and cost reductions in DNA sequencing offer future possibilities for wider adoption.

System Integration
Compatibility with various access devices, browsers, and middleware needs to be tested
extensively for seamless cloud integration.
Future Work: Addressing
Limitations
1 Enzyme Optimization
Developing new polymerase enzymes or hydrogels will enable customization of
biological processes for different environments.

2 Photonic Circuits
Photonic circuits embedded in DNA logic gate arrays will automate and
parallelize analytical workflows, improving efficiency and reducing processing
time.

3 Mobile Biosensors
On-demand authentication using mobile microfluidic biosensors will enable
convenient and secure access to cloud services.

4 Machine Learning Applications


Machine learning algorithms can enhance DNA primer design, cryptography, and
replication, further strengthening security measures.
Conclusion: A New Era of Security
DNA-based security systems have the potential to revolutionize data protection, offering unprecedented levels
of security and privacy. By combining advances in computing, nanofabrication, and synthetic biology, DNA
cryptography can usher in a new era of secure data management. Continued research and development in
this field will pave the way for practical applications and widespread adoption, transforming the landscape of
cybersecurity.
References
[1] D. A. Zebari, H. Haron, and S. R. M. Zeebaree, “Security issues in DNA based on data hiding: A
review,” International Journal of Applied Engineering Research, vol. 12, no. 24, pp. 15363–15377, 2017.
[2] A. Hazra, S. Ghosh, and S. Jash, “A Review on DNA Based Cryptographic Techniques,” Int. J. Netw.
Secur., vol. 20, no. 6, 2018.
[3] R. Bhat, N. R. Sunitha, and S. S. Iyengar, “A probabilistic public key encryption switching scheme for
secure cloud storage,” Int. J. Inf. Tecnol., vol. 15, pp. 675–690, 2023.
[4] S. Das and S. Namasudra, “A lightweight and anonymous mutual authentication scheme for medical
big data in distributed smart healthcare systems”, IEEE/ACM Transactions on Computational Biology and
Bioinformatics, 2022.
[5] G. Shrivastava, P. Kumar, D. Gupta, and J. J. P. C. Rodrigues “Privacy Issues of Android Application
Permissions: A Literature Review”, Transactions on Emerging Telecommunications Technologies, vol. 31,
no. 12, pp. 1-17, 2020.
[6] L. M. Adleman, “Molecular computation of solutions to combinatorial problems”, Science, vol. 266, no.
5187, pp. 1021-102, 1994.
[7] T. Kumar, S. Namasudra, and P. Kumar, “Providing data security using DNA computing in the cloud
computing environment”, International Journal of Web and Grid Services, 2023.
[8] M. Tahir, M. Sardaraz, Z. Mehmood, and S. Muhammad, “CryptoGA: A cryptosystem based on genetic
algorithm for cloud data security”, Cluster Computing, vol. 24, pp. 739–752, 2021.
[9] T. C. Yang, N.-W. Lo, H.-T. Liaw, and W. C. Wu, “A secure smart card authentication and authorization
framework using in multimedia cloud,” Multimedia Tools and Applications, vol. 76, no. 9, pp. 11715–
11737, 2016
THANK YOU
DNA-Based
Authentication
System: Questions
Kartik Gautam, Puneet Mishra, Akshat Jain, Hritvik
Bhatia
Two Marks Questions

1. What is DNA cryptography?


2. How does DNA enhance cloud computing security?
3. What is the purpose of the WHO-CDT method in DNA cryptography?
4. What are DNA oligonucleotide keys?
5. How does DNA cryptography compare to conventional methods?
6. What is the role of the PCR process in DNA authentication?
7. How does the DNA-based access control system work?
8. What is a DNA-based key exchange?
9. What is the challenge-response (CR) system in DNA authentication?
10. Why is DNA cryptography considered resistant to quantum
attacks?
Five Marks Questions (Part 1)
1. Describe the process of DNA pattern matching in cloud authentication.
2. How does DNA cryptography help prevent data leakage in cloud
environments?
3. Explain the use of DNA in multi-factor authentication (MFA) for cloud
computing.
4. What role does fluorescence play in DNA-based user authentication?
5. Discuss the advantages of using synthetic DNA in cloud security systems.
Five Marks Questions (Part 2)
6. How do molecular biochemistry and nanostructured barcodes enhance DNA
authentication?
7. What is the importance of DNA-based cryptographic keys in cloud
computing?
8. How does the CRYPTON DNA generator tool work for cloud security?
9. What are the challenges of implementing DNA-based authentication systems
in real-world scenarios?
10. Explain the DNA one-time pad encryption process.
Ten Marks Questions
1. How does the DNA authentication pipeline enhance cloud security?
2. Describe the significance of the WHO-CDT method in DNA
cryptography for cloud storage.
3. What is the role of PCR amplification in DNA-based cloud
authentication systems?
4. What future improvements can be made to DNA-based cryptographic
systems for cloud computing?
5. How does DNA cryptography protect against modern cyber threats in
cloud environments?

You might also like