Search In this Thesis
   Search In this Thesis  
العنوان
A proposed model for secure data storage in the cloud using DNA and Chaos Cryptography.
المؤلف
Mousa,Menna Allah Wafik .
هيئة الاعداد
باحث / Menna Allah Wafik Mousa
مشرف / Mohamed Abdelfattah Awad
مشرف / Diaa Salama Abd Elminaam
مناقش / Tariq Ahmed AL-Shishtawy
مناقش / Maher Abd Elmontaleb
الموضوع
Information Security . Software Security . Network Security . Cryptography Algorithms. Cloud Computing Security. Digital image Encryption .
تاريخ النشر
2023.
عدد الصفحات
97 p ;
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Information Systems
تاريخ الإجازة
1/4/2023
مكان الإجازة
جامعة بنها - كلية الحاسبات والمعلومات - نظم المعلومات
الفهرس
Only 14 pages are availabe for public view

from 117

from 117

Abstract

The advancement of technology has made everything accessible, including socializing, banking, shopping, and other activities. However, there may be some drawbacks to this. Today, the more we rely on internet transactions and communications, the more vulnerable we are to fraud and extortion by parties. As a result, a secure transformation of information or data is required. Researchers in the field of cryptography have been working on different methods to encrypt data for decades, whether it be an image, text, audio file, or any other type of data that has to be transferred via an insecure channel. Thus, cryptography develops into an intriguing and vital discipline for data security in the current day.
There are a number of powerful algorithms for textual data encryption, including Blowfish, Advanced Encryption Standard (AES) and DES (Data Encryption Standard), but these are deemed unsuitable for images due to the high correlation between the data present in an image’s pixels.
As a result, strengthening security measures is crucial. This is why we offered our plan, which has shown its efficacy and anonymity by the results obtained. We introduce a unique encryption technique for cloud-sensitive information security in this study. The data owner encrypts the sensitive information on the client side before transferring it to a web-based cloud storage provider. Because of its great speed, acceptable computation, and good security, the Chaos algorithm for encryption is deemed good. The initial conditions of this map are incredibly important. We’ve also used DNA encoding in this study, which helps to make encryption significantly more complicated and random. The technique of encoding pixel values into a DNA sequence of nucleic acid bases A, T, G, and C is known as DNA encoding. In order to obtain a secure encrypted image, we proposed a new approach that uses chaotic logistic mapping and DNA encoding.
This model contains three stages, According to the first stage, a plain image is encoded by a random DNA rule. Second, based on two single-dimensional chaotic logistic maps, two pseudo-random number sequences are generated. Third, random sequences of the second step will be encoded using the same random DNA rule as the first step. Finally, the DNA addition operation will be executed on the result of the first and third steps.
According to the second stage encoded image pixels which are the result of the first stage, an XOR operation will be performed between them and new sequences generated from the new 1-D logistic map.
According to the final stage encoded image’s pixels which are the result of the second iteration an XOR operation will be performed between them and new random key values. Finally, we get the final encrypted image. This encryption scheme can be executed for color and grayscale images.
A series of experiments on several test images were used to verify the efficacy of the suggested technique. In comparison to prior existing schemes, the numerical results show that the suggested algorithm works incredibly well and gives better encryption results despite the larger key sensitivity. . The suggested method appears to have good resistance to various types of attacks, according to the performance evaluation. For all encrypted images, the technique achieves information entropy levels of little over 7.99. The technique also achieves NPCR values above 99%, Correlation Coefficient values for the encrypted pictures near to 0, and certain UACI values below the benchmark of 33.3% but close to it. The suggested method yields a large key space value which equals .