SlideShare a Scribd company logo
1 of 39
Done By
Archana G.R USN: 1ME13CS009
Asha U Shetty USN: 1ME13CS010
Deepika .A USN:1ME13CS019
Soujanya.K USN: 1ME13CS045
Under The Guideance Of
Mrs. NISHA CHOUDHARY
Asst. Professor, MSEC, Bangalore
Contents
 Abstract
 Introduction
 Problem statement
 Existing work
 Limitations of existing work
 System requirements
- Hardware requirements
- Software requirements
 System architecture
 Implementation
 Applications
 References
Abstract
 Cloud computing is the latest technology in the field of
distributed computing. It provides various online and on-
demand services for data storage, network services,
platform services and etc.
Many organizations are unenthusiastic to use cloud services
due to data security issues as the data resides on the cloud
services provider’s servers. To address this issue, there have
been several approaches applied by various researchers
worldwide to strengthen security of the stored data on cloud
computing.
 The Bi-directional DNA Encryption Algorithm (BDEA) is
one such data security techniques. However, the existing
technique focuses only on the ASCII character set,
ignoring the non-English user of the cloud computing.
Thus, this proposed work focuses on enhancing the BDEA
to use with the Unicode characters
KEY WORDS
 Cloud computing
 Bi directional DNA encryption algorithm
 Scoket programing
 Data security issues
DNA digital code
Introduction
 Distributed computing has as of late achieved prevalence and
formed into a noteworthy pattern in IT.
 We perform such a orderly audit of distributed computing and
clarify the specialized difficulties confronting in this paper. In
Public cloud the "Pay per utilize" model is utilized. In private
cloud, the figuring administration is disseminated for a solitary
society.
In Hybrid cloud, the registering administrations is devoured
both the private cloud administration and open cloud service.
vCloud registering has three sorts of administrations.
Programming as a Service (SaaS), in which client set one up
administration and keep running on a solitary cloud, then
different buyer can get to this administration according to on
request.
 Stage as a Service (PaaS), in which, it gives the
stage to make application and keeps up the
application. Framework as a Service (IaaS),
according to term recommend to gives the
information stockpiling, Network limit, lease
stockpiling, Server farms and so on. It is otherwise
called Hardware as a Service (HaaS)
Problem Statement
 As there is no proper organization of the data in the cloud
we need to segregate the data in the form of
methodological way .
 According to the cloud infrastructure data has to be
accessed with in processing time so cloud and data centers
has to be in sync modes.
 Coming to data transmission encryption should happen in
such a way that central repository should come to know
each side of client service models.
Problem Statement
Existing work
 Many organizations are unenthusiastic to use cloud
services due to data security issues as the data resides on
the cloud services provider’s servers.
 To address this issue, there have been several approaches
applied by various researchers worldwide to strengthen
security of the stored data on cloud computing.
Limitations of existing work
 The existing technique focuses only on the ASCII
character set ignoring the non-English user of the cloud
computing.
 The most serious limitation is the lack of the
authentication.
System requirements
 Hardware Requirements:
 RAM :- 4 GB (min)
 Hard Disk :- 20 GB
 Software Requirements:
 Operating system :- Windows XP or more.
 Coding Language :- core java
 Data Base :- Oracle 10g
Proposed system
 Previous section describes the study about the cloud
computing, basics of cloud computing and security
problems occurs in cloud. Then study some papers to
solve these security problems.
 Here in this paper, the Bi-serial DNA encryption
algorithm is performing, that providing the two level of
security.
Requirement analysis
 Service oriented architecture to frame the cloud.
 Jax web services with SOAP( simple object access
protocol).
 XML bundle of the parsers at both sides.
 Data decryption and encryptions at both client and service
sides.
 Central repository to keep track on keys and data
decryption on key and data.
Design methodology
Architecture
Design methodology
ROTA enhancement algorithm with this work
 Rota: This is a set of identical binary to strings(text) encoded models that
indicates binary data with ASCII text format by converting/translating to
RADIX-64 notations.
 Normally Rota models are widely used when ever there is a need of binary
data encoding that needed to be encoded and transferred over the networks
which are framed to deal with string based data. This step is to ensure that
data has to remain without alteration during broadcast. Rota is ordinarily
utilized as a part of a Rota encoding takes the first double information and
works on it by partitioning it into tokens of three bytes. A byte comprises of
eight bits, so Base64 takes 24bits altogether. These 3 bytes are then changed
over into four printable characters from the ASCII standard.
 The calculation's name Rota originates from the utilization of these 64
ASCII characters. The ASCII characters utilized for Base64 are the numbers
0-9, the letter sets 26 lowercase and 26 capitalized characters in addition to
two additional characters "+" and '/'.
Design methodology
ROTA enhancement algorithm with this work
 The initial step is to take the three bytes (24bit) of parallel information and
split it into four quantities of six bits. Since the ASCII standard
characterizes the utilization of seven bits,Rota just uses 6 bits (comparing to
2^6 = 64 characters) to guarantee the encoded information is printable and
none of the uncommon characters accessible in ASCII are utilized. The
ASCII change of 3-byte, 24-bit gatherings is rehashed until the entire
succession of unique information bytes is encoded. To guarantee the
encoded information can be appropriately printed and does not surpass the
farthest point.
 At the point when the quantity of bytes to encode is not distinct by 3 (that is,
if there are just a single or two bytes of contribution for the last 24-bit
square), then the accompanying activity is performed: Add additional bytes
with esteem zero so there are three bytes, and play out the change to base64.
On the off chance that there was just a single huge information byte, just the
initial two base64 digits are picked (12 bits), and if there were two critical
info bytes, the initial three base64 digits are picked (18 bits). "=" characters
may be added to make the last piece contain four base64 characters.
Implementation
 Source encryption
 Intimate
 Destination
 DNA algorithm
Implementation algorithm
• KEY COMBINATION
Here in this work, we are using ATGC as a key. Every bit
have 2 bits like A=00, T=01, G=10, and C=11 and by using
ATGC, key combinations is generated and give numbering
respectively that is given into table. From the table 2, we can
generate 64 bit key values and adding ATGC, we can
generate
72-bit key (64 bits of key combination and 8 bits of ATGC).
ATGC key is sending to the receiver side by using Diffie
Hellman key sharing algorithm. In this work, every time the
key value will be randomly changed.
KEY
COMBINATION
PATTERNS VALUES
DNA DIGITAL CODING
 In information science, the binary digital coding encoded by
 two state 0 or 1 and a combination of 0 and 1. But DNA
 digital coding can be encoded by four kind of base as shown
 in table 1. That is ADENINE (A) and THYMINE (T) or
 CYTOSINE (C) and GUANINE (G). There are possibly 4!
 =24 pattern by encoding format like (0123/ATGC) [4].
Binary value DNA digital coding
00 A
01 T
10 G
11 C
Encryption process
Encryption process
To understand the scenario of proposed work flow chart we
consider one example. In this the example plaintext is
આિશષ and performing encryption operation.
 Plaintext:
 આિશષ
 Unicode:
 આશિષ
 ASCII:
 u0e0u0aau02020u0e0u0aau0b6u0e0u0aau0bfu0e0
u0aau0b7
Initially specified then we need to browse the file to get
loaded.
 .
The alert box appears to get to know about the number of
destination ip address needed.
 .

The contents of the file then appears and the button appears to
apply DNA algorithm for the specified file.
Then DNA encoding will get started and gets completed

Applications
 It is use to secure the files in cloud in a high security by
using these codes.
 Files cannot by destroyed or erased .
 Data will be saved automatically permanently .
References
 [1] PrashantRewagad, YogitaPawar, “Use of Digital Signature with Diffie-
 Hellman Key Exchange and AES Encryption Algorithm to Enhance
 Data Security in Cloud Computing” 2013 International Conference on
 Communication System and Network Technologies (IEEE Computer
 Society).

 [2] Uma Somani, Kanika Lakhani, ManishaMundra, ”Implementing
 Digital Signature with RSA Encryption Algorithm to Enhance the Data
 Security of Cloud in Cloud Computing”-2010 IEEE 1st International
 Conference on Parallel, Distributed and Grid Computing (PDGC-
 2010).

 [3] Mehdi Hojabri& Mona Heidari“Union of RSA algorithm, Digital
 Signature and KERBEROS in Cloud Computing” International
 Conference on Software Technology and Computer Engineering
 (STACE-2012).

 [4] Ashish Prajapati, Amit Rathod “Enhancing security in cloud computing
 using Bi-Directional DNA Encryption Algorithm”, International
 Conference on Intelligent Computing, Communication & Devices.
 (ICCD-2014), Springer.
Literature survey
 Use of Digital Signature with Diffie- Hellman Key Exchange and AES
Encryption Algorithm to Enhance Data Security in Cloud Computing
 Abstract-
 Cloud computing is the relevant technology for this decade. It allows users
to store huge amount of data in cloud storage and use as and when required,
from anywhere in the world, through any kind of terminal equipment. Since
cloud computing relies on internet, cloud data will be forced to contend with
security issues like privacy, data security, confidentiality, and authentication.
In order to get rid of the same, a variety of encryption algorithms and
mechanisms are used. This paper, introduces use of hybrid cryptographic
algorithm blended with digital signature and Diffie Hellman key exchange..
The hybrid algorithm is designed using the combination of Advanced
Encryption Standard (AES) and Data Encryption Standard (DES)
encryption algorithm to protect confidentiality of data stored in cloud.
Even if the key in transmission is hacked, the facility of Diffie
Hellman key exchange render it useless, since key in transit is
of no use without user’s private key, which is confined only to
the legitimate user. This proposed architecture of hybrid
algorithm makes it tough for hackers to crack the security and
integrity of the system, thereby protecting data stored in cloud.
Improve Cloud Computing Security Using RSA
Encryption With Fermat’s Little Theorem
 Abstract: -
 Cloud computing (CC) is new technology for hosting and delivering
services over the Internet. It moves computing and data away from desktop
and portable PCs into large data centers.CC is a Internet based computing,
the entire data reside over a set of networked resources, this data can be
accessed through virtual machines like i phone, PC etc.CC help to reduce
hardware, maintenance and installation cost. But security and privacy is the
two major issues in this field and it prevent users for trusting CC. Cloud
computing share distributed resources in the open environment via the
network, so it makes security problems .To keep user data highly
confidentially against un-trusted servers and from malicious attacks is very
important. Encryption is the one of the most secured way using prevent
unauthorized access. Hence we provide a new method for Cloud Computing
Security by applying RSA algorithm and Fermat’s theorem together. Its help
to build a new trusted cloud computing environment. By using Fermat’s
theorem can be speed up the RSA Encryption.
Enhancing security in cloud computing using Bi-
Directional DNA Encryption Algorithm
 Abstract-
 Cloud computing is everywhere. Pick up any magazine or visit
almost any IT website or blog and you will be sure talk about
cloud computing. There are many security issues in cloud
computing like Confidentiality, Integrity and Availability
(CIA). There are many techniques for provide security in cloud
computing. Cloud computing performs large-scale and
Complex computing. Cloud computing provide flexible
solution for using users data everywhere. Here in this paper we
discuss about the types of securities and related security issues
in cloud environment and also her we discuss about the
security techniques to provide better solutions for enhancing
security in cloud computing.
Queries?


More Related Content

What's hot

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Message queue architecture
Message queue architectureMessage queue architecture
Message queue architectureMajdee Zoabi
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Footprinting
FootprintingFootprinting
FootprintingDuah John
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 

What's hot (20)

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Cia security model
Cia security modelCia security model
Cia security model
 
Spamming
SpammingSpamming
Spamming
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Message queue architecture
Message queue architectureMessage queue architecture
Message queue architecture
 
Data breach
Data breachData breach
Data breach
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Footprinting
FootprintingFootprinting
Footprinting
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cryptography
CryptographyCryptography
Cryptography
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 

Similar to IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx

Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdfComparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdfchWaqasZahid
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET Journal
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreIJMER
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryptionSachin Tripathi
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of commonIJNSA Journal
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 

Similar to IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx (20)

Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdfComparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx

  • 1. Done By Archana G.R USN: 1ME13CS009 Asha U Shetty USN: 1ME13CS010 Deepika .A USN:1ME13CS019 Soujanya.K USN: 1ME13CS045 Under The Guideance Of Mrs. NISHA CHOUDHARY Asst. Professor, MSEC, Bangalore
  • 2. Contents  Abstract  Introduction  Problem statement  Existing work  Limitations of existing work  System requirements - Hardware requirements - Software requirements  System architecture  Implementation  Applications  References
  • 3. Abstract  Cloud computing is the latest technology in the field of distributed computing. It provides various online and on- demand services for data storage, network services, platform services and etc.
  • 4. Many organizations are unenthusiastic to use cloud services due to data security issues as the data resides on the cloud services provider’s servers. To address this issue, there have been several approaches applied by various researchers worldwide to strengthen security of the stored data on cloud computing.  The Bi-directional DNA Encryption Algorithm (BDEA) is one such data security techniques. However, the existing technique focuses only on the ASCII character set, ignoring the non-English user of the cloud computing. Thus, this proposed work focuses on enhancing the BDEA to use with the Unicode characters
  • 5. KEY WORDS  Cloud computing  Bi directional DNA encryption algorithm  Scoket programing  Data security issues
  • 7. Introduction  Distributed computing has as of late achieved prevalence and formed into a noteworthy pattern in IT.  We perform such a orderly audit of distributed computing and clarify the specialized difficulties confronting in this paper. In Public cloud the "Pay per utilize" model is utilized. In private cloud, the figuring administration is disseminated for a solitary society.
  • 8. In Hybrid cloud, the registering administrations is devoured both the private cloud administration and open cloud service. vCloud registering has three sorts of administrations. Programming as a Service (SaaS), in which client set one up administration and keep running on a solitary cloud, then different buyer can get to this administration according to on request.  Stage as a Service (PaaS), in which, it gives the stage to make application and keeps up the application. Framework as a Service (IaaS), according to term recommend to gives the information stockpiling, Network limit, lease stockpiling, Server farms and so on. It is otherwise called Hardware as a Service (HaaS)
  • 9.
  • 10. Problem Statement  As there is no proper organization of the data in the cloud we need to segregate the data in the form of methodological way .  According to the cloud infrastructure data has to be accessed with in processing time so cloud and data centers has to be in sync modes.  Coming to data transmission encryption should happen in such a way that central repository should come to know each side of client service models.
  • 12. Existing work  Many organizations are unenthusiastic to use cloud services due to data security issues as the data resides on the cloud services provider’s servers.  To address this issue, there have been several approaches applied by various researchers worldwide to strengthen security of the stored data on cloud computing.
  • 13. Limitations of existing work  The existing technique focuses only on the ASCII character set ignoring the non-English user of the cloud computing.  The most serious limitation is the lack of the authentication.
  • 14. System requirements  Hardware Requirements:  RAM :- 4 GB (min)  Hard Disk :- 20 GB  Software Requirements:  Operating system :- Windows XP or more.  Coding Language :- core java  Data Base :- Oracle 10g
  • 15. Proposed system  Previous section describes the study about the cloud computing, basics of cloud computing and security problems occurs in cloud. Then study some papers to solve these security problems.  Here in this paper, the Bi-serial DNA encryption algorithm is performing, that providing the two level of security.
  • 16. Requirement analysis  Service oriented architecture to frame the cloud.  Jax web services with SOAP( simple object access protocol).  XML bundle of the parsers at both sides.  Data decryption and encryptions at both client and service sides.  Central repository to keep track on keys and data decryption on key and data.
  • 18. Design methodology ROTA enhancement algorithm with this work  Rota: This is a set of identical binary to strings(text) encoded models that indicates binary data with ASCII text format by converting/translating to RADIX-64 notations.  Normally Rota models are widely used when ever there is a need of binary data encoding that needed to be encoded and transferred over the networks which are framed to deal with string based data. This step is to ensure that data has to remain without alteration during broadcast. Rota is ordinarily utilized as a part of a Rota encoding takes the first double information and works on it by partitioning it into tokens of three bytes. A byte comprises of eight bits, so Base64 takes 24bits altogether. These 3 bytes are then changed over into four printable characters from the ASCII standard.  The calculation's name Rota originates from the utilization of these 64 ASCII characters. The ASCII characters utilized for Base64 are the numbers 0-9, the letter sets 26 lowercase and 26 capitalized characters in addition to two additional characters "+" and '/'.
  • 19. Design methodology ROTA enhancement algorithm with this work  The initial step is to take the three bytes (24bit) of parallel information and split it into four quantities of six bits. Since the ASCII standard characterizes the utilization of seven bits,Rota just uses 6 bits (comparing to 2^6 = 64 characters) to guarantee the encoded information is printable and none of the uncommon characters accessible in ASCII are utilized. The ASCII change of 3-byte, 24-bit gatherings is rehashed until the entire succession of unique information bytes is encoded. To guarantee the encoded information can be appropriately printed and does not surpass the farthest point.  At the point when the quantity of bytes to encode is not distinct by 3 (that is, if there are just a single or two bytes of contribution for the last 24-bit square), then the accompanying activity is performed: Add additional bytes with esteem zero so there are three bytes, and play out the change to base64. On the off chance that there was just a single huge information byte, just the initial two base64 digits are picked (12 bits), and if there were two critical info bytes, the initial three base64 digits are picked (18 bits). "=" characters may be added to make the last piece contain four base64 characters.
  • 20. Implementation  Source encryption  Intimate  Destination  DNA algorithm
  • 22. • KEY COMBINATION Here in this work, we are using ATGC as a key. Every bit have 2 bits like A=00, T=01, G=10, and C=11 and by using ATGC, key combinations is generated and give numbering respectively that is given into table. From the table 2, we can generate 64 bit key values and adding ATGC, we can generate 72-bit key (64 bits of key combination and 8 bits of ATGC). ATGC key is sending to the receiver side by using Diffie Hellman key sharing algorithm. In this work, every time the key value will be randomly changed.
  • 24. DNA DIGITAL CODING  In information science, the binary digital coding encoded by  two state 0 or 1 and a combination of 0 and 1. But DNA  digital coding can be encoded by four kind of base as shown  in table 1. That is ADENINE (A) and THYMINE (T) or  CYTOSINE (C) and GUANINE (G). There are possibly 4!  =24 pattern by encoding format like (0123/ATGC) [4]. Binary value DNA digital coding 00 A 01 T 10 G 11 C
  • 26. Encryption process To understand the scenario of proposed work flow chart we consider one example. In this the example plaintext is આિશષ and performing encryption operation.  Plaintext:  આિશષ  Unicode:  આશિષ  ASCII:  u0e0u0aau02020u0e0u0aau0b6u0e0u0aau0bfu0e0 u0aau0b7
  • 27.
  • 28. Initially specified then we need to browse the file to get loaded.  .
  • 29. The alert box appears to get to know about the number of destination ip address needed.  .
  • 30.
  • 31. The contents of the file then appears and the button appears to apply DNA algorithm for the specified file.
  • 32. Then DNA encoding will get started and gets completed 
  • 33. Applications  It is use to secure the files in cloud in a high security by using these codes.  Files cannot by destroyed or erased .  Data will be saved automatically permanently .
  • 34. References  [1] PrashantRewagad, YogitaPawar, “Use of Digital Signature with Diffie-  Hellman Key Exchange and AES Encryption Algorithm to Enhance  Data Security in Cloud Computing” 2013 International Conference on  Communication System and Network Technologies (IEEE Computer  Society).   [2] Uma Somani, Kanika Lakhani, ManishaMundra, ”Implementing  Digital Signature with RSA Encryption Algorithm to Enhance the Data  Security of Cloud in Cloud Computing”-2010 IEEE 1st International  Conference on Parallel, Distributed and Grid Computing (PDGC-  2010).   [3] Mehdi Hojabri& Mona Heidari“Union of RSA algorithm, Digital  Signature and KERBEROS in Cloud Computing” International  Conference on Software Technology and Computer Engineering  (STACE-2012).   [4] Ashish Prajapati, Amit Rathod “Enhancing security in cloud computing  using Bi-Directional DNA Encryption Algorithm”, International  Conference on Intelligent Computing, Communication & Devices.  (ICCD-2014), Springer.
  • 35. Literature survey  Use of Digital Signature with Diffie- Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing  Abstract-  Cloud computing is the relevant technology for this decade. It allows users to store huge amount of data in cloud storage and use as and when required, from anywhere in the world, through any kind of terminal equipment. Since cloud computing relies on internet, cloud data will be forced to contend with security issues like privacy, data security, confidentiality, and authentication. In order to get rid of the same, a variety of encryption algorithms and mechanisms are used. This paper, introduces use of hybrid cryptographic algorithm blended with digital signature and Diffie Hellman key exchange.. The hybrid algorithm is designed using the combination of Advanced Encryption Standard (AES) and Data Encryption Standard (DES) encryption algorithm to protect confidentiality of data stored in cloud.
  • 36. Even if the key in transmission is hacked, the facility of Diffie Hellman key exchange render it useless, since key in transit is of no use without user’s private key, which is confined only to the legitimate user. This proposed architecture of hybrid algorithm makes it tough for hackers to crack the security and integrity of the system, thereby protecting data stored in cloud.
  • 37. Improve Cloud Computing Security Using RSA Encryption With Fermat’s Little Theorem  Abstract: -  Cloud computing (CC) is new technology for hosting and delivering services over the Internet. It moves computing and data away from desktop and portable PCs into large data centers.CC is a Internet based computing, the entire data reside over a set of networked resources, this data can be accessed through virtual machines like i phone, PC etc.CC help to reduce hardware, maintenance and installation cost. But security and privacy is the two major issues in this field and it prevent users for trusting CC. Cloud computing share distributed resources in the open environment via the network, so it makes security problems .To keep user data highly confidentially against un-trusted servers and from malicious attacks is very important. Encryption is the one of the most secured way using prevent unauthorized access. Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat’s theorem together. Its help to build a new trusted cloud computing environment. By using Fermat’s theorem can be speed up the RSA Encryption.
  • 38. Enhancing security in cloud computing using Bi- Directional DNA Encryption Algorithm  Abstract-  Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.