SlideShare a Scribd company logo
DATA STORAGE IN
DNA
Presented By-
Aditya Nag
BCA
Inspiria Knowledge Campus
CONTENTS
A brief introduction on data storage and DNA storage
INTRODUCTION
01
Includes a brief explanation about DNA and Digital Storage in
DNA .
WHAT IS DNA?
02
Includes Methods, Picture explanation, Codes for encrypting
data, Secret algorithm, Advantages, Disadvantages.
HOW IS DATASTORED IN
DNA?03
.
CONCLUSION04
INTRODUCTION
INTRODUCTION
1. The demand for data storage devices is increasing day by day as more and more
data is generated every day.
2. As the data increases, the current data storage technology would not be
enough to store data in future as data is growing every day.
3. New York Genome Center have come up with a new way to encode digital data in
DNA to create the highest density large scale data storage scheme ever invented.
4. capable of storing 215 petabytes (215 million gigabytes) in a single gram of
DNA(It means it could store every bit of datum ever recorded by humans in a
container about the size and weight of a couple of pickup trucks) and it could
potentially last for hundreds of thousands of years.
WHAT IS DNA?
WHAT IS DNA?
Deoxyribonucleic
acid ( DNA) is a molecule that carries the
genetic information that used in thegrowth,
development, of all livingorganisms.
The two DNA strands are called
polynucleotides since they are composed of
simpler monomer units called nucleotides.
Each nucleotide is composed of one of four
nitrogen-containing nucleobases — cytosine
(C), guanine (G), adenine (A) or thymine (T).
D I G I T A L
STORAGE IN DNA
• DNA digital data storage refers to any process to
store digital data in the base sequence of DNA.
• This technology uses artificial DNA made using
commercially available oligonucleotide synthesis
machines for storage and DNA sequencing
machines for retrieval.
• This type of storage system is more compact than
current magnetic tape or hard drive storage systems
due to the data density of the DNA.
• Currently it was reported that in 1gram of DNA 215
petabytes (215 million gigabytes) could be stored.
HOW IS DATA
STORED IN DNA?
DATA
STORED
IN DNA
How is Data stored in DNA
further these ATGC
sequences are synthesized
into DNA molecules. And
to read this information
back from DNA,
sequencing of DNA
fragments is done by using
various algorithms
an algorithm called a DNA
Fountain which randomly
packaged the strings into
droplets,
In most of the techniques
the random access of the
data is possible.
In all methods, firstly the
information is converted
into digital form if not.
. Various encoding
techniques are also used in
data storing in DNA, like
Huffman coding..
The data is converted into
binary codes, this process
is called as binarization and
these binary codes are
further converted into A, T,
G, C sequence with the
help of a device, and this
process of conversion is
called as DNA encoding.
DNA
1
2
3
4
5
6
Huffman
Coding(varying
the length of
symbols used for
representing a
character)
The Comma
Code(Frames
are separated
with comma’s)
The
Alternating
Code
Comma-Free
Code(Frames
are not
separated with
comma’s)
Improved
Huffman
Coding
Scheme
DNA secret
writing
algorithm
DNA secret writing algorithm
• Secret writing is used to prevent illegal access of information
by unauthorized parties.
• Cryptography and steganography are two methods used for
secret writing.
• One Time Pad (OTP) generated keys are used as
encryption key.
ADVANTAGES
• It is ultra compact
• It can last hundreds of thousands of
years if kept in a cool, dry place.
• As long as human societies are
reading and writing DNA, they will be
able to decode it.
• DNA won’t degrade over time like
cassette tapes and CDs, and it won’t
become obsolete.
DISADVANTAGES
I
High cost.
Many types of
errors are
associated
with the
current
machines
dealing with
DNA.
.
DNA is significantly harder
and slower to read than
conventional computer
transistors i.e., in terms of
access speed it is actually
less RAM-like than our
average computer SSD or
spinning magnetic hard-
drive.
Time required to rebuild the
needed DNA sequence; need
to update all the files when
the reference sequence is
changed
CONCLUSION
As DNA can retain data
for millions of years, it is
possible to store data for
a long time.
Byusing DNA
multiplication, we can
create number of
copies of important data
and can be distributed
to servers
Thus, using DNA for
data storage, it is
possible to store huge
amount of data in very
less size.
Parallel reading of files
is also possible enabling
users to read multiple
files at the same time.
Thank You

More Related Content

What's hot

Dna digital data storage
Dna digital data storageDna digital data storage
Dna digital data storage
Maram Aniruddha
 
DNA Storage
DNA StorageDNA Storage
DNA Storage
Sayan Majumdar
 
Dna storage
Dna storageDna storage
Dna storage
CareerIn
 
DNA STORAGE
 DNA STORAGE DNA STORAGE
DNA STORAGE
syed Farhan Rizvi
 
Genetic data storage
Genetic data storageGenetic data storage
Genetic data storage
Rahul Urmaliya
 
Dna ppt
Dna pptDna ppt
DNA storage by Anushka jha
DNA storage by Anushka jhaDNA storage by Anushka jha
DNA storage by Anushka jha
Anushka Jha
 
Karin Strauss - DNA Storage, July 2016
Karin Strauss - DNA Storage, July 2016Karin Strauss - DNA Storage, July 2016
Karin Strauss - DNA Storage, July 2016
Seattle DAML meetup
 
DNA as memory storage device
DNA as memory storage deviceDNA as memory storage device
DNA as memory storage device
Kiran Gajare
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
Mayukh Maitra
 
Crypt Sequence DNA
Crypt Sequence DNACrypt Sequence DNA
Crypt Sequence DNA
IOSR Journals
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
Alexander Decker
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
AM Publications
 
Dna chip with nitin
Dna chip with nitinDna chip with nitin
Dna chip with nitin
NitinMauryaKashipur
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
IRJET Journal
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...
Sajedul Karim
 

What's hot (19)

Dna digital data storage
Dna digital data storageDna digital data storage
Dna digital data storage
 
DNA Storage
DNA StorageDNA Storage
DNA Storage
 
Dna storage
Dna storageDna storage
Dna storage
 
DNA STORAGE
 DNA STORAGE DNA STORAGE
DNA STORAGE
 
Genetic data storage
Genetic data storageGenetic data storage
Genetic data storage
 
Dna ppt
Dna pptDna ppt
Dna ppt
 
DNA storage by Anushka jha
DNA storage by Anushka jhaDNA storage by Anushka jha
DNA storage by Anushka jha
 
DNA as Storage Medium
DNA as Storage MediumDNA as Storage Medium
DNA as Storage Medium
 
Karin Strauss - DNA Storage, July 2016
Karin Strauss - DNA Storage, July 2016Karin Strauss - DNA Storage, July 2016
Karin Strauss - DNA Storage, July 2016
 
DNA as memory storage device
DNA as memory storage deviceDNA as memory storage device
DNA as memory storage device
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
 
Crypt Sequence DNA
Crypt Sequence DNACrypt Sequence DNA
Crypt Sequence DNA
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
 
Dna chip with nitin
Dna chip with nitinDna chip with nitin
Dna chip with nitin
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...
 

Similar to Datastorage in DNA

DNA digital data storage.pptx
DNA digital data storage.pptxDNA digital data storage.pptx
DNA digital data storage.pptx
Muthayammal Engineering College
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
ChandniA5
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation
Aditya Nag
 
Dna tech
Dna techDna tech
Dna computing
Dna computing Dna computing
Dna computing
busyking03
 
DATA_STORAGgghhhhhuygjkjggghE_IN_DNA.pptx
DATA_STORAGgghhhhhuygjkjggghE_IN_DNA.pptxDATA_STORAGgghhhhhuygjkjggghE_IN_DNA.pptx
DATA_STORAGgghhhhhuygjkjggghE_IN_DNA.pptx
eternalisone
 
Dna computing
Dna computingDna computing
Dna computing
Deevena Dayaal
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
Sajedul Karim
 
dna-digital-data-storage_compress.pdf
dna-digital-data-storage_compress.pdfdna-digital-data-storage_compress.pdf
dna-digital-data-storage_compress.pdf
AzimGamer1
 
DNA Computing
DNA ComputingDNA Computing
C010521418
C010521418C010521418
C010521418
IOSR Journals
 
DNA computing.pptx
DNA computing.pptxDNA computing.pptx
DNA computing.pptx
Kushal150906
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
IRJET Journal
 
Report dna
Report dnaReport dna
Report dna
DrAliKMattar
 
Hafiz sarfraz ali presentation final
Hafiz sarfraz ali presentation finalHafiz sarfraz ali presentation final
Hafiz sarfraz ali presentation final
Raza Umer
 
Dna synopsis
Dna synopsisDna synopsis
Dna synopsis
ravigoyal44
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
DNA Computing
DNA ComputingDNA Computing
DNA Computing
RAJAT GUPTA
 

Similar to Datastorage in DNA (20)

DNA digital data storage.pptx
DNA digital data storage.pptxDNA digital data storage.pptx
DNA digital data storage.pptx
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation
 
Dna tech
Dna techDna tech
Dna tech
 
Dna computing
Dna computing Dna computing
Dna computing
 
DATA_STORAGgghhhhhuygjkjggghE_IN_DNA.pptx
DATA_STORAGgghhhhhuygjkjggghE_IN_DNA.pptxDATA_STORAGgghhhhhuygjkjggghE_IN_DNA.pptx
DATA_STORAGgghhhhhuygjkjggghE_IN_DNA.pptx
 
Dna computing
Dna computingDna computing
Dna computing
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
dna-digital-data-storage_compress.pdf
dna-digital-data-storage_compress.pdfdna-digital-data-storage_compress.pdf
dna-digital-data-storage_compress.pdf
 
DNA Computing
DNA ComputingDNA Computing
DNA Computing
 
C010521418
C010521418C010521418
C010521418
 
DNA computing.pptx
DNA computing.pptxDNA computing.pptx
DNA computing.pptx
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
Report dna
Report dnaReport dna
Report dna
 
Hafiz sarfraz ali presentation final
Hafiz sarfraz ali presentation finalHafiz sarfraz ali presentation final
Hafiz sarfraz ali presentation final
 
Dna synopsis
Dna synopsisDna synopsis
Dna synopsis
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
DNA Computing
DNA ComputingDNA Computing
DNA Computing
 

More from Aditya Nag

Customer Experience in a SaaS business
Customer Experience in a SaaS businessCustomer Experience in a SaaS business
Customer Experience in a SaaS business
Aditya Nag
 
Home Security System using Arduino & GSM
Home Security System using Arduino & GSM Home Security System using Arduino & GSM
Home Security System using Arduino & GSM
Aditya Nag
 
Application Of Python in Medical Science
Application Of Python in Medical ScienceApplication Of Python in Medical Science
Application Of Python in Medical Science
Aditya Nag
 
Insync
Insync Insync
Insync
Aditya Nag
 
How To Make Your Windows Fast
How To Make Your Windows Fast How To Make Your Windows Fast
How To Make Your Windows Fast
Aditya Nag
 
Documentation on stress management
Documentation on stress managementDocumentation on stress management
Documentation on stress management
Aditya Nag
 
Stress Management for Students
Stress Management for StudentsStress Management for Students
Stress Management for Students
Aditya Nag
 
Quiz app android ppt
Quiz app android pptQuiz app android ppt
Quiz app android ppt
Aditya Nag
 
Quiz app (android) Documentation
Quiz app (android) DocumentationQuiz app (android) Documentation
Quiz app (android) Documentation
Aditya Nag
 
Sentiment Analysis
Sentiment AnalysisSentiment Analysis
Sentiment Analysis
Aditya Nag
 
Datastorage in DNA
Datastorage in DNADatastorage in DNA
Datastorage in DNA
Aditya Nag
 
5 g
5 g5 g

More from Aditya Nag (12)

Customer Experience in a SaaS business
Customer Experience in a SaaS businessCustomer Experience in a SaaS business
Customer Experience in a SaaS business
 
Home Security System using Arduino & GSM
Home Security System using Arduino & GSM Home Security System using Arduino & GSM
Home Security System using Arduino & GSM
 
Application Of Python in Medical Science
Application Of Python in Medical ScienceApplication Of Python in Medical Science
Application Of Python in Medical Science
 
Insync
Insync Insync
Insync
 
How To Make Your Windows Fast
How To Make Your Windows Fast How To Make Your Windows Fast
How To Make Your Windows Fast
 
Documentation on stress management
Documentation on stress managementDocumentation on stress management
Documentation on stress management
 
Stress Management for Students
Stress Management for StudentsStress Management for Students
Stress Management for Students
 
Quiz app android ppt
Quiz app android pptQuiz app android ppt
Quiz app android ppt
 
Quiz app (android) Documentation
Quiz app (android) DocumentationQuiz app (android) Documentation
Quiz app (android) Documentation
 
Sentiment Analysis
Sentiment AnalysisSentiment Analysis
Sentiment Analysis
 
Datastorage in DNA
Datastorage in DNADatastorage in DNA
Datastorage in DNA
 
5 g
5 g5 g
5 g
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Datastorage in DNA

  • 1. DATA STORAGE IN DNA Presented By- Aditya Nag BCA Inspiria Knowledge Campus
  • 2. CONTENTS A brief introduction on data storage and DNA storage INTRODUCTION 01 Includes a brief explanation about DNA and Digital Storage in DNA . WHAT IS DNA? 02 Includes Methods, Picture explanation, Codes for encrypting data, Secret algorithm, Advantages, Disadvantages. HOW IS DATASTORED IN DNA?03 . CONCLUSION04
  • 4. INTRODUCTION 1. The demand for data storage devices is increasing day by day as more and more data is generated every day. 2. As the data increases, the current data storage technology would not be enough to store data in future as data is growing every day. 3. New York Genome Center have come up with a new way to encode digital data in DNA to create the highest density large scale data storage scheme ever invented. 4. capable of storing 215 petabytes (215 million gigabytes) in a single gram of DNA(It means it could store every bit of datum ever recorded by humans in a container about the size and weight of a couple of pickup trucks) and it could potentially last for hundreds of thousands of years.
  • 6. WHAT IS DNA? Deoxyribonucleic acid ( DNA) is a molecule that carries the genetic information that used in thegrowth, development, of all livingorganisms. The two DNA strands are called polynucleotides since they are composed of simpler monomer units called nucleotides. Each nucleotide is composed of one of four nitrogen-containing nucleobases — cytosine (C), guanine (G), adenine (A) or thymine (T).
  • 7. D I G I T A L STORAGE IN DNA • DNA digital data storage refers to any process to store digital data in the base sequence of DNA. • This technology uses artificial DNA made using commercially available oligonucleotide synthesis machines for storage and DNA sequencing machines for retrieval. • This type of storage system is more compact than current magnetic tape or hard drive storage systems due to the data density of the DNA. • Currently it was reported that in 1gram of DNA 215 petabytes (215 million gigabytes) could be stored.
  • 8. HOW IS DATA STORED IN DNA? DATA STORED IN DNA
  • 9. How is Data stored in DNA further these ATGC sequences are synthesized into DNA molecules. And to read this information back from DNA, sequencing of DNA fragments is done by using various algorithms an algorithm called a DNA Fountain which randomly packaged the strings into droplets, In most of the techniques the random access of the data is possible. In all methods, firstly the information is converted into digital form if not. . Various encoding techniques are also used in data storing in DNA, like Huffman coding.. The data is converted into binary codes, this process is called as binarization and these binary codes are further converted into A, T, G, C sequence with the help of a device, and this process of conversion is called as DNA encoding. DNA 1 2 3 4 5 6
  • 10.
  • 11. Huffman Coding(varying the length of symbols used for representing a character) The Comma Code(Frames are separated with comma’s) The Alternating Code Comma-Free Code(Frames are not separated with comma’s) Improved Huffman Coding Scheme DNA secret writing algorithm
  • 12. DNA secret writing algorithm • Secret writing is used to prevent illegal access of information by unauthorized parties. • Cryptography and steganography are two methods used for secret writing. • One Time Pad (OTP) generated keys are used as encryption key.
  • 13. ADVANTAGES • It is ultra compact • It can last hundreds of thousands of years if kept in a cool, dry place. • As long as human societies are reading and writing DNA, they will be able to decode it. • DNA won’t degrade over time like cassette tapes and CDs, and it won’t become obsolete.
  • 14. DISADVANTAGES I High cost. Many types of errors are associated with the current machines dealing with DNA. . DNA is significantly harder and slower to read than conventional computer transistors i.e., in terms of access speed it is actually less RAM-like than our average computer SSD or spinning magnetic hard- drive. Time required to rebuild the needed DNA sequence; need to update all the files when the reference sequence is changed
  • 15. CONCLUSION As DNA can retain data for millions of years, it is possible to store data for a long time. Byusing DNA multiplication, we can create number of copies of important data and can be distributed to servers Thus, using DNA for data storage, it is possible to store huge amount of data in very less size. Parallel reading of files is also possible enabling users to read multiple files at the same time.