ISSUE 90

24 January  2019

Article of the Month Around the World


DNA cryptography in cloud computing

Secure data transmission or sharing data through internet without exposing data to threats is a main concern of modern era. We share data over internet in formats like text, pictures and videos. While transferring data, we have to be sure that data we sent are not exposed to unauthorized threats and integrity of the content is not harmed.

To achieve this purpose many ciphering techniques or cryptographic methods are being used these days, we use these methods to hide or scramble data we share in a way that only the receiver will be able to access the content. One of the futuristic cryptographic methods that can be used is DNA Cryptography. DNA Cryptography uses molecular science and biotechnology to create safer, robust and efficient environment for data transmission. DNA cryptography can be seen in mobile networking and cloud computing.

IIn 2002, LeonardMax Adleman introduced DNA computing to the world. DNA cryptographic algorithms uses one-time pad and the key is obtained by using DNA bases.in order to increase security of the cipher text, DNA look up tables were also established.

DNA or deoxyribonucleic acid, stores all the information about body features of any organism. DNA is unique for each individual. The bases and bonding in DNA structure plays an important role in DNA computing and cryptography.

In DNA cryptography the data is secured either inside the DNA (in DNA microdots) or using DNA sequences to create encrypted texts which can only be broken if the correct sequence of DNA bases is known.

DNA cryptography solves weak spots problems in storing ciphers and helps to solve some primary NP problems giving hope in creating an unbreakable algorithm.

Cloud computing allows computer programs and stand-alone data to be transferred to a virtual server or the Web for easy user access. Cloud computing is considered a next-generation technology that has revolutionized the computer industry. Cloud computing provides users with a massive infrastructure to perform their tasks and store data. Cloud computing consists of two types of models, the service model (PaaS, SaaS, IaaS) and the deployment model (public, private, hybrid). Normally the cloud client does not want to work with a single cloud provider in due to compatibility issues availability problem and sometimes insider problem. They therefore use several cloud services according to their request. In the area of IT and computer security, application and service security is a more promising area of research. Cloud users transfer their applications and data to the cloud environment. It is therefore necessary that the security methods used in the cloud be better than the traditional methods because of the high security risks and issues. Unauthorized access to data, network and applications by an unauthorized person is the cause of the lack of security and protection of the cloud environment, which affects the productivity and growth of the organization. Determining the level of risk sustainability and focusing on reducing these risks is one of the most important parts of the cloud that cannot be disregarded by the cloud service provider. Cloud computing has some important features that surpass the functionality of traditional services and contribute to the growth of the contemporary IT sector.


As we all know today, data on the Internet is growing unlimitedly. Several serious problems are raised due to that and must be treated with care. Out of these, safety is one of the main concerns. Many organizations and individuals are now using cloud storage technology to back up and share their data over the Internet. Cloud systems are secured using various cryptographic technologies such as RSA, AES or HCC, etc. However, these technologies may breakdown in the future when the data to be encrypted is huge and bulky. DNA Computing can become practical when it is necessary to solve such huge data encryption problems, as DNA has been proven to be one of the hearty encryption data storage devices created by Mother Nature, which effectively provides information to our body and brain on various activities, etc. We will discuss here one of the possible ways to implement DNA-based cryptographic technique to encrypt cloud data, increase accuracy and reduce processing time.

DNA (deoxyribonucleic acid) is a kind of genetic material that helps to transfer information contained in living organisms, such as small organisms (viruses) to the complex (human). DNA is a double helix structure proposed by Watson and Crick. This DNA structure is made by a long chain of polymer called nucleotides. Each nucleotide composed of three essential components are nitrogenous base, sugar and phosphate. Nitrogen bases consist essentially of two types of pyrimidine and purine bases (cytosine, adenine, guanine and thymine).

Advances in technology and the increasing use of the Internet are improving the storage capacity of data as standalone storage devices or virtual storage devices. But this progress also poses some problems mainly related to data security. In cloud computing, we process a quantity of data tints stored in remote locations (virtual servers). Security is therefore a more important concern of cloud computing. Here we are working with a new idea to secure data on the cloud with the help of DNA cryptography.

Data security is a more promising area of the computer industry. Unlimited use of the Internet and the new technological invention are forcing people to think about the security of data or Internet data. In this article, a new approach to DNA cryptography to secure data in the cloud is discussed. However, less research has been done in the field of DNA cryptography.


Sammani Rajapaksha

is an undergraduate of the Sri Lanka Institute of information technology who is currently following Bachelor of Information Technology specializing in Cyber Security, currently, she is working as an Intern - Information Security Engineer at Sri Lanka CERT|CC

























1 Statistics on the Internet growth in Sri Lanka
2.The Dragon Research Group (DRG)
3.TSUBAME (Internet threat monitoring system) from JPCERT | CC
4.Shadowserver Foundation
5. Team Cymru

  Beware of Apple Support Phishing Scams


"...Phishing phone calls pretending to be from Apple are on the rise, KrebsOnSecurity reports.

The scam starts with an automated phone call, disguised with the company's logo, address and phone number.

The call will warn of a security breach and ask the victim to call back using a 1-866 phone number, different from the number the call appears to be coming from..."


Windows 7 users get fix for latest updating woe


"...The latest problem occurred on 8 January when enterprise users running Windows 7 or Windows Server 2008 R2 with a Key Management Service (KMS) started complaining on Microsoft�s TechNet forums and Reddit that they were seeing two errors, the first relating to licensing, the second networking....."


Intel reported to have a new 5GHz chip that�s literally priceless



'..If the $1,979 Core i9-9980XE isn't enough processor for you, Anandtech reports that Intel will soon have an even more expensive Core i9 processor: the i9-9990XE. But you won't be able to buy it, and Intel won't even have a price for the thing.....'

How was a credit card skimmer used to steal data from Newegg?



'...Security researchers claim the hackers behind last year's attack on British Airways, which affected 380,000 customers, also stole credit card data from online retailer Newegg using a credit card skimmer. How did the Magecart threat actors pull off this attack?..'

Google to yoink apps with an unauthorized Call Log or SMS habit from Android Play Store


Paul Bankhead, director of product management at Google, has told programmers that apps in the Play Store that want access to SMS or Call Logs will start being removed unless the ad-slinger has OK'd the given developer's justification.........'

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in December 2018


  Statistics - Sri Lanka CERT|CC

Ransomware attack comes with malicious ransom note

'..MalwareHunterTeam discovered the ransomware and the fact the malicious actors kindly offer several forms of payment to obtain the decrytption key, including PayPal. However, if the victim chooses PayPal and follows the link provided they will end up on a phishing page where their account login credentials are stolen. When the target hits send a clue becomes evident that something is amiss. Instead of going to PayPal the payment goes to http://ppyc-ve0rf.890m.com/s2[.]php, which is one of the few clues that something is amiss....'

Google Keep cheat sheet

"...Google Keep lets you create notes and to-do lists that sync across your computer and phone or tablet. It's remarkably handy in a variety of ways. You can tag and search all your notes so they�re easy to find later. You can share your notes with other users and collaborate on them....."
The cyber-attack that sent an Alaskan community back in time

�..In 2018, a remote Alaskan community�s infrastructure was hit by a malware attack which forced it offline. It was only then they realised how much they depended on computers.

Mozilla Kills Default Support for Adobe Flash in Firefox 69

."..Mozilla is disabling default support for Adobe�s Flash Player plugin in the latest upcoming version of its FireFox browser, marking the latest step in end-of-life for the infamous plugin......"

Notice Board

Training and Awareness Programmes - January  2019


Brought to you by: