scholarly journals A Collective Algorithmic ApproachFor Enhanced DNA Database Security

2013 ◽  
Vol 4 (1) ◽  
pp. 174-178
Author(s):  
Vijay Arputharaj J ◽  
Dr.R. Manicka Chezian

The proposed method is a mixture of several security methods namely digital authentication tag along with the data mining in the DNA database. Data mining in the area of human genetics, an important goal is to understand the mapping relationship between the individual variation in human DNA sequences and variability in various algorithms for database security issues, for mutation susceptibility and parental identification differences. This paper primarily deals with the advancement of genetic algorithm with proper security features in DNA Databases and it enhances the special features in DNA database security. Several security methods include encryption algorithms, higher, not as much of multifaceted with trouble-free to apply in DNA Databases, used for protected database. The Reverse Encryption algorithm to protect data,Advance Cryptography algorithm to resist data, also Advanced Encryption Standard (AES) is most preferable for security in DNA databases.

Acta Naturae ◽  
2016 ◽  
Vol 8 (2) ◽  
pp. 79-86 ◽  
Author(s):  
P. V. Elizar’ev ◽  
D. V. Lomaev ◽  
D. A. Chetverina ◽  
P. G. Georgiev ◽  
M. M. Erokhin

Maintenance of the individual patterns of gene expression in different cell types is required for the differentiation and development of multicellular organisms. Expression of many genes is controlled by Polycomb (PcG) and Trithorax (TrxG) group proteins that act through association with chromatin. PcG/TrxG are assembled on the DNA sequences termed PREs (Polycomb Response Elements), the activity of which can be modulated and switched from repression to activation. In this study, we analyzed the influence of transcriptional read-through on PRE activity switch mediated by the yeast activator GAL4. We show that a transcription terminator inserted between the promoter and PRE doesnt prevent switching of PRE activity from repression to activation. We demonstrate that, independently of PRE orientation, high levels of transcription fail to dislodge PcG/TrxG proteins from PRE in the absence of a terminator. Thus, transcription is not the main factor required for PRE activity switch.


Genetics ◽  
1986 ◽  
Vol 113 (4) ◽  
pp. 1077-1091
Author(s):  
John H Gillespie

ABSTRACT A statistical analysis of DNA sequences from four nuclear loci and five mitochondrial loci from different orders of mammals is described. A major aim of the study is to describe the variation in the rate of molecular evolution of proteins and DNA. A measure of rate variability is the statistic R, the ratio of the variance in the number of substitutions to the mean number. For proteins, R is found to be in the range 0.16 < R < 35.55, thus extending in both directions the values seen in previous studies. An analysis of codons shows that there is a highly significant excess of double substitutions in the first and second positions, but not in the second and third or first and third positions. The analysis of the dynamics of nucleotide evolution showed that the ergodic Markov chain models that are the basis of most published formulas for correcting for multiple substitutions are incompatible with the data. A bootstrap procedure was used to show that the evolution of the individual nucleotides, even the third positions, show the same variation in rates as seen in the proteins. It is argued that protein and silent DNA evolution are uncoupled, with the evolution at both levels showing patterns that are better explained by the action of natural selection than by neutrality. This conclusion is based primarily on a comparison of the nuclear and mitochondrial results.


Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


2021 ◽  
Vol 17 (1) ◽  
pp. 260-264
Author(s):  
Alexandru VULPE ◽  
Raluca ANDREI ◽  
Alexandru BRUMARU ◽  
Octavian FRATU

Abstract: With the development of mobile devices and the advent of smartphones, the Internet has become part of everyday life. Any category of information about weather, flight schedule, etc. it is just a click away from the keyboard. This availability of data has led to a continuous increase in connectivity between devices, from any corner of the world. Combining device connectivity with systems automation allows the collection of information, its analysis and implicitly decision-making on the basis of information. Their introduction and continued expansion of devices that communicate in networks (including the Internet) have made security issues very important devices as well as for users. One of the main methodologies that ensures data confidentiality is encryption, which protects data from unauthorized access, but at the cost of using extensive mathematical models. Due to the nature of IoT devices, the resources allocated to a device can be constrained by certain factors, some of which are related to costs and others to the physical limitations of the device. Ensuring the confidentiality of data requires the use of encryption algorithms for these interconnected devices, which provide protection while maintaining the operation of that device. The need for these types of algorithms has created conditions for the growth and development of the concept of lightweight encryption, which aim to find encryption systems that can be implemented on these categories of devices, with limited hardware and software requirements. The paper proposes a lightweight cryptographic algorithm implemented on a microcontroller system, comparing its performances with those of the already existing system (based on x86).


2020 ◽  
Vol 17 (3) ◽  
pp. 109 ◽  
Author(s):  
SESANTI BASUKI ◽  
NURHAJATI AA MATTJIK ◽  
SUWARSO SUWARSO ◽  
DESTA WIRNAS ◽  
SUDARSONO SUDARSONO

<p>ABSTRAK</p><p>Upaya untuk menurunkan kandungan nikotin merupakan salah satuprioritas utama penelitian tembakau. Nikotin adalah senyawa alkaloidutama berpotensi dikonversi menjadi senyawa nor-nikotin yang bersifatkarsinogen. Gen PMT sebagai penyandi enzim putresin n-metiltransferase(PMT) dan gen QPT - penyandi enzim quinolinat fosforibosiltransferase(QPT) merupakan dua gen kunci yang berperan penting pada proses bio-sintesis nikotin. Penelitian ini bertujuan untuk mengisolasi potongan genPMT dan QPT asal tembakau lokal Indonesia, mengkarakterisasi danmenganalisis runutan DNA-nya. Tahapan penelitian dimulai dengan me-rancang primer degenerate berdasarkan informasi yang ada di pangkalandata Bank Gen NCBI (National Centre for Biotechnology Information),mengamplifikasi PCR menggunakan templat DNA genomik tembakaulokal cv. Sindoro1, mengklon potongan DNA hasil PCR dan menentukanrunutan DNA-nya. Hasil penelitian menunjukkan dari dua belas pasangprimer degenerate yang dirancang, hanya dua pasang primer yang meng-hasilkan potongan DNA hasil amplifikasi PCR, yaitu pasangan primerPMt-7 (F &amp; R) untuk gen PMT dan primer QPt-3 (F &amp; R) untuk gen QPT.Setelah dilakukan penentuan runutan DNA-nya, amplikon yang didapatdari hasil PCR dengan pasangan primer PMt-7 sebesar 1418 bp, sedangkanuntuk primer QPt-3 sebesar 205 bp. Runutan DNA gen PMT dan gen QPTasal tembakau lokal cv. Sindoro1 mempunyai tingkat kesamaan yang ting-gi dengan gen PMT dan gen QPT asal tembakau lainnya yang ada dipangkalan data Bank Gen NCBI.</p><p>Kata kunci : Gen PMT, gen QPT, lintasan biosintesis nikotin, perunutanDNA, amplifikasi PCR, primer degenerate</p><p>ABSTRACT</p><p>Isolation of Genes encoding Putrescine N-Methyl-transferase and Quinolinat Phosphoribosyl transferasederived from Temanggung Tobacco Cultivar (Nicotianatabacum)</p><p>Reduction of nicotine content is one of the major objective intobacco research. Nicotine is the main alcaloid compound that potentiallycould be converted into a carcinogenic compound (nor-nicotine). The PMTgene encoding putrescine N-methyl transferase (PMT) and the QPT gene -encoding quinolinate phosphoribosyl transferase (QPT) are the two keyenzymes involved in nicotine biosynthesis. The objectives of this researchwere to isolate PMT and QPT gene fragments originated from Indonesianlocal tobacco, to characterize, and to analyze their DNA sequences. Theresearch activities included: degenerate primer design based oninformation available in the GenBank DNA Database NCBI (NationalCentre for Biotechnology Information), PCR amplification usingdegenerate primer and genomic DNA template of a local tobacco cv.Sindoro1, clone the PCR amplified products, and determine their DNAnucleotide sequences. Results of the experiment indicated that from 12degenerate primer pairs synthesized, only two were able to yield positivePCR amplified products. These primer pairs were PMt-7 (F &amp; R primers)for PMT and QPt-3 (F &amp; R primers) for QPT. After DNA sequencing, theamplified DNA product amplified using PMt-7 degenerate primer pairswere 1418 bp, while that using QPt-3 primer pairs were only 205 bp.Nucleotide sequences of PMT or QPT gene fragments originated fromlocal tobacco cv. Sindoro1 showed a high nucleotide sequences identity ascompared to that of the respective genes from other tobacco species thatwere available in the GenBank DNA Database NCBI.</p><p>Key words: PMT gene, QPT gene, nicotine biosynthetic pathways, DNAsequencing, PCR amplification, degenerate primer</p>


2020 ◽  
Vol 54 (2) ◽  
pp. 1-5
Author(s):  
Maristella Agosti ◽  
Maurizio Atzori ◽  
Paolo Ciaccia ◽  
Letizia Tanca

This paper reports on the 28th Italian Symposium on Advanced Database Systems (SEBD 2020), held online as a virtual conference from the 21st to the 24th of June 2020. The topics that were addressed in this edition of the conference were organized in the sessions: ontologies and data integration, anomaly detection and dependencies, text analysis and search, deep learning, noSQL data, trajectories and diffusion, health and medicine, context and ranking, social and knowledge graphs, multimedia content analysis, security issues, and data mining.


2011 ◽  
pp. 131-144
Author(s):  
Sridhar Asvathanarayanan

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.


Data Mining ◽  
2011 ◽  
pp. 350-365 ◽  
Author(s):  
Fay Cobb Payton

Recent attention has turned to the healthcare industry and its use of voluntary community health information network (CHIN) models for e-health and care delivery. This chapter suggests that competition, economic dimensions, political issues, and a group of enablers are the primary determinants of implementation success. Most critical to these implementations is the issue of data management and utilization. Thus, health care organizations are finding value as well as strategic applications to mining patient data, in general, and community data, in particular. While significant gains can be obtained and have been noted at the organizational level of analysis, much attention has been given to the individual, where the focal points have centered on privacy and security of patient data. While the privacy debate is a salient issue, data mining (DM) offers broader community-based gains that enable and improve healthcare forecasting, analyses, and visualization.


Sign in / Sign up

Export Citation Format

Share Document