scholarly journals Security Provisioning and Compression of Diverse Genomic Data based on Advanced Encryption Standard (AES) Algorithm

Author(s):  
Raveendra Gudodagi ◽  
R. Venkata Siva Reddy

Compression of genomic data has gained enormous momentum in recent years because of advances in technology, exponentially growing health concerns, and government funding for research. Such advances have driven us to personalize public health and medical care. These pose a considerable challenge for ubiquitous computing in data storage. One of the main issues faced by genomic laboratories is the 'cost of storage' due to the large data file of the human genome (ranging from 30 GB to 200 GB). Data preservation is a set of actions meant to protect data from unauthorized access or changes. There are several methods used to protect data, and encryption is one of them. Protecting genomic data is a critical concern in genomics as it includes personal data. We suggest a secure encryption and decryption technique for diverse genomic data (FASTA / FASTQ format) in this article. Since we know the sequenced data is massive in bulk, the raw sequenced file is broken into sections and compressed. The Advanced Encryption Standard (AES) algorithm is used for encryption, and the Galois / Counter Mode (GCM) algorithm, is used to decode the encrypted data. This approach reduces the amount of storage space used for the data disc while preserving the data. This condition necessitates the use of a modern data compression strategy. That not only reduces storage but also improves process efficiency by using a k-th order Markov chain. In this regard, no efforts have been made to address this problem separately, from both the hardware and software realms. In this analysis, we support the need for a tailor-made hardware and software ecosystem that will take full advantage of the current stand-alone solutions. The paper discusses sequenced DNA, which may take the form of raw data obtained from sequencing. Inappropriate use of genomic data presents unique risks because it can be used to classify any individual; thus, the study focuses on the security provisioning and compression of diverse genomic data using the Advanced Encryption Standard (AES) Algorithm.

Author(s):  
Taufik Hidayat ◽  
Rahutomo Mahardiko

Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.


TEKNOKOM ◽  
2019 ◽  
Vol 2 (2) ◽  
pp. 11-16
Author(s):  
Taufik Hidayat

Technology cloud computing is the revolution can share resources, services and data between users through a network of. Because millions of users use the same rights on the network to transfer data, and data to a vulnerable to attack security of the do not have the right of access or an intruder. System for security of data now concentrate on the provision of security the internet in data storage, cloud but little regard on security data while data transfer consider security as a very influential, the proposed concentrate on providing security to transfer data using a technique encryption. Research conducted show that the approach proposed boost security whole system make an intruder difficult to take the data in the transfer. To prevent it proposes encryption writer methods in cloud computing with algorithm AES (Advanced Encryption Standard) the process of security in the process of data transfers and data storage. The method is in search of the research uses systematic review, because method SLR able to give suggestions and opportunities for research on the future.


2021 ◽  
Vol 1 (02) ◽  
pp. 13
Author(s):  
Bagus Satrio Waluyo Poetro ◽  
Sam Farisa Chaerul Haviana ◽  
Arief Budiman

One way to measure the success of the academic process and achievement of student competence, is giving exams, from the smallest level namely daily tests, semester exams, to the highest level, namely the national exam. In an effort to maintain the security of exam question data, there is a data security method known as cryptography. In this research, a security system was designed that serves to protect exam questions so that data cannot be read by student before its time by using the Advanced Encryption Standard (AES) algorithm.  The AES algorithm is a type of symmetric algorithm where the encryption and decryption processes have the same key for the encryption and decryption processes. In the system that will be designed, the Caesar Cipher algorithm is used to form an additional key (seed) that is kept secret from the public. The results of this study indicate that AES encryption method can give results maximum so that the AES method can applied to virtual data storage system to protect the transmitted data.


2015 ◽  
Vol 713-715 ◽  
pp. 1448-1451
Author(s):  
Lin Lu ◽  
Yan Feng Zhang ◽  
Xiao Feng Li

The high-altitude missile and other special application occasions have requirements on image storage system, such as small size, high storage speed, low temperature resistance, etc. Commonly used image storage system in the market cannot meet such requirement. In the paper, real-time image storage system solutions on missile based on FPGA should be proposed. The system mainly consists of acquisition module and memory reading module. The whole system adopts FPGA as main control chip for mainly completing real-time decoding and acquisition on one path of PAL format video images, reading and writing of NandFlash chipset, erasure, bad block management and so on. The solution has passed various environmental tests with stable performance, large data storage capacity and easy expansion, which has been used in engineering practice.


2018 ◽  
Vol 24 (2) ◽  
pp. 152-170 ◽  
Author(s):  
Vinicius Francisco Rofatto ◽  
Marcelo Tomio Matsuoka ◽  
Ivandro Klein

Abstract: We present a numerical simulation method for designing geodetic networks. The quality criterion considered is based on the power of the test of data snooping testing procedure. This criterion expresses the probability of the data snooping to identify correctly an outlier. In general, the power of the test is defined theoretically. However, with the advent of the fast computers and large data storage systems, it can be estimated using numerical simulation. Here, the number of experiments in which the data snooping procedure identifies the outlier correctly is counted using Monte Carlos simulations. If the network configuration does not meet the reliability criterion at some part, then it can be improved by adding required observation to the surveying plan. The method does not use real observations. Thus, it depends on the geometrical configuration of the network; the uncertainty of the observations; and the size of outlier. The proposed method is demonstrated by practical application of one simulated leveling network. Results showed the needs of five additional observations between adjacent stations. The addition of these new observations improved the internal reliability of approximately 18%. Therefore, the final designed network must be able to identify and resist against the undetectable outliers - according to the probability levels.


2019 ◽  
Vol 3 (1) ◽  
pp. 30-37
Author(s):  
Bayu Prasetyo ◽  
Faiz Syaikhoni Aziz ◽  
Kamil Faqih ◽  
Wahyu Primadi ◽  
Roni Herdianto ◽  
...  

The development of technology from year to year is increasingly rapid and diverse. All systems that exist in human life began to be designed with technology that requires large data storage. Big Data technology began to be developed to accommodate very large data volumes, rapid data changes, and very varied. Developing countries are starting to use Big Data a lot in developing their systems, such as healthcare, agriculture, building, transportation, and various other fields. In this paper, it explains the development of Big Data applied to the sectors previously mentioned in developing countries and also the challenges faced by developing countries in the process of developing their systems.


2016 ◽  
Author(s):  
Dejan Pangercic ◽  
Daniel Marco ◽  
Florian Friesdorf ◽  
Marko Durkovic
Keyword(s):  


10.29007/x3tx ◽  
2019 ◽  
Author(s):  
Luka Daoud ◽  
Fady Hussein ◽  
Nader Rafla

Advanced Encryption Standard (AES) represents a fundamental building module of many network security protocols to ensure data confidentiality in various applications ranging from data servers to low-power hardware embedded systems. In order to optimize such hardware implementations, High-Level Synthesis (HLS) provides flexibility in designing and rapid optimization of dedicated hardware to meet the design constraints. In this paper, we present the implementation of AES encryption processor on FPGA using Xilinx Vivado HLS. The AES architecture was analyzed and designed by loop unrolling, and inner-round and outer-round pipelining techniques to achieve a maximum throughput of the AES algorithm up to 1290 Mbps (Mega bit per second) with very significant low resources of 3.24% slices of the FPGA, achieving 3 Mbps per slice area.


2021 ◽  
Author(s):  
Min Li ◽  
Junbiao Dai ◽  
Qingshan Jiang ◽  
Yang Wang

Abstract Current research on DNA storage usually focuses on the improvement of storage density with reduced gene synthesis cost by developing effective encoding and decoding schemes while lacking the consideration on the uncertainty in ultra long-term data storage and retention. Consequently, the current DNA storage systems are often not self-containment, implying that they have to resort to external tools for the restoration of the stored gene data. This may result in high risks in data loss since the required tools might not be available due to the high uncertainty in far future. To address this issue, we propose in this paper a self-contained DNA storage system that can make self-explanatory to its stored data without relying on any external tools. To this end, we design a specific DNA file format whereby a separate storage scheme is developed to reduce the data redundancy while an effective indexing is designed for random read operations to the stored data file. We verified through experimental data that the proposed self-contained and self-explanatory method can not only get rid of the reliance on external tools for data restoration but also minimize the data redundancy brought about when the amount of data to be stored reaches a certain scale.


Sign in / Sign up

Export Citation Format

Share Document