{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:46:10Z","timestamp":1763451970064,"version":"3.45.0"},"reference-count":76,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:00:00Z","timestamp":1761609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>In this paper, we present a novel approach to securing data stored in the cloud by incorporating DNA\u2010based cryptography. This methodology, known as cloud\u2010based DNA cryptography (CBDC), offers a cutting\u2010edge solution to enhance cloud data security by leveraging DNA's intrinsic data storage capacity and robust encryption capabilities. The primary objective of this study is to propose a comprehensive framework encompassing the foundations, methodologies, and potential benefits of integrating genetic cryptography into cloud systems. The research aims to deepen understanding and provide meaningful insights into the practicality and effectiveness of DNA encryption for strengthening the security of cloud\u2010based data storage. Additionally, machine learning techniques are employed for anomaly detection and performance evaluation, enabling dynamic system monitoring and optimization. Experimental results demonstrate the superiority of CBDC in terms of time efficiency, compression ratio, and computational performance when compared to traditional encryption techniques. This study also identifies key research gaps through a comprehensive literature review and highlights future directions for integrating bio\u2010cryptographic models with intelligent, scalable cloud infrastructures.<\/jats:p>","DOI":"10.1002\/spy2.70126","type":"journal-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:59:05Z","timestamp":1761663545000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Cloud\u2010Based\n                    <scp>DNA<\/scp>\n                    Cryptography (\n                    <scp>CBDC<\/scp>\n                    ) for Enhanced Data Protection"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2874-5998","authenticated-orcid":false,"given":"Animesh","family":"Kairi","sequence":"first","affiliation":[{"name":"Institute of Engineering and Management  Kolkata India"}]},{"given":"Tapas","family":"Bhadra","sequence":"additional","affiliation":[{"name":"Aliah University  Kolkata India"}]}],"member":"311","published-online":{"date-parts":[[2025,10,28]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCT52966.2021.9670220"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.041"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277\u2010023\u201010323\u20105"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/21092"},{"key":"e_1_2_11_6_1","unstructured":"A.Gehani T.LaBean andJ.Reif \u201cDNA\u2010based Cryptography \u201d inAspects of Molecular Computing. Lecture Notes in Computer Science vol.2950 eds.N.Jonoska G.P\u0103un andG.Rozenberg(Springer 2003) https:\/\/doi.org\/10.1007\/978\u20103\u2010540\u201024635\u20100_12."},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(96)00058-3"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2017.8275972"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677\u2010023\u201000442\u20106"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598\u2010024\u201064419\u20104"},{"key":"e_1_2_11_11_1","first-page":"1189","volume-title":"2nd International Conference on Computing for Sustainable Global Development (INDIACom)","author":"Verma I.","year":"2015"},{"issue":"10","key":"e_1_2_11_12_1","first-page":"1975","article-title":"Enhancing Healthcare Image Security With DNA Cryptography in the IOT Environment","volume":"12","author":"Kairi A.","year":"2024","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677\u2010023\u201000425\u20107"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIUCC55081.2022.9781704"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijin.2021.08.001"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2016.7822003"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2017.083905"},{"issue":"2","key":"e_1_2_11_18_1","first-page":"763","article-title":"Secured Healthcare Ecosystem Using DNA Cryptography in 5G Network","volume":"23","author":"Kairi A.","year":"2023","journal-title":"China Petroleum Processing & Petrochemical Technology"},{"issue":"10","key":"e_1_2_11_19_1","first-page":"3597","article-title":"Decoding the Future Using A Novel DNA\u2010Based Cryptosystem","volume":"12","author":"Kairi A.","year":"2023","journal-title":"Journal of European Chemical Bulletin"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781351011419"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.06.006"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC52330.2021.9640708"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899928.1899939"},{"issue":"15","key":"e_1_2_11_24_1","first-page":"4159","article-title":"Enhancing Cybersecurity on Private Cloud Using NIST Cybersecurity Framework","volume":"97","author":"Mauritsius T.","year":"2019","journal-title":"Journal of Theoretical and Applied Information Technology"},{"volume-title":"Bio\u2010Inspired Computing: Theories and Applications. BIC\u2010TA 2019. Communications in Computer and Information Science","year":"2020","author":"Niu Y.","key":"e_1_2_11_25_1"},{"key":"e_1_2_11_26_1","unstructured":"Cloud Security Alliance \u201cThe Notorious Nine. Cloud Computing Top Threats in 2013 \u201d2013 Security https:\/\/cloudsecurityalliance.org\/."},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ic-ETITE47903.2020.62"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBERNIGERIA51635.2021.9428855"},{"issue":"2","key":"e_1_2_11_29_1","first-page":"7178","article-title":"A Survey on DNA Cryptographic Techniques, Challenges and Future Trends","volume":"19","author":"Turab N. M.","year":"2022","journal-title":"Webology"},{"volume-title":"Bio\u2010Crypto With DNA: Trends and Research Gaps","year":"2024","author":"Berezin I.","key":"e_1_2_11_30_1"},{"volume-title":"Post\u2010Quantum Models in DNA\u2010Based Cryptography","year":"2024","author":"Patel H.","key":"e_1_2_11_31_1"},{"volume-title":"DNA Mutation Codes for Secure Information Systems","year":"2024","author":"Ding Y.","key":"e_1_2_11_32_1"},{"volume-title":"Homomorphic Encryption Using DNA\u2010Based Algorithms","year":"2023","author":"Rupa C.","key":"e_1_2_11_33_1"},{"volume-title":"DNA Forensics and Cryptographic Applications","year":"2023","author":"Alshamrani M.","key":"e_1_2_11_34_1"},{"volume-title":"DNA\u2010Based Encryption Using XOR Operations","year":"2023","author":"Yuan X.","key":"e_1_2_11_35_1"},{"volume-title":"Quantum Computing Approaches in DNA Cryptography","year":"2023","author":"Rahman M.","key":"e_1_2_11_36_1"},{"volume-title":"DNA Steganography in Cloud\u2010Based Systems","year":"2023","author":"Ravi M.","key":"e_1_2_11_37_1"},{"volume-title":"Performance Evaluation of DNA\u2010Based Cryptographic Schemes","year":"2023","author":"Mishra A.","key":"e_1_2_11_38_1"},{"volume-title":"Integration of DNA Cryptography With IoT Systems","year":"2023","author":"Zhou J.","key":"e_1_2_11_39_1"},{"volume-title":"Multimodal Biometric Security Using DNA","year":"2023","author":"Hassan M.","key":"e_1_2_11_40_1"},{"volume-title":"AI\u2010Enabled DNA Encryption Models","year":"2023","author":"Farooq F.","key":"e_1_2_11_41_1"},{"volume-title":"Hybrid Cryptographic Model Combining DNA and AES","year":"2022","author":"Singh K.","key":"e_1_2_11_42_1"},{"volume-title":"Visual Cryptography Using DNA Sequence Encoding","year":"2022","author":"Lee Y.","key":"e_1_2_11_43_1"},{"volume-title":"DNA as a Cryptographic Tool: A Comprehensive Study","year":"2022","author":"Suyel N.","key":"e_1_2_11_44_1"},{"volume-title":"Cloud DNA Cryptography for Confidentiality","year":"2022","author":"Elminaam D. S. A.","key":"e_1_2_11_45_1"},{"volume-title":"Secure DNA\u2010Based Data Storage Methods","year":"2022","author":"Elminaam D. S. A.","key":"e_1_2_11_46_1"},{"volume-title":"Blockchain Integration With DNA Cryptography","year":"2022","author":"Ali R.","key":"e_1_2_11_47_1"},{"volume-title":"Selection Algorithms for DNA Sequences in Cryptography","year":"2022","author":"Mehta S.","key":"e_1_2_11_48_1"},{"volume-title":"A Systematic Review of DNA Cryptographic Frameworks","year":"2021","author":"Iliyasu A. M.","key":"e_1_2_11_49_1"},{"volume-title":"Cloud Integration Challenges in DNA Cryptography","year":"2021","author":"Abdukodir S.","key":"e_1_2_11_50_1"},{"volume-title":"DNA Cryptographic Models for Cloud Data Security","year":"2021","author":"Kumar A.","key":"e_1_2_11_51_1"},{"volume-title":"Techniques for Generating DNA Keys in Encryption","year":"2021","author":"Gupta S.","key":"e_1_2_11_52_1"},{"volume-title":"Robust DNA Watermarking Strategies","year":"2021","author":"Qin X.","key":"e_1_2_11_53_1"},{"volume-title":"Neural Network Integration in DNA Cryptography","year":"2021","author":"Tan X.","key":"e_1_2_11_54_1"},{"volume-title":"Applications of DNA Cryptography in e\u2010Health Systems","year":"2021","author":"Chen Y.","key":"e_1_2_11_55_1"},{"volume-title":"DNA Encryption Schemes With Performance Metrics","year":"2020","author":"Taluja R.","key":"e_1_2_11_56_1"},{"volume-title":"Energy\u2010Efficient Cryptography Using DNA Computing","year":"2020","author":"Baras A.","key":"e_1_2_11_57_1"},{"volume-title":"DNA Coding and Logical Computation in Cryptosystems","year":"2020","author":"Zhang F.","key":"e_1_2_11_58_1"},{"volume-title":"A Hybrid Model of DNA Cryptography","year":"2020","author":"Li B.","key":"e_1_2_11_59_1"},{"volume-title":"Sequence Rule Design for DNA Encryption","year":"2020","author":"Wang H.","key":"e_1_2_11_60_1"},{"key":"e_1_2_11_61_1","doi-asserted-by":"publisher","DOI":"10.1002\/cbic.202400670"},{"key":"e_1_2_11_62_1","first-page":"1093","article-title":"A Review of DNA\u2010Based Cryptographic Techniques","volume":"20","author":"Hazra R.","year":"2018","journal-title":"International Journal of Network Security"},{"volume-title":"Scalability Challenges in DNA Cryptographic Systems","year":"2018","author":"Namasudra S.","key":"e_1_2_11_63_1"},{"volume-title":"The Need for DNA Cryptography: A Review","year":"2017","author":"Shanmugasundaram M.","key":"e_1_2_11_64_1"},{"volume-title":"DNA Encryption Methods for Data Privacy","year":"2017","author":"Bing Z.","key":"e_1_2_11_65_1"},{"volume-title":"Advances in DNA Storage Technologies and Implications for Security","year":"2015","author":"Indu S.","key":"e_1_2_11_66_1"},{"key":"e_1_2_11_67_1","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.201811_20(6).10"},{"key":"e_1_2_11_68_1","first-page":"1","volume-title":"2019 5th International Conference on Computing Sciences (ICCS)","author":"Singh S. K.","year":"2019"},{"key":"e_1_2_11_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-3594-5_1"},{"key":"e_1_2_11_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0303-2647(00)00083-6"},{"key":"e_1_2_11_71_1","first-page":"1","volume-title":"IEEE INFOCOM 2017\u2014IEEE Conference on Computer Communications","author":"Wang B.","year":"2017"},{"issue":"3","key":"e_1_2_11_72_1","first-page":"44","article-title":"DNA\u2010Based Data Encryption and Hiding Using Playfair and Insertion Techniques","volume":"2","author":"Auto A.","year":"2012","journal-title":"Journal of Communications and Computer Engineering"},{"key":"e_1_2_11_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITECHN.2016.7860208"},{"key":"e_1_2_11_74_1","doi-asserted-by":"publisher","DOI":"10.5120\/17094\u20107634"},{"key":"e_1_2_11_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2005.01.004"},{"key":"e_1_2_11_76_1","first-page":"106","volume-title":"An Enhanced DNA Sequence Table for Improved Security and Reduced Computational Complexity of DNA Cryptography","author":"Maria I.","year":"2020"},{"key":"e_1_2_11_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMENTech65115.2025.10959556"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:42:52Z","timestamp":1763451772000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,28]]},"references-count":76,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70126"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70126","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,10,28]]},"assertion":[{"value":"2025-02-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70126"}}