IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 133- 136

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Techniques for DNA database security: A Review Swati M.Chandurkar1, Dr. Sunil R. Gupta2 Computer Science and Engg. Prof. Ram Meghe Institute Of Tech. and Research, Badnera, Amravati, Maharashtra, India. [email protected] 2

Assistant Professor, Computer Science and Engg. Prof. Ram Meghe Institute Of Tech. and Research, Badnera, Amravati,Maharashtra, India. [email protected] Abstract

From last few years DNA sequencing techniques are advancing. Due to critical nature of DNA related data, data security is one of the biggest concerns in DNA database. This paper gives the review of different methods for security of DNA database. Along with different special features of database security it gives enhanced genetic algorithm used for security in DNA database.

Key Words: DNA Database, Security Algorithms, Genetic Algorithms, Database Security.

1. Introduction DNA (deoxyribonucleic acid) is a chemical which is found in the nucleus of every cell in the human body. It is inherited from both parents and is unique to each individual, with the exception of identical twins. In the 1940s, it is proved that DNA is the principal molecule which carries genetic information from one generation to the next. This was not conclusively established however until 1953, when Watson and Crick deduced the structure of DNA [1]. Each molecule of DNA consists of two strands which coil around each other to form a double helix, a structure like a twisted ladder. Each rung of the ladder consists of a pair of chemical groups called bases (nucleotides), linked together by hydrogen bonds. There are four types of bases known by their initial letters – A, G, C and T. The bases combine in specific pairs; A and T pair with each other and G pairs with C. Hence, the sequence on one strand of the double helix is complementary to that on the other. It is the specific sequence of these bases which constitutes the genetic information. DNA based identification of person advances from 1991 and because of that DNA based identification and paternity testing have almost become commodity. Again the human genome project is the worldwide scientific study having the aim to identify and map the genes of human genome from the corporeal and serviceable position. Most western governments keep databases with DNA profiles of criminal offenders and suspects: In the US, the FBI maintains the CODIS system, storing more than 4.3 million profiles. [2 , 3]. A DNA database is a repository of DNA profiles, generated from biological samples, which can be electronically stored for comparison with profiles generated from material found at the scene of a crime. The primary aim of a DNA database is to link individuals to unsolved offences and unsolved offences to each other by means of DNA profiling. DNA databases may be public or private. DNA fingerprints or DNA profiles are made from the DNA and these are held electronically in the DNA database. Along with persons identification DNA database is used in health care for precise diagnosis of genetic diseases, genetic figure printing for criminology etc. because of various purpose of DNA database, security of DNA database is required. Database security requires both knowledge of database management and security.

Swati M.Chandurkar, IJRIT

133

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 133- 136

2. Related work on DNA database security DNA database is the database that contains all DNA data.The largest DNA database in the world is CODIS followed by the United Kingdom National DNA Database [5] and thirdly a Californian DNA database [6].The Australian criminal DNA database is called the National Criminal Investigation DNA Database (NCIDD) and the Canadian equivalent is the National DNA Data Bank (NDDB). A national DNA database is a government database of DNA profiles against which law enforcement agencies can match suspect DNA. A genetic genealogy database is a DNA database of genealogical DNA test results. A medical DNA database is a DNA database of medically relevant genetic variations. There has been interest in security of genomic sequence for research purpose. Different techniques are used for security of databases with DNA database. Sesay et al. proposed a database encryption scheme. In this scheme the users are divided into two levels: Level1 and Level2 [7]. Level1 user have access to their own private encrypted data and the unclassified public data, whereas Level2 users have access to their own private data and also classified data which is stored in an encrypted form. Liu et al. proposed a novel database encryption mechanism [8]. The proposed mechanism performs column-wise encryption that allows the users to classify the data into sensitive data and public data. This classification helps in selecting to encrypt only that data which is critical and leaves the public data untouched thereby reducing the burden of encrypting and decrypting the whole database, as result of which the performance is not degraded. Mixed Cryptography Database scheme is presented by Kadhem et al [9]. The technique involves designing a framework to encrypt the databases over the unsecured network in a diversified form that comprise of owning many keys by various parties. In the proposed framework, the data is grouped depending upon the ownership and on other conditions. Earlier anonymization technique is used for protection of DNA database. But it is found that reidentification of anomyzed record is possible with high probability in case of anomyzation preserved genological relation [10]. After that cryptographic privacy preserving techniques have been used for DNA database security. M. Kantarcioglu, W. Jiang, Y. Liu and B. Mali had encrypted the genomic sequences of biomedical research projects by using homomorphic public key encryption key [11].Some authors concentrated on running queries formulated as regular expression on DNA data [12].These approaches are used for protection of full DNA in research setting. Authors P. Bohannon and coworkers consider the protection of forensic DNA database. Each entry in database is encrypted with a key that is derived from DNA data itself [13].The disadvantage of this approach is that it is applicable to forensic testing scenario. After that there is a use of privacy enhancing protocol for privacy of geneology services and research project [14]. Manrose, Rieter, Wetzel (MRW) gives the method of straightening login session for DNA database security by measuring typing speed. The MRW scheme is based on the password, a secrete sharing scheme and two dimensional matrix with some rows and columns where each entry may contain point useful for interpolation. Each row corresponds to some measurement of how user types a letter of password. If an individual does not have routine behavior for password typing, each entry in table further encrypted with users password.

3. Different Techniques Various types of attack may occur on database. Some common security schemes that can be applied to database security.

3.1Cryptography Cryptography is the study and the practice of the techniques where the plaintext which is the readable text get converted to an obfuscated and non-readable text by using the technique of encryption. Various cryptographic algorithm are used for providing security to different databases.

3.2 Hashing Hashing is defined as the transformation of a variable length data into a fixed length string by using hash functions without which the retrieval of the data is not possible.

Swati M.Chandurkar, IJRIT

134

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 133- 136

3.3 Steganography Steganography is process of concealing sensitive information in any type of cover media.

3.4 Access Control Access control mechanisms restrict the access to the database and its information to outsiders except for the authorized users.

3.5 Mixed cryptography database scheme This scheme involve designing of framework for encryption of database over unsecured network in different forms and it requires different keys from different party for decryption.

3.6 Homomorphic public key encryption This is the cryptographic privacy preserving technique which uses homomorphic public key drivd from the dna database itself.

3.7 Use of genetic algorithm Genetic algorithms are adoptive procedures derived from Darwin’s principle of fittest of natural genetics. Genetic algorithm maintains a population of potential solution of candidate problem. By manipulation of these individual through genetic operators such as selection, crossover and mutation, genetic algorithm evolves towards better solutions over number of generations. Genetic algorithm uses fitness function derived from objective of the optimization problem to evaluate the individual in population. Fitness function is the measure of individuals fitness, which is used to select individual for reproduction. Using genetic algorithm is beneficial as compared to other techniques because it is a robust algorithm. Again it can work on noisy datasets. Instead of using the greedy search technique like other algorithm, genetic algorithm performs the global search of the solution space. Genetic algorithm is having a high degree of autonomy used for discovery of knowledge previously unknown by the user. The disadvantage of genetic algorithm is the necessary frequent evaluation of individual. Benefits and drawbacks The benefit of using genetic algorithm is that it doesn’t required previous knowledge of any rule related with problem-the rule can be found through evolution. This is very useful when the problem definition is complex or loosely defined. Genetic algorithm is faster than other algorithms.The disadvantage of genetic algorithm is that definition of fitness function can be complex sometimes.

4. Conclusion This paper discusses about DNA database and also gives the review about different techniques for DNA database security. From above it is identified that genetic algorithm is also a better option for security purpose of DNA database.

References [1] Watson and Crick “Molecular Structure of Nucleic Acids: A Structure for Deoxyribonucleic Acids” (1953) 171 Nature 738-740. [2] CODIS combined DNA index system. http://www.fbi.gov/hq/lab/codis. [3] J. P. Bigus, "Data Mining with Neural Networks", New York: McGraw-Hill, 1996 Swati M.Chandurkar, IJRIT

135

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 133- 136

[4] CODIS - National DNA Index System [5] House of Commons Hansard Written Answers for 20 Jun 2007 (pt 0037) [6] Hindmarsh, R. Prainsack,Genetic Suspects,Global Governance of Forensic DNA Profiling and Databasing, Cambridge, UK: Cambridge University Press,2010 [7] Samba Sesay, Zongkai Yang, Jingwen Chen, Du Xu, “A Secure Database [8] Lianzhong Liu and Jingfen Gai, “A New Lightweight Database Encryption Scheme Transparent to Applications”. [9] Encryption Scheme”, Second IEEE Consumer Communication Network onference (CCNC), 3-6 Jan. 2005, pp. 49- 53 [10] B.Malin. An evaluation of the current state of genomic data privacy protection technology [11]M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin. A cryptographic approach to securely share and query genomic sequences. [12] J. R. Troncoso-Pastoriza, S. Katzenbeisser, andM. Celik. Privacy preserving error resilient DNA searching through oblivious automata. [13]P. Bohannon, M. Jakobsson, and S. Srikwan. Cryptographic approaches to privacy in forensic DNA databases. [14]Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, Pim Tuyls” Privacy-Preserving Matching of DNA Profiles” [15] Manrose, Rieter, Wetzel,password hardening based on keystroke dynamic.In sixth ACM conference on computer and communication security,1999

Swati M.Chandurkar, IJRIT

136

Techniques for DNA database security: A Review - IJRIT

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 133- ... From last few years DNA sequencing techniques are advancing. .... Genetic algorithm is having a high degree of autonomy used for.

71KB Sizes 3 Downloads 297 Views

Recommend Documents

Network Security using IP Traceback Techniques - IJRIT
The original aim of the Internet was to provide an open and scalable network among ... Blocking the availability of an Internet service may imply large financial.

Network Security using IP Traceback Techniques - IJRIT
And the toughest problem of Network Security is to trace the ... annual Computer Security Institute (CSI) computer crime and security survey reported that ...

Underwater Image Enhancement Techniques: A Survey - IJRIT
Different wavelength of light are attenuated by different degree in water. Underwater images are ... 75 found in [28]-[32]. For the last few years, a growing interest in marine research has encouraged researchers ..... Enhancement Using an Integrated

A Study Of Various Techniques For The Brain Tumor ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3 ..... assignment and there is a need and wide degree for future examination to ... Journal of Advanced Research in Computer Science and Software Engineering, Vol.

A Study Of Various Techniques For The Brain Tumor ... - IJRIT
A Study Of Various Techniques For The Brain Tumor ..... Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 3, issue 3 ...

A Review on Neural Network for Offline Signature Recognition ... - IJRIT
Based on Fusion of Grid and Global Features Using Neural Networks. ... original signatures using the identity and four Gabor transforms, the second step is to ...

A Review on Wireless Inductive Power for A Review on ... - IJRIT
Wireless power provides convenience of charging mobile phones and devices. ... Since data communication has become wireless, users expect similar use ...

A Review on Wireless Inductive Power for A Review on ... - IJRIT
To discuss the wireless inductive power system, a closer look at the system is .... winding width w the inductance for a ring coil inductor may vary slightly.

Data Structure and Algorithm for Big Database - IJRIT
With the explosion of sensors, smart devices as well as social networking, data in an ... When a stack is implemented as a linked list, each node in the linked list ...

The Relevance of Effective Database System for Efficient Office ... - IJRIT
Keyword: Database Security, Database System, Office Management, Oracle 11g, SQL, ... describe the nesting, and a sort field to keep the records in a particular order in .... Proper Documentation: Program flowcharts serve as a good program ...

The Relevance of Effective Database System for Efficient Office ... - IJRIT
Oracle database 11g comes in handy to solve and enhance data storage and retrieval offering ..... A hard disk minimum size of 50GB. 2. A minimum of duo core ...

Comparison of Existing Routing Techniques for Mobile Ad-Hoc ... - IJRIT
Mobile ad hoc networks re wireless networks formed by wireless devices in sharing or PAN ... Nodes in turn respond to these changes and direct packets on the.

Comparison of Existing Routing Techniques for Mobile Ad-Hoc ... - IJRIT
mobility, bandwidth issues of this specialized hoc architecture. However all protocols ... routes as computed by the packets as per the stored network map data.

Performance Evaluation of Equalization Techniques under ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue ... Introduction of wireless and 3G mobile technology has made it possible to ...

Performance Evaluation of Equalization Techniques under ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue ... Introduction of wireless and 3G mobile technology has made it possible to ...

Data Structure and Algorithm for Big Database - IJRIT
We define big data as a data that is too big to fit in main memory resulting to a structure requirement on the data. The word “index” or “metadata” suggest that ...

The Relevance of Effective Database System for Efficient Office ... - IJRIT
Keyword: Database Security, Database System, Office Management, Oracle 11g, SQL, Tertiary Institution .... maintenance and problems diagnostic functionality, provide automatic backup, secure storage facilities, provide data ... RAID (Redundant Array

A Methodology for Securing a Database using ECC with Cache - IJRIT
The motivation behind database encryption is to guarantee .... RSA algorithm involves three steps: key generation, encryption and decryption.1) Key generation.

A Methodology for Securing a Database using ECC with Cache - IJRIT
A database is a collection of data which helps us to store, retrieve and organize data in .... encryption in this layer is moderately impervious to data leakage and ...

Enforcing Reverse Circle Cipher for Network Security Using ... - IJRIT
User's authentication procedures will be design for data storage and retrieval ... In this paper we are going to discuss two tier security approaches for cloud data storage ... in public and private key encryption cipher such as RSA (Rivest Shamir, .

Enforcing Reverse Circle Cipher for Network Security Using ... - IJRIT
... key encryption cipher such as RSA (Rivest Shamir, Adleman) uses in internet with .... I would like to give my sincere gratitude to my guide Aruna K. Gupta, H.O.D. ... Wireless Sensor Networks”,Transactions on Sensor Networks (TOSN), ACM ...