• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

Securing DNA Data With Stricter Cloud Security Measures

By IEEE Computer Society Team on
February 15, 2023

securing DNA with cloud security measuressecuring DNA with cloud security measuresThe field of bioinformatics involves analyzing individuals’ DNA data, which has to be performed by advanced computers. However, the systems initially designed to secure DNA data stored within bioinformatics systems may not be capable of adequately securing it from cyberattacks.

Researchers at Western Kentucky University undertook the task of determining how to best secure the cloud networks that manage and store sensitive DNA information.

Identifying the Primary Areas of Need


The DNA analysis project, known as BioCloud, has to exist in the cloud, as opposed to on the individual computers of researchers, due to the heavy computing requirements of DNA analysis. By using cloud-based resources, researchers have access to powerful computers housed in data centers. With this computing horsepower at their fingertips, they can perform their analyses at speeds fast enough to make the overall project goals feasible.

Therefore, the team identified two key areas of need: adequate data encryption and user interface (UI) security.


Want More Tech News? Subscribe to ComputingEdge Newsletter Today!


Data Encryption


Data encryption involves disguising data by running it through algorithms that turn it into unreadable characters. Only a computer with the appropriate secret key would be able to decrypt and then present the data to the user. Data encryption is needed for data in two states:

  • While in storage. The data of the BioCloud project is currently being held in plain text, making it an easy target for attackers. But it could be encrypted without sacrificing its usefulness using dynamic symmetric searchable encryption (DSSE).
  • In transit via network traffic. To enable data to flow through networks without being susceptible to man-in-the-middle attacks or other exfiltration techniques, the team recommends using Hypertext Transfer Protocol Secure (HTTPS).

User Interface Security


User interface (UI) security can be effective at preventing hackers from accessing sensitive areas or uploading malicious code used to compromise the system. The types of UI security proposed include:

  • Input validation. This involves validating the nature of the data inputted to make sure it doesn’t present a threat. This could be effective in preventing SQL injections, where a hacker inputs malicious code meant to manipulate, damage, or steal from a database.
  • Session security. Administrators can improve the security of user sessions by using random session keys. Also, by producing these keys more frequently, they can make it even harder for hackers to access the system.
  • Upload parsing. Upload parsing involves parsing out potentially harmful data, essentially filtering malicious data out, before it gets uploaded to the database.

Challenges Faced by the Team


While the team was working on developing and testing security features, other developers were making adjustments to the BioCloud platform at the same time. This resulted in a volatile system that was constantly in flux, making it difficult to achieve the desired results.

However, despite these difficulties, the team still managed to implement some security measures, such as Bcrypt hashing, making the overall system more secure than when it first started. You can read the full article in IEEE Computer Society’s digital library.

LATEST NEWS
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Computing’s Top 30: Sukanya S. Meher
Computing’s Top 30: Sukanya S. Meher
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Computing’s Top 30: Tejas Padliya
Computing’s Top 30: Tejas Padliya
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence

Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success

Computing’s Top 30: Sukanya S. Meher

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development