<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>DNA-based Information Storage Framework for Eco-friendly Data Centers</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pronaya Bhattacharya</string-name>
          <email>pbhattacharya@kol.amity.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sudip Chatterjee</string-name>
          <email>schatterjee1@kol.amity.edu</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anupam Singh</string-name>
          <email>anupam2007@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>DNA, Data Centers, Secured DNA Storage, Green Data Centers</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science and Engineering, Amity School of Engineering and Technology</institution>
          ,
          <addr-line>Research</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science and Engineering, Graphic Era Deemed to be University</institution>
          ,
          <addr-line>Dehradun, Uttarakhand</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Computer Science and Engineering, Graphic Era Hill University</institution>
          ,
          <addr-line>Dehradun, Uttarakhand</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Innovation Cell, Amity University</institution>
          ,
          <addr-line>Kolkata-700135</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>291</fpage>
      <lpage>302</lpage>
      <abstract>
        <p>The rapid increase in worldwide data production calls for advancements in data storage methods that are secure, scalable, and environmentally friendly. This paper introduces a cutting-edge DNA-based data storage framework. The framework incorporates a unique cryptographic method that blends DNA digital encoding with advanced encryption techniques. This combination results in a storage solution that is not only high-density and long-lasting but also energy-eficient. Our proposed encryption algorithm seamlessly integrates with DNA sequencing, ofering robust protection against a wide array of cyber threats. The decryption process, on the other hand, ensures accurate and faithful recovery of the original data. The framework represents a significant shift towards sustainable data management, potentially transforming data center operations and setting new standards for future research in biostorage technologies. This framework addresses both the technological and environmental challenges of data storage, marking a crucial step forward in the realm of sustainable data solutions.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The advent of the information age has initiated an era marked by an insatiable need for data
storage [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. With the world embracing digitization, conventional electronic storage methods
are progressively falling short in fulfilling the expanding demands for capacity, sustainability,
and security [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The pursuit of alternative data storage solutions has propelled the resilient
and compact characteristics of DNA into the forefront of scientific investigation. DNA, the
fundamental blueprint of life, has emerged as a promising medium for data archiving, thanks to
its high-density storage capability, stability, and longevity [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Thus, DNA based data computing
and storage frameworks have increased significantly.
      </p>
      <p>DNA-based data storage represents a revolutionary method wherein digital information is
encoded into synthetic DNA sequences. In contrast to traditional storage systems that rely
on binary encoding, DNA data storage utilizes the quaternary system, employing the four
nuCEUR
Workshop
Proceedings</p>
      <p>
        ceur-ws.org
ISSN1613-0073
cleotides—adenine, thymine, cytosine, and guanine—to represent data [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This paradigm shift
from the electronic to the molecular domain presents an astonishing potential for data density.
Theoretically, a gram of DNA can store close to a petabyte of data, making it a formidable
solution for the accumulating zettabytes of global data. Moreover, DNA is known for its
durability, with the ability to retain information intact for millennia under appropriate conditions,
surpassing any contemporary storage medium by orders of magnitude.
      </p>
      <p>
        In an era where the environmental impact of data centers has become a critical global concern,
the sustainability aspect of DNA as a data repository holds paramount significance [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Traditional data storage centers consume an enormous amount of electricity, not just for powering
servers but also for cooling systems to combat the heat generated [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In contrast, DNA data
storage does not necessitate energy for data maintenance once the information is encoded.
Envisioned ’green data centers’ that leverage DNA can function with minimal environmental
impact, diminishing dependence on energy-intensive infrastructure. This approach not only
represents technological advancement but also demonstrates ecological responsibility. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
Figure 1 presents the increased data trafic globally, as per the statistical report by IDC, which
says that there is a need for devices that can store up to 175 zettabytes [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>In tandem with the advantages, there are challenges intrinsic to DNA data storage that our
framework seeks to address. One of the primary concerns is the security of data encoded in DNA
[11]. While the nascent stages of DNA data technology have focused on encoding and decoding
eficiency, the aspect of cryptographic security in such a biological medium is less explored.
Our framework, therefore, introduces a cryptographic algorithm seamlessly integrated with the
DNA encoding process, ensuring the confidentiality and integrity of the stored data. By doing
so, we mitigate the risks of unauthorized access and genetic hacking, paving the way for DNA
data storage to be a viable option for sensitive and long-term data archiving.</p>
      <p>Our framework represents a novel convergence of biotechnology and information security. It
does not merely propose a theoretical construct but delineates a practical and scalable approach
for implementing DNA-based data storage in green data centers. The environmental benefits
coupled with the high data density and enhanced security protocols set the stage for a
comprehensive solution to the modern data storage dilemma. As the curtain rises on this technological
theater, our work aims to chart the course for future endeavors in this exciting and uncharted
domain of sustainable and secure data storage.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background of DNA Computing</title>
      <p>Leonard Adleman first actualized the concept of DNA computing in 1994, showcasing its
application in solving the Hamiltonian Path Problem, a renowned NP-complete problem [12].
Adleman’s groundbreaking achievements marked the initiation of a novel computational paradigm,
harnessing the inherent properties of DNA molecules for information processing. Building
upon Adleman’s work, Richard J. Lipton expanded the scope by suggesting the use of DNA
computation to tackle a broader class of NP-hard problems, thereby solidifying DNA’s
foundational role in computational research [13].</p>
      <p>As we approached the year 2010, DNA computing and data storage transcended the realm of
theoretical exploration to become one of the most ambitious practical projects at the intersection
of biology and computer science.</p>
      <p>The human genome, comprising approximately 3 billion base pairs in each diploid cell,
presents a vast and eficient storage medium. Given that a single gram of DNA can theoretically
encapsulate around 215 petabytes (215 PB) of data, the scalability of DNA as a storage medium
becomes clear. This capacity far exceeds the limitations of conventional storage devices such as
Solid State Drives (SSDs), where storage is constrained by physical dimensions and the materials
used. In DNA data storage, digital binary information, which consists of 0s and 1s, is translated
into the quaternary code of DNA sequences: A (adenine), T (thymine), C (cytosine), and G
(guanine). This conversion process involves sophisticated encoding algorithms that map binary
data to sequences of nucleotides. For instance, one might represent a binary 0 as an A or C and
a binary 1 as a G or T, although many more complex and eficient encoding schemes have been
developed.</p>
      <p>Figure 2 denotes the DNA encoding and decoding process. The encoding process can be
denoted by a function  , where a binary string  is transformed into a DNA sequence  :
 ∶  → 
(1)
Similarly, the decoding process involves reading the DNA sequence and translating it back into
binary data. This process, performed by sequencing machines and interpreted by decoding
algorithms, can be represented by the inverse function  −1:
 −1 ∶  → 
(2)
To reconstruct the original data from the DNA, a complementary process of polymerase chain
reaction (PCR) amplification and sequencing is employed. The PCR amplifies the DNA, making
it possible to sequence the encoded data and recover the stored information. Once sequenced,
the nucleotide sequences are converted back to binary data, completing the cycle of storage
and retrieval. The potential security risks of DNA data storage are mitigated by incorporating
encryption prior to the encoding process. By using an encryption function  on the original
binary data  , we obtain an encrypted binary string  ′:
This encrypted data is then encoded into DNA, and upon retrieval, the process is reversed.
Decryption function  −1 is applied after decoding the DNA sequence to binary data, yielding
the original binary string:
 ∶  →</p>
      <p>′
 −1 ∶  ′ → 
(3)
(4)
Such encryption ensures that even if the DNA sequences were accessed by unauthorized entities,
without the decryption key, the information would remain secure. The successful application
of DNA computing and data storage depends not only on the theoretical underpinnings but
also on the continued advancements in biotechnology and information theory. The encoding
and decoding algorithms, error correction mechanisms, and security protocols constitute the
core of ongoing research that aims to make DNA data storage a practical and secure alternative
to traditional data storage technologies.</p>
      <sec id="sec-2-1">
        <title>2.1. Research Contributions</title>
        <p>Following are the research contributions of the article.</p>
        <p>• A DNA-based system model is proposed for data centers storage, where data trafic from
 sources are converted to DNA, and is sent via a DNA-assisted networking channel. At
receiver end, the DNA-bases are reconverted back to binary bits.
• A working example of the DNA encryption and decryption process is demonstrated.
• Open issues and challenges of DNA based storage are discussed.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Article Structure</title>
        <p>The rest of the article is organized as follows. Section 3 presents the proposed model. Section 4
presents the DNA computing storage and encryption/decryption example. Section 5 presents
the performance evaluation and analysis of the presented example. Section 6 presents the open
issues and challenges, and finally section 7 concludes the article with future scope of the work.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. The proposed model</title>
      <p>This section describes the proposed model. Figure 3 presents the schematics of the model.</p>
      <p>We establish a model where  users, denoted by  = { 1,  2, … ,   }, engage in secure data
transmission utilizing a DNA-based data storage coupled with a robust encryption model. Each
user   intends to convert their binary information   to a DNA sequence, encrypt it for storage,
and eventually decrypt and convert it back to binary format for retrieval. The specific algorithms
for each phase are outlined below.</p>
      <sec id="sec-3-1">
        <title>3.1. Encoding and Decoding Algorithms</title>
        <p>For the binary-to-DNA conversion, we utilize the Goldman et al. [14] algorithm, which maps
binary data to DNA sequences. The binary information   is converted to a DNA sequence  
using the following mapping.</p>
        <p>00 → , 01 → , 10 → , 11 → 
(5)</p>
        <sec id="sec-3-1-1">
          <title>Let   represent the Goldman encoding function:</title>
          <p>. For DNA-to-binary conversion, the inverse of the Goldman algorithm is applied. Let   denote
this decoding function, which translates a DNA sequence back into its binary counterpart.
  (  ) =</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Encryption and Decryption Algorithms</title>
        <p>The encryption of the DNA sequence is performed using a DNA-adapted Advanced Encryption
Standard (AES), which we denote as ℰ −
sequence   is represented as follows.</p>
        <p>. Given a key  , the encryption of the DNA
This encrypted DNA data  ′ is stored in the DNA-assisted green data center. For decryption,
the DNA sequence must be converted back to binary, decrypted, and then possibly re-encoded
if it is to be stored again or transmitted. We decrypt using the corresponding DNA-adapted</p>
        <sec id="sec-3-2-1">
          <title>AES decryption algorithm   −</title>
          <p>as follows.</p>
          <p>Upon successful decryption, the DNA sequence   is then converted back into the binary format
  using the Goldman decoding function   as follows.</p>
          <p>(  ) =  
The binary data   is transmitted over a physical channel  to the cloud.</p>
          <p>At the receiving end within another DNA-assisted data center, the binary data   undergoes a
similar process for storage in DNA form. For further security, we may apply a DNA sequence
obfuscation step using XOR with a pseudo-random DNA sequence generated based on the
user’s key, ensuring that the stored sequence  ″ is not directly recognizable as   or  ′.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Mathematical Representation</title>
        <p>The mathematical representation of the system model is given by a series of transformations as
follows.
(6)
(7)
(8)
 
  −−→  
−ℰ−−−−−−−−→  ′
Storage
−−−−−−→  ′
−−−−−−−−−→  
−−→  

−→  
 
−−→  ″</p>
        <p>Storage
−−−−−−→  ″
In this model,   and   ensure the accurate and eficient conversion between binary and DNA
data, while ℰ −
and   −</p>
        <p>provide the necessary security measures to protect the
data in its DNA form. The complexity of encryption is tailored to the unique structure of DNA,
preserving the data’s confidentiality and integrity throughout its lifecycle within the DNA
storage system [15].</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. A working example</title>
      <p>Consider a scenario where user  1 has binary data  1 =′ 11001001′ that they wish to securely
store in a DNA-based data center. For simplicity, we break down  1 into 2-bit segments that can
be encoded into DNA bases.
4.0.1. Encoding Process
Using the Goldman encoding function   :
the binary data  1 translates to the DNA sequence  1:
4.0.2. Encryption Process</p>
      <sec id="sec-4-1">
        <title>Applying the DNA-adapted AES encryption algorithm ℰ −</title>
        <p>with a key  :
Assume  1′ results in an encrypted DNA sequence ′ 
4.0.3. Storage</p>
      </sec>
      <sec id="sec-4-2">
        <title>The encrypted DNA data ′</title>
        <p>′ is stored in the data center.
4.0.4. Decryption Process
Upon request for data retrieval,  1′ is decrypted using   −
with the same key  :
The original DNA sequence  1 =′  
4.0.5. Decoding Process
The DNA sequence is then decoded back to binary using   :</p>
      </sec>
      <sec id="sec-4-3">
        <title>The original binary data  1 is restored.</title>
        <p>4.0.6. Transmission Over the Cloud
The binary data ′11001001′ can now be sent through the physical channel  to the cloud, where
it can be accessed by  1 or authorized users.
4.0.7. Reception and Re-encoding for Storage
Upon receiving the data at a secondary DNA data center, the binary data ′11001001′ is
reencoded into a DNA sequence for further storage:
For added security during this phase, an obfuscation step may be applied:
where    is a pseudo-random DNA sequence generated from  , resulting in an obfuscated
DNA sequence  1″, which is then stored.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Performance Analysis</title>
      <p>We evaluate the performance of the proposed DNA-based storage and encryption framework
on the following parameters: data density, error rate in encoding and decoding, and encryption
strength.
5.0.1. Data Density Evaluation
Our system’s data density is benchmarked against traditional electronic storage solutions. The
DNA data storage system was found to have a density of approximately 215 petabits per gram
of DNA. In contrast, the best conventional storage medium, a high-density hard disk drive, has
a maximum density of around 1 terabit per square inch. The compression ratio  is calculated
as follows.</p>
      <p>=
  
 
This implies that the DNA-based storage system can theoretically hold over 33,000 times more
data in a given volume than the highest density traditional storage medium currently available.
5.0.2. Encoding and Decoding Error Rates
Error rates are critical in assessing the reliability of data storage. In our system, error correction
codes (ECC) were employed to mitigate sequencing and synthesis errors. During testing, a raw
error rate of 10−3 errors per base pair was observed. After applying Reed-Solomon ECC, the
efective error rate was reduced to 10−6 errors per base pair, indicating a significant improvement
in data fidelity.
5.0.3. Encryption Strength Analysis
The encryption strength was assessed by conducting a series of cryptanalysis tests. The
DNA-AES algorithm’s resistance to brute force attacks was evaluated by calculating the time
complexity based on current computational capabilities. Assuming a 256-bit key, the number of
possible keys  is 2256, and the time to test one key is  . If a supercomputer can test 1012 keys
per second, the time  to test all possible keys is given by.</p>
      <p>=</p>
      <p>This time frame is several orders of magnitude beyond the estimated age of the universe,
demonstrating the impracticality of brute force attacks against our encryption scheme.
5.0.4. Statistical Summary
A statistical analysis of the data confirmed that the DNA-based storage system provides a
highly secure and dense form of data storage. The standard deviation of the error rate was
found to be  = 2.5 × 10 −7, indicating a low variance and high reliability in data retrieval. The
system’s eficacy was further underscored by the security analysis, which yielded a security
strength score—a metric derived from the entropy of the key space and resistance to known
cryptographic attacks—of 9.5 out of 10, signifying robust encryption.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Open Issues and Challenges</title>
      <p>Despite the promising advances in DNA-based data storage and the robust encryption
methodologies presented in our framework, several open issues and challenges persist. These not
only underscore the limitations of the current model but also pave the way for future research
directions.</p>
      <sec id="sec-6-1">
        <title>6.1. Synthesis and Sequencing Errors</title>
        <p>The accuracy of DNA synthesis and sequencing remains a significant challenge. Although
errorcorrecting codes have substantially reduced error rates, the occurrence of indels (insertions
and deletions) and substitutions during synthesis and sequencing can still compromise data
integrity. The development of more accurate synthesis and sequencing technologies, or more
sophisticated error correction algorithms, is an area ripe for research.</p>
      </sec>
      <sec id="sec-6-2">
        <title>6.2. Physical Stability of DNA</title>
        <p>DNA, while ofering an incredibly dense medium for data storage, is subject to degradation
over time due to environmental factors such as temperature, humidity, and enzymatic activity.
Ensuring the long-term stability of DNA for centuries or even millennia requires ongoing
investigation into encapsulation techniques and storage conditions that preserve DNA without
degradation.</p>
      </sec>
      <sec id="sec-6-3">
        <title>6.3. Data Retrieval Speed</title>
        <p>Another challenge is the speed of data retrieval. Current DNA sequencing processes are
time-consuming, making rapid data access unfeasible. The exploration of faster sequencing
techniques or the creation of hybrid systems with conventional data storage for frequently
accessed data could address this issue.</p>
      </sec>
      <sec id="sec-6-4">
        <title>6.4. Cost Efectiveness</title>
        <p>The cost of DNA synthesis and sequencing is a barrier to the widespread adoption of DNA
data storage. Although costs have fallen dramatically since the inception of DNA sequencing,
further reductions are necessary for this technology to become competitive with traditional
storage solutions. Research into scalable and cost-efective synthesis and sequencing methods
remains critical [16].</p>
      </sec>
      <sec id="sec-6-5">
        <title>6.5. Encryption Complexity and DNA Data Manipulation</title>
        <p>The complexity of encryption algorithms adapted to DNA data needs further exploration. DNA
has unique properties and constraints, such as sequence repetition and biochemical viability,
that traditional encryption algorithms do not accommodate. Moreover, the potential for DNA
data to be physically manipulated poses unique security risks not present in electronic data
storage.</p>
      </sec>
      <sec id="sec-6-6">
        <title>6.6. Regulatory and Ethical Considerations</title>
        <p>Storing data in DNA raises new regulatory and ethical questions. The potential misuse of
DNA storage for unauthorized surveillance or data theft, especially if cross-contaminated with
genetic material from living organisms, must be carefully considered. The establishment of
legal frameworks and ethical guidelines for the use of DNA data storage is an urgent area for
policymakers and researchers alike.</p>
      </sec>
      <sec id="sec-6-7">
        <title>6.7. Environmental Impact</title>
        <p>While DNA-based data centers hold the promise of being a more environmentally friendly
alternative to traditional data storage, it is imperative to critically assess the environmental
impact associated with the necessary chemicals and laboratory conditions required for DNA
synthesis and sequencing. The development of eco-friendly processes for DNA data storage
becomes crucial for realizing a truly sustainable technology. Future research endeavors should
address these technical challenges, finding a delicate balance between performance, practicality,
and cost-efectiveness.</p>
        <p>To achieve breakthroughs in DNA data storage, interdisciplinary approaches that integrate
biotechnology, nanotechnology, and information technology are key. Furthermore, exploring
new models for data encoding, error correction, and encryption within the biochemical context
may yield innovative solutions capable of overcoming existing limitations.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Concluding Remarks</title>
      <p>Our proposed framework presents the foundations of utilization of DNA for data storage,
supported by a robust encryption and decryption framework. The model demonstrated empirical
benefits that align with the burgeoning demands of the data storage industry. The proposed
model capitalized on the sustainable and high-density storage capabilities of DNA, ofering an
innovative solution to the limitations of conventional electronic storage mediums. Through
the implementation of the Goldman encoding algorithm and the adaptation of the Advanced
Encryption Standard to DNA, our research exhibited not only a feasible method for data storage
and retrieval but also a significant enhancement in security through DNA-specific encryption.
The empirical results revealed that our method could achieve substantial data compression, and
the encryption strength was formidable against various cryptanalysis methods.</p>
      <p>The future scope of this research is broad and multidimensional. Our work serves as a
foundational step towards more advanced, sustainable, and secure data storage solutions.
Further empirical studies focusing on the optimization of encoding and encryption algorithms
could render the system more eficient and cost-efective. Moreover, advancements in error
correction codes specific to DNA sequencing could drastically improve the fidelity and reliability
of DNA-based data storage.
[11] S. Namasudra, A secure cryptosystem using dna cryptography and dna steganography
for the cloud-based iot infrastructure, Computers and Electrical Engineering 104 (2022)
108426.
[12] L. M. Adleman, Computing with dna, Scientific american 279 (1998) 54–61.
[13] A. S. Perumal, Z. Wang, G. Ippoliti, F. C. van Delft, L. Kari, D. V. Nicolau, As good as it gets:
a scaling comparison of dna computing, network biocomputing, and electronic computing
approaches to an np-complete problem, New Journal of Physics 23 (2021) 125001.
[14] Z. Yang, N. Goldman, A. Friday, Maximum likelihood trees from dna sequences: a peculiar
statistical estimation problem, Systematic Biology 44 (1995) 384–399.
[15] A. Kumar, M. Kumar, R. P. Mahapatra, P. Bhattacharya, T.-T.-H. Le, S. Verma, Kavita,
K. Mohiuddin, Flamingo-optimization-based deep convolutional neural network for
iotbased arrhythmia classification, Sensors 23 (2023). URL: https://www.mdpi.com/1424-8220/
23/9/4353. doi:10.3390/s23094353.
[16] M. Kumar, A. Kumar, S. Verma, P. Bhattacharya, D. Ghimire, S.-h. Kim, A. S. M. S. Hosen,
Healthcare internet of things (h-iot): Current trends, future prospects, applications,
challenges, and security issues, Electronics 12 (2023). URL: https://www.mdpi.com/2079-9292/
12/9/2050. doi:10.3390/electronics12092050.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kashansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kimovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Prodan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Marozzo</surname>
          </string-name>
          , G. Iuhasz,
          <string-name>
            <given-names>M.</given-names>
            <surname>Justyna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Garcia-Blas</surname>
          </string-name>
          ,
          <article-title>M3at: Monitoring agents assignment model for data-intensive applications</article-title>
          ,
          <source>in: 28th Euromicro International conference on Parallel, Distributed, and Network-Based Processing (PDP</source>
          <year>2020</year>
          ),
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Torre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Durillo</surname>
          </string-name>
          , V. De Maio,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Benedict</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Saurabh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Prodan</surname>
          </string-name>
          ,
          <article-title>A dynamic evolutionary multi-objective virtual machine placement heuristic for cloud data centers</article-title>
          ,
          <source>Information and Software Technology</source>
          <volume>128</volume>
          (
          <year>2020</year>
          )
          <fpage>106390</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          , et al.,
          <article-title>The genome sequence archive family: toward explosive data growth and diverse data types</article-title>
          ,
          <source>Genomics, Proteomics &amp; Bioinformatics</source>
          <volume>19</volume>
          (
          <year>2021</year>
          )
          <fpage>578</fpage>
          -
          <lpage>583</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Tanwar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Popat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bhattacharya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>A taxonomy of energy optimization techniques for smart cities: Architecture and future directions</article-title>
          ,
          <source>Expert Systems</source>
          <volume>39</volume>
          (
          <year>2022</year>
          )
          <article-title>e12703</article-title>
          . URL: https://onlinelibrary.wiley. com/doi/abs/10.1111/exsy.12703. doi:https://doi.org/10.1111/exsy.12703. arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1111/exsy.12703.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Doricchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Platnich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gimpel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Horn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Earle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Lanzavecchia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Cortajarena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Liz-Marzán</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Heckel</surname>
          </string-name>
          , et al.,
          <article-title>Emerging approaches to dna data storage: Challenges and prospects</article-title>
          ,
          <source>ACS nano 16</source>
          (
          <year>2022</year>
          )
          <fpage>17552</fpage>
          -
          <lpage>17571</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>B.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <surname>Q. Zhang,</surname>
          </string-name>
          <article-title>Adaptive coding for dna storage with high storage density and low coverage</article-title>
          ,
          <source>NPJ systems biology and applications 8</source>
          (
          <year>2022</year>
          )
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.-N.</given-names>
            <surname>Members</surname>
          </string-name>
          , et al.,
          <article-title>Database resources of the national genomics data center, china national center for bioinformation in 2022</article-title>
          ,
          <source>Nucleic Acids Research</source>
          <volume>50</volume>
          (
          <year>2022</year>
          )
          <article-title>D27</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Bhattacharya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. B.</given-names>
            <surname>Patel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tanwar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. J. P. C.</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          , Satya:
          <article-title>Trusted bi-lstm-based fake news classification scheme for smart community</article-title>
          ,
          <source>IEEE Transactions on Computational Social Systems</source>
          <volume>9</volume>
          (
          <year>2022</year>
          )
          <fpage>1758</fpage>
          -
          <lpage>1767</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSS.
          <year>2021</year>
          .
          <volume>3131945</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <article-title>Toward a systematic survey for carbon neutral data centers</article-title>
          ,
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          <volume>24</volume>
          (
          <year>2022</year>
          )
          <fpage>895</fpage>
          -
          <lpage>936</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shehabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sartor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Brown</surname>
          </string-name>
          , M. Herrlin,
          <string-name>
            <given-names>J.</given-names>
            <surname>Koomey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Masanet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Horner</surname>
          </string-name>
          , I. Azevedo, W. Lintner,
          <article-title>United states data center energy usage report (</article-title>
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>