DNA Data Storage Moves Closer To Becoming Reality

DNA could replace hard drives, tape and other storage mediums one day. It’s not as far-fetched as it sounds, and significant progress is being made, including new, zero-error individual-file data retrieval.

Hundreds of megabytes of data have been encoded using DNA in the last few years by scientists.

But more recently, not only has the media been stored perfectly in the synthetic variant of the genetic instructions that make up all organic life, but archived data files have been individually retrieved with zero errors, too.

It appears that Microsoft Research’s target of a DNA storage system actually functioning within a data center by the turn of the decade, as reported by MIT’s Technological Review a year ago, might be becoming increasingly viable.

We know of organic DNA (deoxyribonucleic acid) through the study of genes that make up living organisms. Large amounts of information are held, and it lasts a long time. A 45,000 years old, human femur bone, was DNA-sequenced, or decoded, a few years ago, for example.

It’s for those two principal reasons, data density and longevity, that researchers want to figure out ways to use a reimagined, synthetic form of DNA sequencing to store our ever-increasing quantities of data: More data should be held in higher densities than with traditional data center storage, and DNA particulars should last longer than those on solid state, tape, or drive.

A 45,000-year or more lifespan could keep books, historical facts, art, and so on alive indefinitely.

Random access in large-scale DNA data storage

Scientists from Microsoft and University of Washington say they’re making progress.

In 2015, I reported on Swiss experiments in which researchers said they were making advances in error correction — gaps in DNA sequences blight tests. False encoding of information, along with chemical degradation, had caused failures.

This new development, announced by Microsoft in February, is of 35 distinct files, consisting of a total of 200 MB of data that have been flawlessly written and, importantly, individually recovered. The tests “demonstrate a viable, large-scale system for DNA data storage and retrieval,” Nature Biotechnology says in an abstract of the group’s paper.

The fact that the files were individually recovered is the big deal here, they say. That’s because in previous experiments, all of the data had to be pulled in order to rebuild just a subset, or just one individual file.

In other words, the entire mass of DNA had to be decoded. That’s time consuming, sequences need to be run multiple times for error correction reasons.

This current set of experiments, however, uses a kind of random access in the same way a PC does. It solves the issue, the team says. “We can recover each file individually and with no errors, using a random access approach.”

The key to the advance has been in data validation and in writing an algorithm to speed up reading of the thread- or chain-like DNA.

“DNA data storage has the potential to complement or eventually replace tape, the densest [currently] commercially available storage medium for archival storage,” the paper concludes.

Network World

You Might Akso Read:

Machines Versus Human Brains – Who Wins?:

Blockchain To Secure Storage Of Sensitive Data:

 

« Facebook Could Save Your Life
Hackers Advertise Stolen Personal Data On Facebook »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

CLUSIF

CLUSIF

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.