Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 23, pp 33837–33863 | Cite as

A cloud compatible DNA coded security solution for multimedia file sharing & storage

  • Nithya Chidambaram
  • Pethuru Raj
  • K. Thenmozhi
  • Sundararaman Rajagopalan
  • Rengarajan AmirtharajanEmail author
Article
  • 66 Downloads

Abstract

The faster proliferation of software-defined cloud environments across the world for efficiently hosting enterprise-grade applications has led many organisations to embrace the cloud paradigm in a significant way. The cloud storage opportunities and possibilities are consistently expanding, wherein multimedia storage occupies the entire stage in the cloud. An essential emphasis on security owing to the nature of multiuser access to cloud credentials in many situations is necessary. The security and safety of data, while in transit, in rest, and while being used by applications, have to be guaranteed through proven technology solutions. Typically, image encryption is the standard way of securing and safeguarding images. The proposed three-layer image encryption scheme uses DNA coding along with chaotic logistic and tent maps for confusion and diffusion operations. Upon verification of user credentials, the storage of encrypted image is accomplished in Amazon S3 web services. The strength of encryption has been evaluated based on the parameters namely brute force attack, statistical, encryption quality, occlusion attack and computational complexity analyses which have proved the suitability of proposed scheme to secure cloud storage of images.

Keywords

DNA coding Chaotic maps Image encryption Cloud computing 

Notes

References

  1. 1.
    Abbas NA (2016) Image encryption based on independent component analysis and Arnold’s cat map. Egypt Informatics J 17:139–146.  https://doi.org/10.1016/j.eij.2015.10.001 CrossRefGoogle Scholar
  2. 2.
    Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76:24527–24547.  https://doi.org/10.1007/s11042-016-4206-4 CrossRefGoogle Scholar
  3. 3.
    Asadi S, Nilashi M, Husin ARC, Yadegaridehkordi E (2017) Customers perspectives on adoption of cloud computing in banking sector. Inf Technol Manag 18:305–330CrossRefGoogle Scholar
  4. 4.
    Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170.  https://doi.org/10.1016/j.sigpro.2016.03.021 CrossRefGoogle Scholar
  5. 5.
    Broumandnia A (2019) Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J Inf Secur Appl 47:188–198.  https://doi.org/10.1016/j.jisa.2019.05.004 CrossRefGoogle Scholar
  6. 6.
    Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-box. Chaos, Solitons and Fractals 95:92–101.  https://doi.org/10.1016/j.chaos.2016.12.018 CrossRefzbMATHGoogle Scholar
  7. 7.
    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213.  https://doi.org/10.1016/j.optlaseng.2016.08.009 CrossRefGoogle Scholar
  8. 8.
    Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci (Ny) 355–356:314–327.  https://doi.org/10.1016/j.ins.2015.10.027 CrossRefGoogle Scholar
  9. 9.
    Enayatifar R, Abdullah AH, Isnin IF et al (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154.  https://doi.org/10.1016/j.optlaseng.2016.10.006 CrossRefGoogle Scholar
  10. 10.
    Hu T, Liu Y, Gong LH et al (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243.  https://doi.org/10.1016/j.sigpro.2016.12.008 CrossRefGoogle Scholar
  11. 11.
    Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci (Ny) 297:80–94.  https://doi.org/10.1016/j.ins.2014.11.018 CrossRefGoogle Scholar
  12. 12.
    Huang X, Ye G (2018) An image encryption algorithm based on irregular wave representation. Multimed Tools Appl 77:2611–2628CrossRefGoogle Scholar
  13. 13.
    Khan MA (2016) A survey of security issues for cloud computing. J Netw Comput Appl 71:11–29.  https://doi.org/10.1016/j.jnca.2016.05.010 CrossRefGoogle Scholar
  14. 14.
    Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26:1137–1148.  https://doi.org/10.1007/s00521-014-1800-0 CrossRefGoogle Scholar
  15. 15.
    Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:1–35.  https://doi.org/10.1007/s13319-017-0148-5 CrossRefGoogle Scholar
  16. 16.
    Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimed Tools Appl 77:19209–19234CrossRefGoogle Scholar
  17. 17.
    Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Comput 5:48–57.  https://doi.org/10.1109/MCC.2018.111121403 CrossRefGoogle Scholar
  18. 18.
    Rathore S, Sharma PK, Loia V et al (2017) Social network security: issues, challenges, threats, and solutions. Inf Sci (Ny) 421:43–69.  https://doi.org/10.1016/j.ins.2017.08.063 CrossRefGoogle Scholar
  19. 19.
    Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos blend to secure medical privacy. IEEE Trans Nanobioscience 1241.  https://doi.org/10.1109/TNB.2017.2780881 CrossRefGoogle Scholar
  20. 20.
    Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6.  https://doi.org/10.1186/s13677-017-0097-9
  21. 21.
    Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115.  https://doi.org/10.1016/j.jnca.2016.11.027 CrossRefGoogle Scholar
  22. 22.
    Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222.  https://doi.org/10.1016/j.jnca.2016.09.002 CrossRefGoogle Scholar
  23. 23.
    Tao M, Ota K, Dong M (2017) Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes. Futur Gener Comput Syst 76:528–539.  https://doi.org/10.1016/j.future.2016.11.012 CrossRefGoogle Scholar
  24. 24.
    Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18.  https://doi.org/10.1016/j.optlaseng.2014.08.005 CrossRefGoogle Scholar
  25. 25.
    Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61.  https://doi.org/10.1016/j.optlaseng.2015.03.022 CrossRefGoogle Scholar
  26. 26.
    Wang B, Xie Y, Zhou C et al (2016) Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps. Optik (Stuttg) 127:3541–3545.  https://doi.org/10.1016/j.ijleo.2016.01.015 CrossRefGoogle Scholar
  27. 27.
    Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76:24251–24280.  https://doi.org/10.1007/s11042-016-4102-y CrossRefGoogle Scholar
  28. 28.
    Wu Y, Zhou Y, Saveriades G et al (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323–342.  https://doi.org/10.1016/j.ins.2012.07.049 MathSciNetCrossRefzbMATHGoogle Scholar
  29. 29.
    Yang R, Xu Q, Au MH et al (2018) Position based cryptography with location privacy: a step for fog computing. Futur Gener Comput Syst 78:799–806.  https://doi.org/10.1016/j.future.2017.05.035 CrossRefGoogle Scholar
  30. 30.
    Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU - Int J Electron Commun 68:186–192.  https://doi.org/10.1016/j.aeue.2013.08.007 CrossRefGoogle Scholar
  31. 31.
    Zhang Y, He Q, Xiang Y et al (2018) Low-cost and confidentiality-preserving data Acquisition for Internet of multimedia things. IEEE Internet Things J 5:3442–3451.  https://doi.org/10.1109/JIOT.2017.2781737 CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of ECE, School of Electrical & Electronics EngineeringSASTRA Deemed UniversityThanjavurIndia
  2. 2.Site Reliability Engineering (SRE) DivisionReliance Jio Infocomm. Ltd. (RJIL)BangaloreIndia

Personalised recommendations