Abstract
Multimedia is currently seen to dominate the internet network and the mobile network traffic; hence, it is seen as the largest Big data. Generally, the symmetric encryption algorithms are applied to the ‘big multimedia data’; however; these algorithms are thought as very slow. In our study, we developed and designed a resource-efficient encryption algorithm system which applies the multithreaded programming process for the encryption of the big multimedia data. This proposed system describes a multi-level encryption model which uses the Feistel Encryption Scheme, genetic algorithms and the Advanced Encryption Standard (AES). Our system has been assessed for actual medical-based big multimedia data and compared to the benchmarked encryption algorithms like the RC6, MARS, 3-DES, DES, and Blowfish with regards to the computational run time and its throughput for the encryption and decryption procedures. In addition, the multithreaded programming approach is adopted to implement the proposed encryption system in order to enhace the system effeciencey and porfermance. Furthermore, we also compared our system with its sequential version for showing its resource efficiency. Our results indicated that our system had the least run time and a higher throughput for the encryption and decryption processes in comparison to the already existing standard encryption algorithms. Also, our system could improve the computation run time by approximately 75% and its throughput was also increased by 4-times in comparison to its sequential version. For fulfilling the security objectives, our algorithm showed a better Avalanche Effect in comparison to the existing algorithms and therefore, could be included in any encryption/decryption process of a big plain multimedia data.
Similar content being viewed by others
References
[online] [Accessed August 2016]. Available from URL http://www.sesame.org.jo
[online] [Accessed July 2016]. Available from URL http://www.nvidia.com/content/pdf/kepler/tesla-k20-passive-bd-06455-001-v07.pdf
Aljawarneh S, Alkhateeb F, & Al Maghayreh, E. (2010) A semantic data validation service for web applications. Journal of theoretical and applied electronic commerce research 5(1):39–55
Aljawarneh S, Masadeh S, Alkhateeb F (2010) A secure wifi system for wireless networks: an experimental evaluation. Netw Secur 2010(6):6–12
Aljawarneh SA, Moftah RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77
Aljawarneh S, Bani Yassein M, Talafha T (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl:1–22
Bhandari L, Wadhe A (2013) Speeding up video encryption using elliptic curve cryptography (ECC). Int J Emerg Res Manag Technol 2(3):24–29
Chen M, Mao S, Liu Y (2014) Big data: a survey. Mobile Netw Appl 19(2):171–209
De Mauro A, Greco M, Grimaldi M (2015) What is big data? A consensual definition and a review of key research topics. AIP Conf Proc 1644(1):97–104
Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. Int J Comput Netw Secur 10(3):216–222
Fifer RM (1989) Cost benchmarking functions in the value chain. Plan rev 17(3):18–19
Hayes J. Multimedia big data: content analysis and retrieval. InBig-data analytics and Cloud computing 2015 (pp. 37-51). Springer International Publishing
Heys HM, Tavares SE (1995) Avalanche characteristics of substitution-permutation encryption networks. IEEE Trans Comput 44(9):1131–1139
Jindal P, Singh B. Analyzing the security-performance tradeoff in block ciphers. InComputing, Communication & Automation (ICCCA), 2015 International Conference on 2015 May 15 (pp. 326-331). IEEE
Kurniawan Y, Albone A, Rahyuwibowo H. The design of mini PGP security. In Electrical engineering and informatics (ICEEI), 2011 International Conference on 2011 Jul 17 (pp. 1-4). IEEE
Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC press, Florida; 1996 Oct 16
Mitchell M. An introduction to genetic algorithms. MIT press, Cambridge; 1998
Nadeem A, Javed MY. A performance comparison of data encryption algorithms. In 2005 international Conference on information and communication technologies 2005 Aug 27 (pp. 84-89). IEEE
Reddy MI, Kumar AS (2016) Secured data transmission using wavelet based steganography and cryptography by using AES algorithm. Procedia Comput Sci 85:62–69
Schneier B (1997) Cryptography, security, and the future. Commun ACM 40(1):138–139
Schweitzer D, Boleng J (2009) Designing web labs for teaching security concepts. J Comput Sci Coll 25(2):39–45
Sindhuja K, Pramela DS (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inform Tech 5(1):414–416
Wang W, Hu Y, Chen L, Huang X, Sunar B. Accelerating fully homomorphic encryption using GPU. InHigh performance extreme computing (HPEC), 2012 I.E. Conference on 2012 Sep 10 (pp. 1-5). IEEE
Yadav A, Verma M, Patidar K. An efficient video data security mechanism based on RP-AES; 2016
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Aljawarneh, S., Yassein, M.B. & Talafha, W.A. A multithreaded programming approach for multimedia big data: encryption system. Multimed Tools Appl 77, 10997–11016 (2018). https://doi.org/10.1007/s11042-017-4873-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4873-9