Abstract
Compressive sensing (CS) is often utilized to encrypt data on resource constrained terminals due to its lightweight and confidentiality. However, due to its low security level, it cannot meet the security requirements when interacting with the cloud in a complex cloud environment. Therefore, the more complex and higher security encryption computing is migrated to the edge device, and CS is combined as a new image data security transmission framework. In terms of image data confidentiality, lightweight encryption based on CS is implemented on the terminal, and then the data is clustered into central data and residual data by the proposed clustering algorithm at the edge, and the central data is further encrypted with high strength. In terms of image data integrity, hash algorithm based on CS is used to verify the correctness of the reconstructed data, and the redundancy of Reed-solomon code (RS) is used to improve the tampering recovery capability of data transmitted between edge devices and cloud. Simulation results and analysis verify the security and applicability of our transmission framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53, 1–23 (2011)
Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: IEEE International Conference on Advanced Information Networking and Applications, pp. 27–33. IEEE (2010)
Tayade, D.: Mobile cloud computing: issues, security, advantages, trends. Int. J. Comput. Sci. Inf. Technol. 5(5), 6635–6639 (2014)
Shi, W., Cao, J., Zhang, Q.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering, pp. 647–651. Hangzhou (2012)
Carcary, M., Doherty, E., Conway, G.: The adoption of cloud computing by Irish SMEs-an exploratory study. Electr. J. Inf. Syst. Evaluat. 17, 3–14 (2014)
Wang, T., Zhou, J., Chen, X.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018)
Wang, T., Mei, Y., Jia, W.: Edge-based differential privacy computing for sensor–cloud systems. J. Parall. Distrib. Comput. 136, 75–85 (2020)
Donoho, D.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)
Candès, E., Wakin, M.: An introduction to compressive sampling. IEEE Signal Process. Mag. 25(2), 21–30 (2008)
Baraniuk, R., Davenport, M., Devore, R.R.: A simple proof of the restricted isometry property for random matrices. Construct. Approx. 28(3), 253–263 (2008)
Candes, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)
Bianchi, T., Bioglio, V., Magli, E.: Analysis of one-time random projections for privacy preserving compressed sensing. IEEE Trans. Inf. Forensics Secur. 11(2), 313–327 (2016)
Chen, J., Zhang, Y., Qi, L.: Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt. Laser Technol. 99, 238–248 (2018)
Gong, L., Qiu, K., Deng, C.: An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 115, 257–267 (2019)
Chai, X., Fu, X., Gan, Z., Zhang, Y., Lu, Y., Chen, Y.: An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput. Appl. 32(9), 4961–4988 (2018)
Xie, D., Chen, F., Luo, Y.: One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit. Signal Process. 95, 1051–2004 (2019)
Zhang, Y., Xiang, Y., Zhang, L.: Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf. Sci. 496, 150–160 (2019)
Zhang, Y., Wang, P., Fang, L.: Secure transmission of compressed sampling data using edge clouds. IEEE Trans. Industr. Inf. 16(10), 6641–6651 (2020)
Zhou, Y., Hua, Z., Pun, C.M.: Cascade chaotic system with applications. IEEE Trans. Cybern. 99, 2168–2267 (2014)
Plank, J.S.: T1: erasure codes for storage applications. In: Proceedings of the 4th USENIX Conference on File and Storage Technologies, San Francisco, CA, pp. 1–74 (2005)
Pak, C., Huang, L.: A new color image encryption using combination of the 1D chaotic map. Signal Process. 138, 129–137 (2017)
Acknowledgment
The work was supported by the National Key R&D Program of China (Grant No. 2020YFB1805400) and the National Natural Science Foundation of China (Grant No. 62072063).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Zheng, H., Huang, Y., Li, L., Xiao, D. (2022). Compressive Sensing-Based Image Encryption and Authentication in Edge-Clouds. In: Þór Jónsson, B., et al. MultiMedia Modeling. MMM 2022. Lecture Notes in Computer Science, vol 13142. Springer, Cham. https://doi.org/10.1007/978-3-030-98355-0_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-98355-0_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-98354-3
Online ISBN: 978-3-030-98355-0
eBook Packages: Computer ScienceComputer Science (R0)