Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map

被引:1
作者
Priyadarsini, K. [1 ]
Sivaraman, Arun Kumar [2 ]
Md, Abdul Quadir [2 ]
Malibari, Areej [3 ]
机构
[1] SRM Inst Sci & Technol, Coll Engn & Technol, Sch Comp, Dept Data Sci & Business Syst, Chennai 603203, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai 600127, Tamil Nadu, India
[3] Princess Nourah bint Abdulrahman Univ, Coll Engn, Dept Ind & Syst Engn, POB 84428, Riyadh 11671, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 03期
关键词
Chaotic cat map; fog computing; encryption; 3D point fog; 3D mesh; IMAGE ENCRYPTION; CLOUD;
D O I
10.32604/cmc.2023.030648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts of data. The major concerns in this domain are security and privacy. Therefore, attaining a reliable level of confidentiality in the fog computing environment is a pivotal task. Among different types of data stored in the fog, the 3D point and mesh fog data are increasingly popular in recent days, due to the growth of 3D modelling and 3D printing technologies. Hence, in this research, we propose a novel scheme for preserving the privacy of 3D point and mesh fog data. Chaotic Cat map-based data encryption is a recently trending research area due to its unique properties like pseudo-randomness, deterministic nature, sensitivity to initial conditions, ergodicity, etc. To boost encryption efficiency significantly, in this work, we propose a novel Chaotic Cat map. The sequence generated by this map is used to transform the coordinates of the fog data. The improved range of the proposed map is depicted using bifurcation analysis. The quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate entropy. We also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical attack. The experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature.
引用
收藏
页码:6703 / 6717
页数:15
相关论文
共 46 条
[1]  
Abdul Quadir Md, 2022, Artificial Intelligence and Technologies: Select Proceedings of ICRTAC-AIT 2020. Lecture Notes in Electrical Engineering (806), P515, DOI 10.1007/978-981-16-6448-9_50
[2]   Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption [J].
Alabdulatif, Abdulatif ;
Khalil, Ibrahim ;
Yi, Xun .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :192-204
[3]  
Arora R., 2013, Int. J. Eng. Res. App, V3, P1922
[4]   Abnormality Identification in Video Surveillance System using DCT [J].
Balasundaram, A. ;
Dilip, Golda ;
Manickam, M. ;
Sivaraman, Arun Kumar ;
Gurunathan, K. ;
Dhanalakshmi, R. ;
Ashokkumar, S. .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (02) :693-704
[5]  
Balasundaram A., 2021, INT C SYST COMP AUT, P1
[6]  
Dhanalakshmi R, 2022, CLOUD FOG COMPUTING, V28, P1
[7]  
Ganga M, 2021, Advances in Parallel Computing (Smart Intelligent Computing and Communication Technology), V38, P402
[8]  
Gayathri R., 2020, ADV MATH SCI J, V9, P5105, DOI [10.37418/amsj.9.7.76, DOI 10.37418/AMSJ.9.7.76]
[9]  
Gayathri R., 2020, J GREEN ENG, V10, P13224
[10]   3D Mesh Labeling via Deep Convolutional Neural Networks [J].
Guo, Kan ;
Zou, Dongqing ;
Chen, Xiaowu .
ACM TRANSACTIONS ON GRAPHICS, 2015, 35 (01)