A cloud compatible DNA coded security solution for multimedia file sharing & storage

被引:15
作者
Chidambaram, Nithya [1 ]
Raj, Pethuru [2 ]
Thenmozhi, K. [1 ]
Rajagopalan, Sundararaman [1 ]
Amirtharajan, Rengarajan [1 ]
机构
[1] SASTRA Deemed Univ, Sch Elect & Elect Engn, Dept ECE, Thanjavur 613401, India
[2] RJIL, Site Reliabil Engn SRE Div, Bangalore 560025, Karnataka, India
关键词
DNA coding; Chaotic maps; Image encryption; Cloud computing; IMAGE; ALGORITHM; ISSUES; CHALLENGES; PRIVACY; NETWORK; THREATS; 2D;
D O I
10.1007/s11042-019-08166-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The faster proliferation of software-defined cloud environments across the world for efficiently hosting enterprise-grade applications has led many organisations to embrace the cloud paradigm in a significant way. The cloud storage opportunities and possibilities are consistently expanding, wherein multimedia storage occupies the entire stage in the cloud. An essential emphasis on security owing to the nature of multiuser access to cloud credentials in many situations is necessary. The security and safety of data, while in transit, in rest, and while being used by applications, have to be guaranteed through proven technology solutions. Typically, image encryption is the standard way of securing and safeguarding images. The proposed three-layer image encryption scheme uses DNA coding along with chaotic logistic and tent maps for confusion and diffusion operations. Upon verification of user credentials, the storage of encrypted image is accomplished in Amazon S3 web services. The strength of encryption has been evaluated based on the parameters namely brute force attack, statistical, encryption quality, occlusion attack and computational complexity analyses which have proved the suitability of proposed scheme to secure cloud storage of images.
引用
收藏
页码:33837 / 33863
页数:27
相关论文
共 31 条
[1]   Image encryption based on Independent Component Analysis and Arnold's Cat Map [J].
Abbas, Nidaa AbdulMohsin .
EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (01) :139-146
[2]   Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations [J].
Alsaedi, Mohammed .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (22) :24527-24547
[3]   Customers perspectives on adoption of cloud computing in banking sector [J].
Asadi, Shahla ;
Nilashi, Mehrbakhsh ;
Husin, Abd Razak Che ;
Yadegaridehkordi, Elaheh .
INFORMATION TECHNOLOGY & MANAGEMENT, 2017, 18 (04) :305-330
[4]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[5]   Designing digital image encryption using 2D and 3D reversible modular chaotic maps [J].
Broumandnia, Ali .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 :188-198
[6]   Secure image encryption algorithm design using a novel chaos based S-Box [J].
Cavusoglu, Unal ;
Kacar, Sezgin ;
Pehlivan, Ihsan ;
Zengin, Ahmet .
CHAOS SOLITONS & FRACTALS, 2017, 95 :92-101
[7]   A novel chaos-based image encryption algorithm using DNA sequence operations [J].
Chai, Xiuli ;
Chen, Yiran ;
Broyde, Lucie .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :197-213
[8]   Circular inter-intra pixels bit-level permutation and chaos-based image encryption [J].
Diaconu, Adrian-Viorel .
INFORMATION SCIENCES, 2016, 355 :314-327
[9]   Image encryption using a synchronous permutation-diffusion technique [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi ;
Altameem, Ayman ;
Lee, Malrey .
OPTICS AND LASERS IN ENGINEERING, 2017, 90 :146-154
[10]   Chaotic image cryptosystem using DNA deletion and DNA insertion [J].
Hu, Ting ;
Liu, Ye ;
Gong, Li-Hua ;
Guo, Shao-Feng ;
Yuan, Hong-Mei .
SIGNAL PROCESSING, 2017, 134 :234-243