Three stage hybrid encryption of cloud data with penta-layer security for online business users (original) (raw)
Abstract
Interactive media applications in smart electronic business (e-business), for example, web based exchanging and Internet advertising, dependably face security issues in storing and retrieval of text, images, audio and video. The proposed work addresses the problem of security in e-commerce and proposes a unified framework to secure the image data that are stored in the third party cloud. A three-stage image encryption procedure is proposed in this paper, which combines integer wavelet transform (IWT), chaotic maps and deoxyribose nucleic acid (DNA) encoding rule. The proposed technique uses five levels of security by generating five key sequences through five different chaotic maps. A grayscale image is partitioned as 8 × 8 blocks. Key 1 is generated using logistic map to select an 8 × 8 block randomly. Line map is utilized to create Key 2, in order to scramble the selected 8 × 8 block. Tent map derives Key 3 to randomize the choice of IWTs between Haar or 5/3. Approximation coefficients are scrambled using Key 4 derived from Henon map. The resultant scrambled block is encrypted by selecting a DNA rule using Key 5 that is generated using sine map. The proposed methodology is validated through several performance analysis metrics, and the algorithm achieves an entropy of 7.99, PSNR of 9 dB and near-zero correlation. The algorithm is also resistant to differential attacks and brute force with the key space greater than 2128.
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
Similar content being viewed by others
References
- Belazi A, Abd El-Latif AA, Diaconu A, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50. https://doi.org/10.1016/j.optlaseng.2016.07.010
Article Google Scholar - Cai S, Huang L, Chen X, Xiong X (2018) A symmetric plaintext-related color image encryption system based on bit permutation. Entropy 20(4):282. https://doi.org/10.3390/e20040282
Article Google Scholar - Goldstein A, Frank U (2016) Components of a multi-perspective modeling method for designing and managing IT security systems. Inf Syst E-Bus Manag 14:101. https://doi.org/10.1007/s10257-015-0276-5
Article Google Scholar - Huang X, Ye G (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci Numer Simul 19(12):4094–4104. https://doi.org/10.1016/j.cnsns.2014.04.012
Article Google Scholar - Khajouei H, Kazemi M, Moosavirad SH (2017) Ranking information security controls by using fuzzy analytic hierarchy process. Inf Syst E-Bus Manag 15:1. https://doi.org/10.1007/s10257-016-0306-y
Article Google Scholar - Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39(2):1039–1047. https://doi.org/10.1007/s13369-013-0713-z
Article Google Scholar - Li S, Yin B, Ding W, Zhang T, Ma Y (2018) A nonlinearly modulated logistic map with delay for image encryption. Electronics (Switzerland) 7(11):326. https://doi.org/10.3390/electronics7110326
Article Google Scholar - Liu L, Zhang Q, Wei X (2012a) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248. https://doi.org/10.1016/j.compeleceng.2012.02.007
Article Google Scholar - Liu H, Wang X, Kadir A (2012b) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput J 12(5):1457–1466. https://doi.org/10.1016/j.asoc.2012.01.016
Article Google Scholar - Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical data sheet in safe havens: a tri-layer cryptic solution. Comput Biol Med 62:264–276. https://doi.org/10.1016/j.compbiomed.2015.04.031
Article Google Scholar - Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65(1):65–78. https://doi.org/10.1007/s11235-016-0212-0
Article Google Scholar - Ramalingam B, Rengarajan A, Rayappan JBB (2017) Hybrid image crypto system for secure image communication: a VLSI approach. Microprocess Microsyst 50:1–13. https://doi.org/10.1016/j.micpro.2017.02.003
Article Google Scholar - Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184. https://doi.org/10.1016/j.compbiomed.2016.03.020
Article Google Scholar - Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Trans Nanobiosci 16(8):850–858. https://doi.org/10.1109/TNB.2017.2780881
Article Google Scholar - Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1–2):511–529. https://doi.org/10.1007/s11071-015-2008-2
Article Google Scholar - Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21–34. https://doi.org/10.1016/j.ins.2014.02.004
Article Google Scholar - Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245. https://doi.org/10.1007/s11042-016-3311-8
Article Google Scholar - Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput J 11(1):514–522. https://doi.org/10.1016/j.asoc.2009.12.011
Article Google Scholar - Wang X, Gu S, Zhang Y (2015) Novel image encryption algorithm based on cycle shift and chaotic system. Opt Lasers Eng 68:126–134. https://doi.org/10.1016/j.optlaseng.2014.12.025
Article Google Scholar - Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349–350:137–153. https://doi.org/10.1016/j.ins.2016.02.041
Article Google Scholar - Xiao G, Lu M, Qin L, Lai X (2006) New field of cryptography: DNA cryptography. Chin Sci Bull 51(12):1413–1420. https://doi.org/10.1007/s11434-006-2012-5
Article Google Scholar - Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52. https://doi.org/10.1016/j.optlaseng.2016.10.012
Article Google Scholar - Ye G, Huang X (2016) A feedback chaotic image encryption scheme based on both bit-level and pixel-level. JVC J Vib Control 22(5):1171–1180. https://doi.org/10.1177/1077546314534717
Article Google Scholar - Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913. https://doi.org/10.3390/e20120913
Article Google Scholar - Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11–12):2028–2035. https://doi.org/10.1016/j.mcm.2010.06.005
Article Google Scholar - Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU Int J Electron Commun 68(3):186–192. https://doi.org/10.1016/j.aeue.2013.08.007
Article Google Scholar
Author information
Authors and Affiliations
- School of Information Technology, Vellore Institute of Technology, Vellore, India
S. Subashanthini & M. Pounambal
Authors
- S. Subashanthini
- M. Pounambal
Corresponding author
Correspondence toM. Pounambal.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Subashanthini, S., Pounambal, M. Three stage hybrid encryption of cloud data with penta-layer security for online business users.Inf Syst E-Bus Manage 18, 379–404 (2020). https://doi.org/10.1007/s10257-019-00419-6
- Received: 30 May 2019
- Revised: 24 June 2019
- Accepted: 16 July 2019
- Published: 16 August 2019
- Version of record: 16 August 2019
- Issue date: September 2020
- DOI: https://doi.org/10.1007/s10257-019-00419-6