Advertisement

Three stage hybrid encryption of cloud data with penta-layer security for online business users

  • S. Subashanthini
  • M. PounambalEmail author
Original Article
  • 2 Downloads

Abstract

Interactive media applications in smart electronic business (e-business), for example, web based exchanging and Internet advertising, dependably face security issues in storing and retrieval of text, images, audio and video. The proposed work addresses the problem of security in e-commerce and proposes a unified framework to secure the image data that are stored in the third party cloud. A three-stage image encryption procedure is proposed in this paper, which combines integer wavelet transform (IWT), chaotic maps and deoxyribose nucleic acid (DNA) encoding rule. The proposed technique uses five levels of security by generating five key sequences through five different chaotic maps. A grayscale image is partitioned as 8 × 8 blocks. Key 1 is generated using logistic map to select an 8 × 8 block randomly. Line map is utilized to create Key 2, in order to scramble the selected 8 × 8 block. Tent map derives Key 3 to randomize the choice of IWTs between Haar or 5/3. Approximation coefficients are scrambled using Key 4 derived from Henon map. The resultant scrambled block is encrypted by selecting a DNA rule using Key 5 that is generated using sine map. The proposed methodology is validated through several performance analysis metrics, and the algorithm achieves an entropy of 7.99, PSNR of 9 dB and near-zero correlation. The algorithm is also resistant to differential attacks and brute force with the key space greater than 2128.

Keywords

E-commerce Cloud storage Chaotic maps DNA encoding Integer wavelet transform Image encryption 

Notes

References

  1. Belazi A, Abd El-Latif AA, Diaconu A, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50.  https://doi.org/10.1016/j.optlaseng.2016.07.010 CrossRefGoogle Scholar
  2. Cai S, Huang L, Chen X, Xiong X (2018) A symmetric plaintext-related color image encryption system based on bit permutation. Entropy 20(4):282.  https://doi.org/10.3390/e20040282 CrossRefGoogle Scholar
  3. Goldstein A, Frank U (2016) Components of a multi-perspective modeling method for designing and managing IT security systems. Inf Syst E-Bus Manag 14:101.  https://doi.org/10.1007/s10257-015-0276-5 CrossRefGoogle Scholar
  4. Huang X, Ye G (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci Numer Simul 19(12):4094–4104.  https://doi.org/10.1016/j.cnsns.2014.04.012 CrossRefGoogle Scholar
  5. Khajouei H, Kazemi M, Moosavirad SH (2017) Ranking information security controls by using fuzzy analytic hierarchy process. Inf Syst E-Bus Manag 15:1.  https://doi.org/10.1007/s10257-016-0306-y CrossRefGoogle Scholar
  6. Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39(2):1039–1047.  https://doi.org/10.1007/s13369-013-0713-z CrossRefGoogle Scholar
  7. Li S, Yin B, Ding W, Zhang T, Ma Y (2018) A nonlinearly modulated logistic map with delay for image encryption. Electronics (Switzerland) 7(11):326.  https://doi.org/10.3390/electronics7110326 Google Scholar
  8. Liu L, Zhang Q, Wei X (2012a) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248.  https://doi.org/10.1016/j.compeleceng.2012.02.007 CrossRefGoogle Scholar
  9. Liu H, Wang X, Kadir A (2012b) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput J 12(5):1457–1466.  https://doi.org/10.1016/j.asoc.2012.01.016 CrossRefGoogle Scholar
  10. Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical data sheet in safe havens: a tri-layer cryptic solution. Comput Biol Med 62:264–276.  https://doi.org/10.1016/j.compbiomed.2015.04.031 CrossRefGoogle Scholar
  11. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65(1):65–78.  https://doi.org/10.1007/s11235-016-0212-0 CrossRefGoogle Scholar
  12. Ramalingam B, Rengarajan A, Rayappan JBB (2017) Hybrid image crypto system for secure image communication: a VLSI approach. Microprocess Microsyst 50:1–13.  https://doi.org/10.1016/j.micpro.2017.02.003 CrossRefGoogle Scholar
  13. Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184.  https://doi.org/10.1016/j.compbiomed.2016.03.020 CrossRefGoogle Scholar
  14. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Trans Nanobiosci 16(8):850–858.  https://doi.org/10.1109/TNB.2017.2780881 CrossRefGoogle Scholar
  15. Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1–2):511–529.  https://doi.org/10.1007/s11071-015-2008-2 CrossRefGoogle Scholar
  16. Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21–34.  https://doi.org/10.1016/j.ins.2014.02.004 CrossRefGoogle Scholar
  17. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245.  https://doi.org/10.1007/s11042-016-3311-8 CrossRefGoogle Scholar
  18. Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput J 11(1):514–522.  https://doi.org/10.1016/j.asoc.2009.12.011 CrossRefGoogle Scholar
  19. Wang X, Gu S, Zhang Y (2015) Novel image encryption algorithm based on cycle shift and chaotic system. Opt Lasers Eng 68:126–134.  https://doi.org/10.1016/j.optlaseng.2014.12.025 CrossRefGoogle Scholar
  20. Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349–350:137–153.  https://doi.org/10.1016/j.ins.2016.02.041 CrossRefGoogle Scholar
  21. Xiao G, Lu M, Qin L, Lai X (2006) New field of cryptography: DNA cryptography. Chin Sci Bull 51(12):1413–1420.  https://doi.org/10.1007/s11434-006-2012-5 Google Scholar
  22. Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52.  https://doi.org/10.1016/j.optlaseng.2016.10.012 CrossRefGoogle Scholar
  23. Ye G, Huang X (2016) A feedback chaotic image encryption scheme based on both bit-level and pixel-level. JVC J Vib Control 22(5):1171–1180.  https://doi.org/10.1177/1077546314534717 CrossRefGoogle Scholar
  24. Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913.  https://doi.org/10.3390/e20120913 CrossRefGoogle Scholar
  25. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11–12):2028–2035.  https://doi.org/10.1016/j.mcm.2010.06.005 CrossRefGoogle Scholar
  26. Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU Int J Electron Commun 68(3):186–192.  https://doi.org/10.1016/j.aeue.2013.08.007 CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Information TechnologyVellore Institute of TechnologyVelloreIndia

Personalised recommendations