Skip to main content

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSSIGNAL))

  • 511 Accesses

Abstract

The CS’s advantage of low-energy sampling makes it be well used for IoT with limited resources. Besides of energy consideration, this chapter focuses mainly on the security aspects. A low-cost and confidentiality-preserving data acquisition framework in IoT based on chaotic convolution and random subsampling is firstly proposed. Chaotic encryption ensures the security of sampling process. The sampled images are assembled into a big master image, which is encrypted by Arnold transform and single value diffusion. Both of these two encryption operations both have low computational complexity. The final encrypted image is uploaded to cloud servers for storage and decryption service. Then, we discussed the issue of how to securely store and share these big image data from IoT. We harness the hybrid cloud to provide secure big image data storage and share service for users. The basic idea is to partition each image into a small set of sensitive data and a large set of insensitive data, which are securely stored in the private cloud and the public cloud, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Fragkiadakis, P. Charalampidis, E. Tragos, Adaptive compressive sensing for energy efficient smart objects in IoT applications, in 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, VITAE (IEEE, 2014), pp. 1–5

    Google Scholar 

  2. S. Li, L. Da Xu, X. Wang, Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans. Ind. Infor. 9(4), 2177–2186 (2013)

    Article  Google Scholar 

  3. A.M. Dixon, E.G. Allstot, D. Gangopadhyay, D.J. Allstot, Compressed sensing system considerations for ECG and EMG wireless biosensors. IEEE Trans. Biomedical Circ. Syst. 6(2), 156–166 (2012)

    Article  Google Scholar 

  4. J. Romberg, Compressive sensing by random convolution. SIAM J. Imag. Sci. 2(4), 1098–1128 (2009)

    Google Scholar 

  5. Y. Zhou, Z. Hua, C.-M. Pun, C.P. Chen, Cascade chaotic system with applications. IEEE Trans. Cyber. 45(9), 2001–2012 (2015)

    Google Scholar 

  6. Z. Hua, Y. Zhou, Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)

    Google Scholar 

  7. M. Khalili, D. Asatryan, Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map. IET Signal Process. 7(3), 177–187 (2013)

    Article  MathSciNet  Google Scholar 

  8. Y. Li, B. Song, R. Cao, Y. Zhang, H. Qin, Image encryption based on compressive sensing and scrambled index for secure multimedia transmission. ACM Trans. Multimed. Comput. Commun. Appl. 12(4s), 62 (2016)

    Google Scholar 

  9. L.Y. Zhang, Y. Liu, F. Pareschi, Y. Zhang, K.-W. Wong, R. Rovatti, G. Setti, On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. 48(4), 1163–1175 (2018)

    Article  Google Scholar 

  10. Y. Zhang, D. Xiao, Y. Shu, J. Li, A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process.-Image Commun. 28(3), 292–300 (2013)

    Google Scholar 

  11. L.Y. Zhang, X. Hu, Y. Liu, K.-W. Wong, J. Gan, A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simu. 19(10), 3653–3659 (2014)

    Article  MathSciNet  Google Scholar 

  12. J.-X. Chen, Z.-L. Zhu, C. Fu, L.-B. Zhang, Y. Zhang, An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn., 1–16 (2015)

    Google Scholar 

  13. C. Wang, B. Zhang, K. Ren, J. Wang, Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1(1), 166–177 (2013)

    Google Scholar 

  14. Y. Zhang, J. Zhou, Y. Xiang, L.Y. Zhang, F. Chen, S. Pang, X. Liao, Computation outsourcing meets lossy channel: secure sparse robustness decoding service in multi-clouds. IEEE Trans. Big Data (in press, 2017)

    Google Scholar 

  15. Y. Zhang, H. Huang, Y. Xiang, L.Y. Zhang, X. He, Harnessing the hybrid cloud for secure big image data service. IEEE Internet Things J. 4(5), 1380–1388 (2017)

    Google Scholar 

  16. L.I. Rudin, S. Osher, E. Fatemi, Nonlinear total variation based noise removal algorithms. Phys. D Nonlinear Phenom. 60(1–4), 259–268 (1992)

    Article  MathSciNet  Google Scholar 

  17. S.D. Babacan, R. Molina, A.K. Katsaggelos, Variational bayesian blind deconvolution using a total variation prior. IEEE Trans. Image Process. 18(1), 12–26 (2009)

    Article  MathSciNet  Google Scholar 

  18. J.-X. Chen, Z.-L. Zhu, C. Fu, L.-B. Zhang, Y. Zhang, An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun. Nonlinear Sci. Numerical Simu. 23(1–3), 294–310 (2015)

    Google Scholar 

  19. Z. Hua, Y. Zhou, Design of image cipher using block-based scrambling and image filtering. Inf. Sci. 396, 97–113 (2017)

    Google Scholar 

  20. N. Zhou, Y. Wang, L. Gong, H. He, J. Wu, Novel single-channel color image encryption algorithm based on chaos and fractional fourier transform. Opt. Commun. 284(12), 2789–2796 (2011)

    Article  Google Scholar 

  21. M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, K. Ramchandran, On compressing encrypted data. IEEE Trans. Signal Process. 52(10), 2992–3006 (2004)

    Article  MathSciNet  Google Scholar 

  22. Wikipedia (2018), https://en.wikipedia.org/wiki/Sobel_operator

  23. Y. Zhang, D. Xiao, W. Wen, Y. Tian, Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt. Laser Tech. 54, 1–6 (2013)

    Google Scholar 

  24. X. Zhang, Lossy compression and iterative reconstruction for encrypted image. IEEE Trans. Inf. Forensics Sec. 6(1), 53–58 (2011)

    Article  Google Scholar 

  25. X. Zhang, G. Feng, Y. Ren, Z. Qian, Scalable coding of encrypted images. IEEE Trans. Image Process. 21(6), 3108–3114 (2012)

    Article  MathSciNet  Google Scholar 

  26. J. Zhou, X. Liu, O.C. Au, Y.Y. Tang, Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE trans. Inf. Forensics Sec. 9(1), 39–50 (2014)

    Article  Google Scholar 

  27. J. Zhou, O.C. Au, G. Zhai, Y.Y. Tang, X. Liu, Scalable compression of stream cipher encrypted images through context-adaptive sampling. IEEE Trans. Inf. Forensics Sec. 9(11), 1857–1868 (2014)

    Article  Google Scholar 

  28. E.J. Candès, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)

    Google Scholar 

  29. D.L. Donoho, Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)

    Google Scholar 

  30. H. Fang, S.A. Vorobyov, H. Jiang, O. Taheri, Permutation meets parallel compressed sensing: how to relax restricted isometry property for 2D sparse signals. IEEE Trans. Signal Process. 62(1), 196–210 (2014)

    Google Scholar 

  31. Y. Zhang, J. Zhou, F. Chen, L.Y. Zhang, K.-W. Wong, H. Xing, D. Xiao, Embedding cryptographic features in compressive sensing. Neurocomput. 205, 472–480 (2016)

    Google Scholar 

  32. L.Y. Zhang, K.-W. Wong, Y. Zhang, J. Zhou, Bi-level protected compressive sampling. IEEE Trans. Multimed. 18(9), 1720–1732 (2016)

    Google Scholar 

  33. V.K. Goyal, A.K. Fletcher, S. Rangan, Compressive sampling and lossy compression. IEEE Signal Process. Mag. 25(2), 48–56 (2008)

    Article  Google Scholar 

  34. M. Grant, S. Boyd, Y. Ye, CVX: Matlab software for disciplined convex programming (2008)

    Google Scholar 

  35. J. Katz, Y. Lindell, Introduction to Modern Cryptography (CRC press, 2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yushu Zhang .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhang, Y., Xiang, Y., Zhang, L.Y. (2019). Internet of Things Security. In: Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-13-2523-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2523-6_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2522-9

  • Online ISBN: 978-981-13-2523-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics