Abstract
The CS’s advantage of low-energy sampling makes it be well used for IoT with limited resources. Besides of energy consideration, this chapter focuses mainly on the security aspects. A low-cost and confidentiality-preserving data acquisition framework in IoT based on chaotic convolution and random subsampling is firstly proposed. Chaotic encryption ensures the security of sampling process. The sampled images are assembled into a big master image, which is encrypted by Arnold transform and single value diffusion. Both of these two encryption operations both have low computational complexity. The final encrypted image is uploaded to cloud servers for storage and decryption service. Then, we discussed the issue of how to securely store and share these big image data from IoT. We harness the hybrid cloud to provide secure big image data storage and share service for users. The basic idea is to partition each image into a small set of sensitive data and a large set of insensitive data, which are securely stored in the private cloud and the public cloud, respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Fragkiadakis, P. Charalampidis, E. Tragos, Adaptive compressive sensing for energy efficient smart objects in IoT applications, in 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, VITAE (IEEE, 2014), pp. 1–5
S. Li, L. Da Xu, X. Wang, Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans. Ind. Infor. 9(4), 2177–2186 (2013)
A.M. Dixon, E.G. Allstot, D. Gangopadhyay, D.J. Allstot, Compressed sensing system considerations for ECG and EMG wireless biosensors. IEEE Trans. Biomedical Circ. Syst. 6(2), 156–166 (2012)
J. Romberg, Compressive sensing by random convolution. SIAM J. Imag. Sci. 2(4), 1098–1128 (2009)
Y. Zhou, Z. Hua, C.-M. Pun, C.P. Chen, Cascade chaotic system with applications. IEEE Trans. Cyber. 45(9), 2001–2012 (2015)
Z. Hua, Y. Zhou, Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)
M. Khalili, D. Asatryan, Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map. IET Signal Process. 7(3), 177–187 (2013)
Y. Li, B. Song, R. Cao, Y. Zhang, H. Qin, Image encryption based on compressive sensing and scrambled index for secure multimedia transmission. ACM Trans. Multimed. Comput. Commun. Appl. 12(4s), 62 (2016)
L.Y. Zhang, Y. Liu, F. Pareschi, Y. Zhang, K.-W. Wong, R. Rovatti, G. Setti, On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. 48(4), 1163–1175 (2018)
Y. Zhang, D. Xiao, Y. Shu, J. Li, A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process.-Image Commun. 28(3), 292–300 (2013)
L.Y. Zhang, X. Hu, Y. Liu, K.-W. Wong, J. Gan, A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simu. 19(10), 3653–3659 (2014)
J.-X. Chen, Z.-L. Zhu, C. Fu, L.-B. Zhang, Y. Zhang, An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn., 1–16 (2015)
C. Wang, B. Zhang, K. Ren, J. Wang, Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1(1), 166–177 (2013)
Y. Zhang, J. Zhou, Y. Xiang, L.Y. Zhang, F. Chen, S. Pang, X. Liao, Computation outsourcing meets lossy channel: secure sparse robustness decoding service in multi-clouds. IEEE Trans. Big Data (in press, 2017)
Y. Zhang, H. Huang, Y. Xiang, L.Y. Zhang, X. He, Harnessing the hybrid cloud for secure big image data service. IEEE Internet Things J. 4(5), 1380–1388 (2017)
L.I. Rudin, S. Osher, E. Fatemi, Nonlinear total variation based noise removal algorithms. Phys. D Nonlinear Phenom. 60(1–4), 259–268 (1992)
S.D. Babacan, R. Molina, A.K. Katsaggelos, Variational bayesian blind deconvolution using a total variation prior. IEEE Trans. Image Process. 18(1), 12–26 (2009)
J.-X. Chen, Z.-L. Zhu, C. Fu, L.-B. Zhang, Y. Zhang, An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun. Nonlinear Sci. Numerical Simu. 23(1–3), 294–310 (2015)
Z. Hua, Y. Zhou, Design of image cipher using block-based scrambling and image filtering. Inf. Sci. 396, 97–113 (2017)
N. Zhou, Y. Wang, L. Gong, H. He, J. Wu, Novel single-channel color image encryption algorithm based on chaos and fractional fourier transform. Opt. Commun. 284(12), 2789–2796 (2011)
M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, K. Ramchandran, On compressing encrypted data. IEEE Trans. Signal Process. 52(10), 2992–3006 (2004)
Wikipedia (2018), https://en.wikipedia.org/wiki/Sobel_operator
Y. Zhang, D. Xiao, W. Wen, Y. Tian, Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt. Laser Tech. 54, 1–6 (2013)
X. Zhang, Lossy compression and iterative reconstruction for encrypted image. IEEE Trans. Inf. Forensics Sec. 6(1), 53–58 (2011)
X. Zhang, G. Feng, Y. Ren, Z. Qian, Scalable coding of encrypted images. IEEE Trans. Image Process. 21(6), 3108–3114 (2012)
J. Zhou, X. Liu, O.C. Au, Y.Y. Tang, Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE trans. Inf. Forensics Sec. 9(1), 39–50 (2014)
J. Zhou, O.C. Au, G. Zhai, Y.Y. Tang, X. Liu, Scalable compression of stream cipher encrypted images through context-adaptive sampling. IEEE Trans. Inf. Forensics Sec. 9(11), 1857–1868 (2014)
E.J. Candès, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)
D.L. Donoho, Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)
H. Fang, S.A. Vorobyov, H. Jiang, O. Taheri, Permutation meets parallel compressed sensing: how to relax restricted isometry property for 2D sparse signals. IEEE Trans. Signal Process. 62(1), 196–210 (2014)
Y. Zhang, J. Zhou, F. Chen, L.Y. Zhang, K.-W. Wong, H. Xing, D. Xiao, Embedding cryptographic features in compressive sensing. Neurocomput. 205, 472–480 (2016)
L.Y. Zhang, K.-W. Wong, Y. Zhang, J. Zhou, Bi-level protected compressive sampling. IEEE Trans. Multimed. 18(9), 1720–1732 (2016)
V.K. Goyal, A.K. Fletcher, S. Rangan, Compressive sampling and lossy compression. IEEE Signal Process. Mag. 25(2), 48–56 (2008)
M. Grant, S. Boyd, Y. Ye, CVX: Matlab software for disciplined convex programming (2008)
J. Katz, Y. Lindell, Introduction to Modern Cryptography (CRC press, 2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Zhang, Y., Xiang, Y., Zhang, L.Y. (2019). Internet of Things Security. In: Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-13-2523-6_5
Download citation
DOI: https://doi.org/10.1007/978-981-13-2523-6_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2522-9
Online ISBN: 978-981-13-2523-6
eBook Packages: EngineeringEngineering (R0)