Skip to main content
Log in

A cloud compatible DNA coded security solution for multimedia file sharing & storage

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The faster proliferation of software-defined cloud environments across the world for efficiently hosting enterprise-grade applications has led many organisations to embrace the cloud paradigm in a significant way. The cloud storage opportunities and possibilities are consistently expanding, wherein multimedia storage occupies the entire stage in the cloud. An essential emphasis on security owing to the nature of multiuser access to cloud credentials in many situations is necessary. The security and safety of data, while in transit, in rest, and while being used by applications, have to be guaranteed through proven technology solutions. Typically, image encryption is the standard way of securing and safeguarding images. The proposed three-layer image encryption scheme uses DNA coding along with chaotic logistic and tent maps for confusion and diffusion operations. Upon verification of user credentials, the storage of encrypted image is accomplished in Amazon S3 web services. The strength of encryption has been evaluated based on the parameters namely brute force attack, statistical, encryption quality, occlusion attack and computational complexity analyses which have proved the suitability of proposed scheme to secure cloud storage of images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abbas NA (2016) Image encryption based on independent component analysis and Arnold’s cat map. Egypt Informatics J 17:139–146. https://doi.org/10.1016/j.eij.2015.10.001

    Article  Google Scholar 

  2. Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76:24527–24547. https://doi.org/10.1007/s11042-016-4206-4

    Article  Google Scholar 

  3. Asadi S, Nilashi M, Husin ARC, Yadegaridehkordi E (2017) Customers perspectives on adoption of cloud computing in banking sector. Inf Technol Manag 18:305–330

    Article  Google Scholar 

  4. Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170. https://doi.org/10.1016/j.sigpro.2016.03.021

    Article  Google Scholar 

  5. Broumandnia A (2019) Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J Inf Secur Appl 47:188–198. https://doi.org/10.1016/j.jisa.2019.05.004

    Article  Google Scholar 

  6. Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-box. Chaos, Solitons and Fractals 95:92–101. https://doi.org/10.1016/j.chaos.2016.12.018

    Article  MATH  Google Scholar 

  7. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213. https://doi.org/10.1016/j.optlaseng.2016.08.009

    Article  Google Scholar 

  8. Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci (Ny) 355–356:314–327. https://doi.org/10.1016/j.ins.2015.10.027

    Article  Google Scholar 

  9. Enayatifar R, Abdullah AH, Isnin IF et al (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154. https://doi.org/10.1016/j.optlaseng.2016.10.006

    Article  Google Scholar 

  10. Hu T, Liu Y, Gong LH et al (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243. https://doi.org/10.1016/j.sigpro.2016.12.008

    Article  Google Scholar 

  11. Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci (Ny) 297:80–94. https://doi.org/10.1016/j.ins.2014.11.018

    Article  Google Scholar 

  12. Huang X, Ye G (2018) An image encryption algorithm based on irregular wave representation. Multimed Tools Appl 77:2611–2628

    Article  Google Scholar 

  13. Khan MA (2016) A survey of security issues for cloud computing. J Netw Comput Appl 71:11–29. https://doi.org/10.1016/j.jnca.2016.05.010

    Article  Google Scholar 

  14. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26:1137–1148. https://doi.org/10.1007/s00521-014-1800-0

    Article  Google Scholar 

  15. Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:1–35. https://doi.org/10.1007/s13319-017-0148-5

    Article  Google Scholar 

  16. Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimed Tools Appl 77:19209–19234

    Article  Google Scholar 

  17. Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Comput 5:48–57. https://doi.org/10.1109/MCC.2018.111121403

    Article  Google Scholar 

  18. Rathore S, Sharma PK, Loia V et al (2017) Social network security: issues, challenges, threats, and solutions. Inf Sci (Ny) 421:43–69. https://doi.org/10.1016/j.ins.2017.08.063

    Article  Google Scholar 

  19. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos blend to secure medical privacy. IEEE Trans Nanobioscience 1241. https://doi.org/10.1109/TNB.2017.2780881

    Article  Google Scholar 

  20. Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6. https://doi.org/10.1186/s13677-017-0097-9

  21. Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115. https://doi.org/10.1016/j.jnca.2016.11.027

    Article  Google Scholar 

  22. Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222. https://doi.org/10.1016/j.jnca.2016.09.002

    Article  Google Scholar 

  23. Tao M, Ota K, Dong M (2017) Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes. Futur Gener Comput Syst 76:528–539. https://doi.org/10.1016/j.future.2016.11.012

    Article  Google Scholar 

  24. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005

    Article  Google Scholar 

  25. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61. https://doi.org/10.1016/j.optlaseng.2015.03.022

    Article  Google Scholar 

  26. Wang B, Xie Y, Zhou C et al (2016) Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps. Optik (Stuttg) 127:3541–3545. https://doi.org/10.1016/j.ijleo.2016.01.015

    Article  Google Scholar 

  27. Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76:24251–24280. https://doi.org/10.1007/s11042-016-4102-y

    Article  Google Scholar 

  28. Wu Y, Zhou Y, Saveriades G et al (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323–342. https://doi.org/10.1016/j.ins.2012.07.049

    Article  MathSciNet  MATH  Google Scholar 

  29. Yang R, Xu Q, Au MH et al (2018) Position based cryptography with location privacy: a step for fog computing. Futur Gener Comput Syst 78:799–806. https://doi.org/10.1016/j.future.2017.05.035

    Article  Google Scholar 

  30. Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU - Int J Electron Commun 68:186–192. https://doi.org/10.1016/j.aeue.2013.08.007

    Article  Google Scholar 

  31. Zhang Y, He Q, Xiang Y et al (2018) Low-cost and confidentiality-preserving data Acquisition for Internet of multimedia things. IEEE Internet Things J 5:3442–3451. https://doi.org/10.1109/JIOT.2017.2781737

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chidambaram, N., Raj, P., Thenmozhi, K. et al. A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78, 33837–33863 (2019). https://doi.org/10.1007/s11042-019-08166-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08166-z

Keywords

Navigation