Abstract
The faster proliferation of software-defined cloud environments across the world for efficiently hosting enterprise-grade applications has led many organisations to embrace the cloud paradigm in a significant way. The cloud storage opportunities and possibilities are consistently expanding, wherein multimedia storage occupies the entire stage in the cloud. An essential emphasis on security owing to the nature of multiuser access to cloud credentials in many situations is necessary. The security and safety of data, while in transit, in rest, and while being used by applications, have to be guaranteed through proven technology solutions. Typically, image encryption is the standard way of securing and safeguarding images. The proposed three-layer image encryption scheme uses DNA coding along with chaotic logistic and tent maps for confusion and diffusion operations. Upon verification of user credentials, the storage of encrypted image is accomplished in Amazon S3 web services. The strength of encryption has been evaluated based on the parameters namely brute force attack, statistical, encryption quality, occlusion attack and computational complexity analyses which have proved the suitability of proposed scheme to secure cloud storage of images.
Similar content being viewed by others
References
Abbas NA (2016) Image encryption based on independent component analysis and Arnold’s cat map. Egypt Informatics J 17:139–146. https://doi.org/10.1016/j.eij.2015.10.001
Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76:24527–24547. https://doi.org/10.1007/s11042-016-4206-4
Asadi S, Nilashi M, Husin ARC, Yadegaridehkordi E (2017) Customers perspectives on adoption of cloud computing in banking sector. Inf Technol Manag 18:305–330
Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170. https://doi.org/10.1016/j.sigpro.2016.03.021
Broumandnia A (2019) Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J Inf Secur Appl 47:188–198. https://doi.org/10.1016/j.jisa.2019.05.004
Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-box. Chaos, Solitons and Fractals 95:92–101. https://doi.org/10.1016/j.chaos.2016.12.018
Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213. https://doi.org/10.1016/j.optlaseng.2016.08.009
Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci (Ny) 355–356:314–327. https://doi.org/10.1016/j.ins.2015.10.027
Enayatifar R, Abdullah AH, Isnin IF et al (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154. https://doi.org/10.1016/j.optlaseng.2016.10.006
Hu T, Liu Y, Gong LH et al (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243. https://doi.org/10.1016/j.sigpro.2016.12.008
Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci (Ny) 297:80–94. https://doi.org/10.1016/j.ins.2014.11.018
Huang X, Ye G (2018) An image encryption algorithm based on irregular wave representation. Multimed Tools Appl 77:2611–2628
Khan MA (2016) A survey of security issues for cloud computing. J Netw Comput Appl 71:11–29. https://doi.org/10.1016/j.jnca.2016.05.010
Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26:1137–1148. https://doi.org/10.1007/s00521-014-1800-0
Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:1–35. https://doi.org/10.1007/s13319-017-0148-5
Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimed Tools Appl 77:19209–19234
Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Comput 5:48–57. https://doi.org/10.1109/MCC.2018.111121403
Rathore S, Sharma PK, Loia V et al (2017) Social network security: issues, challenges, threats, and solutions. Inf Sci (Ny) 421:43–69. https://doi.org/10.1016/j.ins.2017.08.063
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos blend to secure medical privacy. IEEE Trans Nanobioscience 1241. https://doi.org/10.1109/TNB.2017.2780881
Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6. https://doi.org/10.1186/s13677-017-0097-9
Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115. https://doi.org/10.1016/j.jnca.2016.11.027
Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222. https://doi.org/10.1016/j.jnca.2016.09.002
Tao M, Ota K, Dong M (2017) Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes. Futur Gener Comput Syst 76:528–539. https://doi.org/10.1016/j.future.2016.11.012
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005
Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61. https://doi.org/10.1016/j.optlaseng.2015.03.022
Wang B, Xie Y, Zhou C et al (2016) Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps. Optik (Stuttg) 127:3541–3545. https://doi.org/10.1016/j.ijleo.2016.01.015
Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76:24251–24280. https://doi.org/10.1007/s11042-016-4102-y
Wu Y, Zhou Y, Saveriades G et al (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323–342. https://doi.org/10.1016/j.ins.2012.07.049
Yang R, Xu Q, Au MH et al (2018) Position based cryptography with location privacy: a step for fog computing. Futur Gener Comput Syst 78:799–806. https://doi.org/10.1016/j.future.2017.05.035
Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU - Int J Electron Commun 68:186–192. https://doi.org/10.1016/j.aeue.2013.08.007
Zhang Y, He Q, Xiang Y et al (2018) Low-cost and confidentiality-preserving data Acquisition for Internet of multimedia things. IEEE Internet Things J 5:3442–3451. https://doi.org/10.1109/JIOT.2017.2781737
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chidambaram, N., Raj, P., Thenmozhi, K. et al. A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78, 33837–33863 (2019). https://doi.org/10.1007/s11042-019-08166-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08166-z