Skip to main content

A Novel Quantum Encryption and Authentication Framework Integrated with IoT

  • Chapter
  • First Online:
Security, Privacy and Trust in the IoT Environment

Abstract

In the present era of Internet of Things (IoT), communicating medical reports for the concerted diagnosis plays a vital role in any telemedicine network. Here, security of communication, being one of the most important requirements, needs to be appropriately addressed in protecting the transmitted data to ensure authentication, privacy, trust and integrity. In this context, this chapter suggests an image encryption and authentication algorithm to handle bulky medical images integrated with Quantum encryption mechanism. The proposed Quantum Cyber-physical system is established with the help of the security algorithms along with cloud computing framework. In the proposed encryption scheme, initially, the original classical medical image is converted into Quantum image format using Novel Enhanced Quantum Representation (NEQR). Then using Cellular Automata (CA) (Rule:30), the quantum image is confused and diffused and its authentication is provided by cellular automata. Further, encryption takes place in four stages, namely, key generation, permutation, Deoxyribo Nucleic Acid (DNA) operation and diffusion. Additionally, the cloud framework provides a comprehensive platform for individual access to the encrypted files depending on the access privileges granted to the relevant individuals. The approach is well suited for a versatile hospital management system. The strength of the proposed encryption algorithm is validated by evaluating different metrics like Number of Pixel Change Rate (NPCR), Unified Average Change in Intensity (UACI), correlation, histogram and certain chosen-plaintext attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. HIPAA (2018) Healthcare data breach statistics. https://www.hipaajournal.com/healthcare-data-breach-statistics/

  2. HIPAA (2018) MIFA shares industry wisdom on medical identity theft and fraud. https://www.hipaajournal.com/mifa-shares-industry-wisdom-on-medical-identity-theft-and-fraud-3657/

  3. Chen J, Zhu Z, Fu C et al (2015) An scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul 23:294–310

    Article  MathSciNet  Google Scholar 

  4. Liu L, Zhang Q, Wei X (2012) A algorithm based on encoding and chaos map. Comput Electr Eng 38:1240–1248

    Article  Google Scholar 

  5. Zhang Q, Guo L (2010) Image encryption using addition combining with chaotic maps. Math Comput Model 52:2028–2035

    Article  MathSciNet  Google Scholar 

  6. Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on sequence operation and hyper-chaotic system. Opt—Int J Light Electron Opt 124:3596–3600

    Article  Google Scholar 

  7. Ozkaynak F, Ozer AB, Yavuz S (2013) Security analysis of an algorithm based on chaos and encoding. In: 2013 21st Signal processing and communications applications conference (SIU). IEEE, pp 1–4

    Google Scholar 

  8. Hermassi H, Belazi A, Rhouma R, Belghith SM (2014) Security analysis of an algorithm based on a addition combining with chaotic maps. Multimed Tools Appl 72:2211–2224

    Article  Google Scholar 

  9. Zhang Y, Wen W, Su M, Li M (2014) Cryptanalyzing a novel image fusion encryption algorithm based on sequence operation and hyper-chaotic system. Opt—Int J Light Electron Opt 125:1562–1564

    Article  Google Scholar 

  10. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) Chaos blend to secure medical privacy. IEEE Trans Nanobiosci 16:850–858

    Article  Google Scholar 

  11. Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical Data Sheet in Safe Havens - A Tri-layer Cryptic Solution. Comput Biol Med 62:264–276

    Article  Google Scholar 

  12. Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184

    Article  Google Scholar 

  13. Fu C, Zhang G, Bian O et al (2014) A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One 9:e115773

    Article  Google Scholar 

  14. Wang X, Liu C (2017) A novel and effective algorithm based on chaos and encoding. Multimed Tools Appl 76:6229–6245

    Article  Google Scholar 

  15. Wolfram S (1983) Statistical mechanics of cellular automata. Rev Mod Phys 55:601–644

    Article  MathSciNet  Google Scholar 

  16. Guan Sheng-Uei, Zhang Shu (2003) An evolutionary approach to the design of controllable cellular automata structure for random number generation. IEEE Trans Evol Comput 7:23–36

    Article  Google Scholar 

  17. Abdo AA, Lian S, Ismail IA et al (2013) A cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simul 18:136–147

    Article  MathSciNet  Google Scholar 

  18. Ravichandran D, Rajagopalan S, Upadhyay HN et al (2018) Encrypted biography of biomedical image—a pentalayer cryptosystem on FPGA. J Signal Process Syst 1–27

    Google Scholar 

  19. Jun D, Na L, Yixiong G, Jun Y (2009) A high-performance pseudo-random number generator based on FPGA. In: 2009 international conference on wireless networks and information systems. IEEE, pp 290–293

    Google Scholar 

  20. Venegas-Andraca SE, Ball JL (2010) Processing images in entangled quantum systems. Quantum Inf Process 9:1–11

    Article  MathSciNet  Google Scholar 

  21. Latorre JI (2005) Image compression and entanglement. 4

    Google Scholar 

  22. Sun B, Le PQ, Iliyasu AM et al (2011) A multi-channel representation for images on quantum computers using the D color space. In: 2011 IEEE international symposium on intelligent signal processing (WISP). IEEE, pp 1–6

    Google Scholar 

  23. Zhang Y, Lu K, Gao Y, Xu K (2013) A novel quantum representation for log-polar images. Quantum Inf Process 12:3103–3126

    Article  MathSciNet  Google Scholar 

  24. Le PQ, Dong F, Hirota K (2011) A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf Process 10:63–84

    Article  MathSciNet  Google Scholar 

  25. Zhang Y, Lu K, Gao Y, Wang M (2013) NEQR: A novel enhanced quantum representation of digital images. Quantum Inf Process 12:2833–2860

    Article  MathSciNet  Google Scholar 

  26. El-latif AAA, Abd-el-atty B, Talha M (2017) Robust encryption of quantum medical images. IEEE Access 6:1073–1081

    Google Scholar 

  27. Abd El-Latif AA, Abd-El-Atty B, Hossain MS et al (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083

    Article  Google Scholar 

  28. Beheri MH, Amin M, Song X, El-latif AAA (2016) Quantum based on Scrambling—Diffusion (SD) approach. In: 2016 2nd international conference on frontiers of signal processing (ICFSP). IEEE, pp 43–47

    Google Scholar 

  29. Zhou RG, Zhou Y, Zhu C et al (2018) Quantum watermarking scheme based on INEQR. Int J Theor Phys 57:1120–1131

    Article  MathSciNet  Google Scholar 

  30. Zhou S, Wang B, Zheng X, Zhou C (2016) An image encryption scheme based on computing and cellular automata. Discret Dyn Nat Soc 2016:1–9

    MathSciNet  MATH  Google Scholar 

  31. Chai X, Gan Z, Yuan K, et al (2017) A novel scheme based on sequence operations and chaotic systems. Neural Comput Appl 1–19

    Google Scholar 

  32. Enayatifar R, Sadaei HJ, Abdullah AH et al (2015) A novel chaotic based using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41

    Article  Google Scholar 

  33. Watson JD, Crick FHC (1953) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171:737–738

    Article  Google Scholar 

  34. Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for. Sig Process 97:172–182

    Article  Google Scholar 

  35. Wu Y, Member S, Noonan JP, Member L (2011) NPCR and UACI Randomness tests for image encryption. Cyber Journals Multidiscip Journals Sci Technol J Sel Areas Telecommun 31–38

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Padmapriya Praveenkumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Santhiya Devi, R., John Bosco Balaguru, R., Amirtharajan, R., Praveenkumar, P. (2019). A Novel Quantum Encryption and Authentication Framework Integrated with IoT. In: Mahmood, Z. (eds) Security, Privacy and Trust in the IoT Environment. Springer, Cham. https://doi.org/10.1007/978-3-030-18075-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-18075-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-18074-4

  • Online ISBN: 978-3-030-18075-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics