Abstract
Image encryption algorithms based on Chaotic approach are becoming increasingly popular for remotely sensed images using parallel techniques. It has been demonstrated that the most efficient image encryption algorithms are based on Chaos. Previous research using chaos-based cryptosystems has resulted in poor performance when using a single computer, compromising privacy, security, and reliability. Furthermore, there were issues when vulnerable satellite images were processed. This paper describes a novel chaos-based encryption technique that employs an external secret key and Henon, Logistic, and Gauss iterated maps. The proposed encryption algorithm is capable of efficiently encrypting a large number of images. When the number of images increases, however, these images become very small, and the technology becomes inefficient or impractical. This paper investigates the parallel method of image encryption on a large number of remotely sensed images in Hadoop. Hadoop's file visit method has been enhanced so that it can treat the entire Tiff file as a single unit. Furthermore, the file format is being extended to be supported by Hadoop in order to support GeoTiff in Hadoop. The results of the experiments show that the proposed parallel method for encryption is effective and scalable to a large number of images when compared to other well-known methods.
Similar content being viewed by others
Data availability
All the used data in this research will be available from the corresponding author on reasonable request.
References
Al-Khasawneh, M. A., Shamsuddin, S. M., Hasan, S., Bakar, A. A.: An improved chaotic image encryption algorithm. In 2018 International conference on smart computing and electronic enterprise (ICSCEE), pp. 1–8 (2018)
Sinha, P.G., Thakur, K.: Image processing techniques for remote sensing applications. J. Lumin. 7, 05 (2018)
Kwan, C., Qi, H., Tran, T.: Recent advances in remote spectral sensing. J. Sensors 2016, 1–2 (2016)
Xu, D., Su, S.: Separable reversible data hiding in encrypted images based on difference histogram modification. Secur. Commun. Netw. 2019, 1–14 (2019)
Yang, G., Jin, H., Bai, N.: Image encryption using the chaotic josephus matrix. Math. Probl. Eng. 2014, 1–13 (2014)
Montrucchio, B., Moraru, S.-A., Pozna, C., Alonso, J.V.: Mobility for the internet of things. Mob. Inf. Syst. 2018, 1–2 (2018)
Al-Khasawneh, M.A., Shamsuddin, S.M., Hasan, S. and Bakar, A.A.: MapReduce a comprehensive review. In 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) (pp. 1–6). IEEE. (2018)
Khan, F.A., Abubakar, A., Mahmoud, M., Al-Khasawneh, M.A., Alarood, A.A.: Cotton crop cultivation oriented semantic framework based on IoT smart farming application. Int. J. Eng. Adv. Technol. 8(3), 480–484 (2019)
Abduljabbar, Z. A., Jin, h., Ibrahim, A., Hussien, Z. A., Hussain, M. A., Abbdal, S. H., Zou, d.: Secure biometric image retrieval in iot-cloud. In 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 1–6 (2016)
Khan, F.A., Abubakar, A., Mahmoud, M., Al-Khasawneh, M.A. and Alarood, A.A.: BSCL: Blockchain-oriented SDN controlled Cloud based Li-Fi communication architecture for smart city network. Int. J. Eng. Technol. (2018)
Khan, F.A., Abubakar, A., Mahmoud, M., Al-Khasawneh, M.A. and Alarood, A.A.: Rift: A high-performance consensus algorithm for consortium blockchain.
Elhoseny, M., Shankar, K., Lakshmanaprabu, S.K., Maseleno, A., Arunkumar, N.: Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput. Appl. 32, 10979–10993 (2018)
Ullah, Z., Zeb, A., Ullah, I., Awan, K.M., Saeed, Y., Uddin, M.I., Al-Khasawneh, M.A., Mahmoud, M., Zareei, M.: Certificateless proxy reencryption scheme (CPRES) based on hyperelliptic curve for access control in content-centric network (CCN). Mobile Inf. Syst. (2020).
Uddin, M.I., Ali Shah, S.A., Al-Khasawneh, M.A., Alarood, A.A., Alsolami, E.: Optimal policy learning for COVID-19 prevention using reinforcement learning. J. Inf. Sci. (2020). https://doi.org/10.1177/0165551520959798
Khasawneh, A.M., Kaiwartya, O., Lloret, J., Abuaddous, H.Y., Abualigah, L., Shinwan, M.A., Al-Khasawneh, M.A., Mahmoud, M., Kharel, R.: Green communication for underwater wireless sensor networks: Triangle metric based multi-layered routing protocol. Sensors 20(24), 7278 (2020)
Al-Khasawneh, M.A.: Chapter-3 Data science tools and applications. In: Advances in Academic Research and Development, p. 35 (2020)
Mast, N., Khan, M.A., Uddin, M.I., Ali Shah, S.A., Khan, A., Al-Khasawneh, M.A., Mahmoud, M.: Channel contention-based routing protocol for wireless ad hoc networks. Complexity (2021). https://doi.org/10.1155/2021/2051796
Vračar, L.M., Stojanović, M.D., Stanimirović, A.S., Prijić, Z.D.: Influence of encryption algorithms on power consumption in energy harvesting systems. J. Sensors 2019, 1–9 (2019)
Al-Khasawneh, M.A., Abu-Ulbeh, W. and Khasawneh, A.M.: December. Satellite images encryption Review. In 2020 International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI) (pp. 121–125). IEEE (2020)
Al-Khasawneh, M.A.: Chapter-2 Deep learning (DL) techniques in enhancing the security of IoT devices. Advances in Academic Research and Development, p. 11 (2020)
Konikoff, J., Toplosky, S.: Analysis of simplified des algorithms. Cryptologia 34, 211–224 (2010)
Devi, R.R., Chamundeeswari, V.V.: Triple DES: Privacy preserving in big data healthcare. Int. J. Parallel Program. 48, 515 (2018)
Heron, S.: Advanced encryption standard (AES). Netw. Secur. 2009, 8–12 (2009)
Mekki, N., Hamdi, M., Aguili, T., Kim, T.: A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system. In 2018 International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1–10, 2018.
Boutros, Hesham, S., Georgey, B: Hardware acceleration of novel chaos-based image encryption for iot applications. In 2017 29th International Conference on Microelectronics (ICM), pp. 1–4, (2017)
Bao, H., Zhu, Y.: A chaotic masking communication system with better performance. In 2006 International Conference on Computational Intelligence and Security, vol. 2, pp. 1487–1490, (2006).
Sathiyamurthi, P., Ramakrishnan, S.: Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio, Speech Music Process. 2017, 1 (2017)
Zhou, H., Ling, X.-T.: Problems with the chaotic inverse system encryption approach. IEEE Trans. Circ. Syst. I Fund. Theory Appl. 44, 268–271 (1997)
Liu, D., Luo, X., Li, Y., Shao, Z., Guan, Y.: An energy-efficient encryption mechanism for NVM-based main memory in mobile systems. J. Syst. Architect. 76, 47–57 (2017)
Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Architect. 98, 165–172 (2019)
Hassan, Wang, Y., Elhabob, R., Eltayieb, N., Li, F.: An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments. J. Syst. Architect. 109, 101776 (2020)
Zhou, Y., Guo, J., Li, F.: Certificateless public key encryption with cryptographic reverse firewalls. J. Syst. Archit. 109, 101754 (2020)
Han, P., Liu, C., Fang, B., Wang, G., Song, X., Wan, L.: Revisiting the practicality of search on encrypted data: From the security broker’s perspective. Sci. Program. 2016, 1–9 (2016)
Zhang, Y., Li, Y., Wang, Y.: Conjunctive and disjunctive keyword search over encrypted mobile cloud data in public key system. Mob. Inf. Syst. 2018, 1–11 (2018)
Singh, K., Rangan, C.P., Banerjee, A.K.: Lattice based mix network for location privacy in mobile system. Mob. Inf. Syst. 2015, 1–9 (2015)
Tariq, M.I., Memon, N.A., Ahmed, S., Tayyaba, S., Mushtaq, M.T., Mian, N.A., Imran, M., Ashraf, M.W.: A review of deep learning security and privacy defensive techniques. Mob. Inf. Syst. 2020, 1–18 (2020)
Hiscock, T., Savry, O., Goubin, L.: Lightweight instruction-level encryption for embedded processors using stream ciphers. Microprocess. Microsyst. 64, 43–52 (2019)
Rajagopalan, S., Upadhyay, H.N., Rayappan, J.B.B., Amirtharajan, R.: ON chip peripherals are ON for chaos – an image fused encryption. Microprocessors Microsyst. 61, 257–278 (2018)
Janakiraman, S., Thenmozhi, K., Rayappan, J.B.B., Amirtharajan, R.: Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess. Microsyst. 56, 1–12 (2018)
Murillo-Escobar, M., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R.: Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess. Microsyst. 45, 297–309 (2016)
Kim, J., Vetter, J.S.: Implementing efficient data compression and encryption in a persistent key-value store for HPC. Int. J. High Perform. Comput. Appl. 33, 1098–1112 (2019)
Hsu, J.B., Lin, C.F., Chang, Y.C., Pan, R.H.: Using independent resource allocation strategies to solve conflicts of Hadoop distributed architecture in virtualization. Clust. Comput. 24, 1–21 (2020)
Luo, X., Fu, X.: Configuration optimization method of Hadoop system performance based on genetic simulated annealing algorithm. Clust. Comput. 22(4), 8965–8973 (2019)
Venkatesh, G., Arunesh, K.: Map Reduce for big data processing based on traffic aware partition and aggregation. Clust. Comput. 22(5), 12909–12915 (2019)
Lee, K.M., Jeong, Y.S., Lee, S.H., Lee, K.M.: Bucket-size balancing locality sensitive hashing using the map reduce paradigm. Clust. Comput. 22(1), 1959–1971 (2019)
VeeraManickam, M.R.M., Mohanapriya, M., Pandey, B.K., Akhade, S., Kale, S.A., Patil, R., Vigneshwar, M.: Map-reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural network. Clust. Comput. 22(1), 1259–1275 (2019)
Baptista, M.: Cryptography with chaos. Phys. Lett. A 240, 50–54 (1998)
Matthews, R.: On the derivation of a “chaotic” encryption algorithm. Cryptologia 8, 29–41 (1984)
Sankpal, P. R., Vijaya, P. A.: Image encryption using chaotic maps: A survey. In Proceedings of the 2014 Fifth International Conference on Signal and Image Processing, ICSIP ’14, (USA), pp. 102–107, IEEE Computer Society (2014)
Joy, E. M, J. A., Vasanthi, N. A.: Article: Survey of chaos based image encryption and decryption techniques. IJCA Proceedings on Amrita International Conference of Women in Computing - 2013, vol. AICWIC, pp. 1–5 (2013)
Al-Qerem, A., Alauthman, M., Almomani, A., Gupta, B.B.: IoT transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft. Comput. 24(8), 5695–5711 (2020)
Singh, N., Vardhan, M.: Distributed ledger technology based property transaction system with support for IoT devices. Int. J. Cloud Appl. Comput. (IJCAC) 9(2), 60–78 (2019)
Stergiou, C.L., Psannis, K.E., Gupta, B.B.: IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet Things J. 8(7), 5164–5171 (2020)
Adat, V., Gupta, B.B.: Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun. Syst. 67(3), 423–441 (2018)
Alsmirat, M.A., Al-Alem, F., Al-Ayyoub, M., Jararweh, Y., Gupta, B.: Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools Appl. 78(3), 3649–3688 (2019)
Sarrab, M., Alshohoumi, F.: Assisted-fog-based framework for IoT-based healthcare data preservation. Int. J. Cloud Appl. Comput. (IJCAC) 11(2), 1–16 (2021)
Shuja, J., Humayun, M.A., Alasmary, W., Sinky, H., Alanazi, E., Khan, M.K.: Resource efficient geo-textual hierarchical clustering framework for social IoT applications. IEEE Sensors J. (2021). https://doi.org/10.1109/JSEN.2021.3060953
Funding
No funding was received for conducting this study.
Author information
Authors and Affiliations
Contributions
MAA-K: conceptualization, and supervision. IU: experimental. SAAS: validation. AMK: methodology and draft writing. LA: review and cosupervision. MM: writing and editing.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants performed by any of the authors.
Research involoving animal rights
No animal studies were carried out by the authors for this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Al-Khasawneh, M.A., Uddin, I., Shah, S.A.A. et al. An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications. Cluster Comput 25, 999–1013 (2022). https://doi.org/10.1007/s10586-021-03466-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-021-03466-2