Skip to main content
Log in

An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Image encryption algorithms based on Chaotic approach are becoming increasingly popular for remotely sensed images using parallel techniques. It has been demonstrated that the most efficient image encryption algorithms are based on Chaos. Previous research using chaos-based cryptosystems has resulted in poor performance when using a single computer, compromising privacy, security, and reliability. Furthermore, there were issues when vulnerable satellite images were processed. This paper describes a novel chaos-based encryption technique that employs an external secret key and Henon, Logistic, and Gauss iterated maps. The proposed encryption algorithm is capable of efficiently encrypting a large number of images. When the number of images increases, however, these images become very small, and the technology becomes inefficient or impractical. This paper investigates the parallel method of image encryption on a large number of remotely sensed images in Hadoop. Hadoop's file visit method has been enhanced so that it can treat the entire Tiff file as a single unit. Furthermore, the file format is being extended to be supported by Hadoop in order to support GeoTiff in Hadoop. The results of the experiments show that the proposed parallel method for encryption is effective and scalable to a large number of images when compared to other well-known methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

All the used data in this research will be available from the corresponding author on reasonable request.

References

  1. Al-Khasawneh, M. A., Shamsuddin, S. M., Hasan, S., Bakar, A. A.: An improved chaotic image encryption algorithm. In 2018 International conference on smart computing and electronic enterprise (ICSCEE), pp. 1–8 (2018)

  2. Sinha, P.G., Thakur, K.: Image processing techniques for remote sensing applications. J. Lumin. 7, 05 (2018)

    Google Scholar 

  3. Kwan, C., Qi, H., Tran, T.: Recent advances in remote spectral sensing. J. Sensors 2016, 1–2 (2016)

    Article  Google Scholar 

  4. Xu, D., Su, S.: Separable reversible data hiding in encrypted images based on difference histogram modification. Secur. Commun. Netw. 2019, 1–14 (2019)

    Google Scholar 

  5. Yang, G., Jin, H., Bai, N.: Image encryption using the chaotic josephus matrix. Math. Probl. Eng. 2014, 1–13 (2014)

    MathSciNet  MATH  Google Scholar 

  6. Montrucchio, B., Moraru, S.-A., Pozna, C., Alonso, J.V.: Mobility for the internet of things. Mob. Inf. Syst. 2018, 1–2 (2018)

    Google Scholar 

  7. Al-Khasawneh, M.A., Shamsuddin, S.M., Hasan, S. and Bakar, A.A.: MapReduce a comprehensive review. In 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) (pp. 1–6). IEEE. (2018)

  8. Khan, F.A., Abubakar, A., Mahmoud, M., Al-Khasawneh, M.A., Alarood, A.A.: Cotton crop cultivation oriented semantic framework based on IoT smart farming application. Int. J. Eng. Adv. Technol. 8(3), 480–484 (2019)

    Google Scholar 

  9. Abduljabbar, Z. A., Jin, h., Ibrahim, A., Hussien, Z. A., Hussain, M. A., Abbdal, S. H., Zou, d.: Secure biometric image retrieval in iot-cloud. In 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 1–6 (2016)

  10. Khan, F.A., Abubakar, A., Mahmoud, M., Al-Khasawneh, M.A. and Alarood, A.A.: BSCL: Blockchain-oriented SDN controlled Cloud based Li-Fi communication architecture for smart city network. Int. J. Eng. Technol. (2018)

  11. Khan, F.A., Abubakar, A., Mahmoud, M., Al-Khasawneh, M.A. and Alarood, A.A.: Rift: A high-performance consensus algorithm for consortium blockchain.

  12. Elhoseny, M., Shankar, K., Lakshmanaprabu, S.K., Maseleno, A., Arunkumar, N.: Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput. Appl. 32, 10979–10993 (2018)

    Article  Google Scholar 

  13. Ullah, Z., Zeb, A., Ullah, I., Awan, K.M., Saeed, Y., Uddin, M.I., Al-Khasawneh, M.A., Mahmoud, M., Zareei, M.: Certificateless proxy reencryption scheme (CPRES) based on hyperelliptic curve for access control in content-centric network (CCN). Mobile Inf. Syst. (2020).

  14. Uddin, M.I., Ali Shah, S.A., Al-Khasawneh, M.A., Alarood, A.A., Alsolami, E.: Optimal policy learning for COVID-19 prevention using reinforcement learning. J. Inf. Sci. (2020). https://doi.org/10.1177/0165551520959798

    Article  Google Scholar 

  15. Khasawneh, A.M., Kaiwartya, O., Lloret, J., Abuaddous, H.Y., Abualigah, L., Shinwan, M.A., Al-Khasawneh, M.A., Mahmoud, M., Kharel, R.: Green communication for underwater wireless sensor networks: Triangle metric based multi-layered routing protocol. Sensors 20(24), 7278 (2020)

    Article  Google Scholar 

  16. Al-Khasawneh, M.A.: Chapter-3 Data science tools and applications. In: Advances in Academic Research and Development, p. 35 (2020)

  17. Mast, N., Khan, M.A., Uddin, M.I., Ali Shah, S.A., Khan, A., Al-Khasawneh, M.A., Mahmoud, M.: Channel contention-based routing protocol for wireless ad hoc networks. Complexity (2021). https://doi.org/10.1155/2021/2051796

    Article  Google Scholar 

  18. Vračar, L.M., Stojanović, M.D., Stanimirović, A.S., Prijić, Z.D.: Influence of encryption algorithms on power consumption in energy harvesting systems. J. Sensors 2019, 1–9 (2019)

    Article  Google Scholar 

  19. Al-Khasawneh, M.A., Abu-Ulbeh, W. and Khasawneh, A.M.: December. Satellite images encryption Review. In 2020 International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI) (pp. 121–125). IEEE (2020)

  20. Al-Khasawneh, M.A.: Chapter-2 Deep learning (DL) techniques in enhancing the security of IoT devices. Advances in Academic Research and Development, p. 11 (2020)

  21. Konikoff, J., Toplosky, S.: Analysis of simplified des algorithms. Cryptologia 34, 211–224 (2010)

    Article  Google Scholar 

  22. Devi, R.R., Chamundeeswari, V.V.: Triple DES: Privacy preserving in big data healthcare. Int. J. Parallel Program. 48, 515 (2018)

    Article  Google Scholar 

  23. Heron, S.: Advanced encryption standard (AES). Netw. Secur. 2009, 8–12 (2009)

    Article  Google Scholar 

  24. Mekki, N., Hamdi, M., Aguili, T., Kim, T.: A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system. In 2018 International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1–10, 2018.

  25. Boutros, Hesham, S., Georgey, B: Hardware acceleration of novel chaos-based image encryption for iot applications. In 2017 29th International Conference on Microelectronics (ICM), pp. 1–4, (2017)

  26. Bao, H., Zhu, Y.: A chaotic masking communication system with better performance. In 2006 International Conference on Computational Intelligence and Security, vol. 2, pp. 1487–1490, (2006).

  27. Sathiyamurthi, P., Ramakrishnan, S.: Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio, Speech Music Process. 2017, 1 (2017)

    Article  Google Scholar 

  28. Zhou, H., Ling, X.-T.: Problems with the chaotic inverse system encryption approach. IEEE Trans. Circ. Syst. I Fund. Theory Appl. 44, 268–271 (1997)

    Article  Google Scholar 

  29. Liu, D., Luo, X., Li, Y., Shao, Z., Guan, Y.: An energy-efficient encryption mechanism for NVM-based main memory in mobile systems. J. Syst. Architect. 76, 47–57 (2017)

    Article  Google Scholar 

  30. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Architect. 98, 165–172 (2019)

    Article  Google Scholar 

  31. Hassan, Wang, Y., Elhabob, R., Eltayieb, N., Li, F.: An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments. J. Syst. Architect. 109, 101776 (2020)

    Article  Google Scholar 

  32. Zhou, Y., Guo, J., Li, F.: Certificateless public key encryption with cryptographic reverse firewalls. J. Syst. Archit. 109, 101754 (2020)

    Article  Google Scholar 

  33. Han, P., Liu, C., Fang, B., Wang, G., Song, X., Wan, L.: Revisiting the practicality of search on encrypted data: From the security broker’s perspective. Sci. Program. 2016, 1–9 (2016)

    Google Scholar 

  34. Zhang, Y., Li, Y., Wang, Y.: Conjunctive and disjunctive keyword search over encrypted mobile cloud data in public key system. Mob. Inf. Syst. 2018, 1–11 (2018)

    Google Scholar 

  35. Singh, K., Rangan, C.P., Banerjee, A.K.: Lattice based mix network for location privacy in mobile system. Mob. Inf. Syst. 2015, 1–9 (2015)

    Google Scholar 

  36. Tariq, M.I., Memon, N.A., Ahmed, S., Tayyaba, S., Mushtaq, M.T., Mian, N.A., Imran, M., Ashraf, M.W.: A review of deep learning security and privacy defensive techniques. Mob. Inf. Syst. 2020, 1–18 (2020)

    Google Scholar 

  37. Hiscock, T., Savry, O., Goubin, L.: Lightweight instruction-level encryption for embedded processors using stream ciphers. Microprocess. Microsyst. 64, 43–52 (2019)

    Article  Google Scholar 

  38. Rajagopalan, S., Upadhyay, H.N., Rayappan, J.B.B., Amirtharajan, R.: ON chip peripherals are ON for chaos – an image fused encryption. Microprocessors Microsyst. 61, 257–278 (2018)

    Article  Google Scholar 

  39. Janakiraman, S., Thenmozhi, K., Rayappan, J.B.B., Amirtharajan, R.: Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess. Microsyst. 56, 1–12 (2018)

    Article  Google Scholar 

  40. Murillo-Escobar, M., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R.: Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess. Microsyst. 45, 297–309 (2016)

    Article  Google Scholar 

  41. Kim, J., Vetter, J.S.: Implementing efficient data compression and encryption in a persistent key-value store for HPC. Int. J. High Perform. Comput. Appl. 33, 1098–1112 (2019)

    Article  Google Scholar 

  42. Hsu, J.B., Lin, C.F., Chang, Y.C., Pan, R.H.: Using independent resource allocation strategies to solve conflicts of Hadoop distributed architecture in virtualization. Clust. Comput. 24, 1–21 (2020)

    Google Scholar 

  43. Luo, X., Fu, X.: Configuration optimization method of Hadoop system performance based on genetic simulated annealing algorithm. Clust. Comput. 22(4), 8965–8973 (2019)

    Article  Google Scholar 

  44. Venkatesh, G., Arunesh, K.: Map Reduce for big data processing based on traffic aware partition and aggregation. Clust. Comput. 22(5), 12909–12915 (2019)

    Article  Google Scholar 

  45. Lee, K.M., Jeong, Y.S., Lee, S.H., Lee, K.M.: Bucket-size balancing locality sensitive hashing using the map reduce paradigm. Clust. Comput. 22(1), 1959–1971 (2019)

    Article  Google Scholar 

  46. VeeraManickam, M.R.M., Mohanapriya, M., Pandey, B.K., Akhade, S., Kale, S.A., Patil, R., Vigneshwar, M.: Map-reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural network. Clust. Comput. 22(1), 1259–1275 (2019)

    Article  Google Scholar 

  47. Baptista, M.: Cryptography with chaos. Phys. Lett. A 240, 50–54 (1998)

    Article  MathSciNet  Google Scholar 

  48. Matthews, R.: On the derivation of a “chaotic” encryption algorithm. Cryptologia 8, 29–41 (1984)

    MathSciNet  Google Scholar 

  49. Sankpal, P. R., Vijaya, P. A.: Image encryption using chaotic maps: A survey. In Proceedings of the 2014 Fifth International Conference on Signal and Image Processing, ICSIP ’14, (USA), pp. 102–107, IEEE Computer Society (2014)

  50. Joy, E. M, J. A., Vasanthi, N. A.: Article: Survey of chaos based image encryption and decryption techniques. IJCA Proceedings on Amrita International Conference of Women in Computing - 2013, vol. AICWIC, pp. 1–5 (2013)

  51. Al-Qerem, A., Alauthman, M., Almomani, A., Gupta, B.B.: IoT transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft. Comput. 24(8), 5695–5711 (2020)

    Article  Google Scholar 

  52. Singh, N., Vardhan, M.: Distributed ledger technology based property transaction system with support for IoT devices. Int. J. Cloud Appl. Comput. (IJCAC) 9(2), 60–78 (2019)

    Google Scholar 

  53. Stergiou, C.L., Psannis, K.E., Gupta, B.B.: IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet Things J. 8(7), 5164–5171 (2020)

    Article  Google Scholar 

  54. Adat, V., Gupta, B.B.: Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun. Syst. 67(3), 423–441 (2018)

    Article  Google Scholar 

  55. Alsmirat, M.A., Al-Alem, F., Al-Ayyoub, M., Jararweh, Y., Gupta, B.: Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools Appl. 78(3), 3649–3688 (2019)

    Article  Google Scholar 

  56. Sarrab, M., Alshohoumi, F.: Assisted-fog-based framework for IoT-based healthcare data preservation. Int. J. Cloud Appl. Comput. (IJCAC) 11(2), 1–16 (2021)

    Google Scholar 

  57. Shuja, J., Humayun, M.A., Alasmary, W., Sinky, H., Alanazi, E., Khan, M.K.: Resource efficient geo-textual hierarchical clustering framework for social IoT applications. IEEE Sensors J. (2021). https://doi.org/10.1109/JSEN.2021.3060953

    Article  Google Scholar 

Download references

Funding

No funding was received for conducting this study.

Author information

Authors and Affiliations

Authors

Contributions

MAA-K: conceptualization, and supervision. IU: experimental. SAAS: validation. AMK: methodology and draft writing. LA: review and cosupervision. MM: writing and editing.

Corresponding author

Correspondence to Ahmad M. Khasawneh.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Research involoving animal rights

No animal studies were carried out by the authors for this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Khasawneh, M.A., Uddin, I., Shah, S.A.A. et al. An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications. Cluster Comput 25, 999–1013 (2022). https://doi.org/10.1007/s10586-021-03466-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03466-2

Keywords

Navigation