Skip to main content

Advertisement

Log in

A data compression and encryption method for green edge computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Green edge computing aims to reasonably allocate computing resources on the premise of ensuring the reliability of information services. The computing power gap between terminal and edge server makes the traditional encryption algorithm waste too much energy when dealing with massive redundant data. How to improve encryption efficiency and reduce the computing consumption of massive data terminal equipment on the premise of ensuring data security is one of the goals of green edge computing. We proposed a data compression and encryption scheme based on compression sensing, which greatly reduces the computing consumption of computing limited data terminals; At the same time, the hyper chaotic system is used to further encrypt the data by Arnold transform, bitwise XOR and data random scrambling. In order to solve the problem that compressed sensing can not accurately recover data, we designed a nonlinear encryption scheme based on Chinese Remainder Theorem as a supplement. The simulation results show that the proposed data compression and encryption method is effective and reliable, which has high security performance, compression ability for text data and images, and high recovery ability when the compression ratio is more than 0.5.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Images “Lena”, “peppers” and “Lake” are obtained through Google. The meteorological data are available in http://data.cma.cn/Market/Detail/code/A.0012.0001/type/0.html.

References

  1. Gu, L., Cai, J., Zeng, D., Zhang, Y., Jin, H., Dai, W.: Energy efficient task allocation and energy scheduling in green energy powered edge computing. Future Gen. Comput. Syst. 95, 89–99 (2019)

    Article  Google Scholar 

  2. Murugan, B., Nanjappa Gounder, A.G.: Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput. Vis. 10, 593–602 (2016)

    Article  Google Scholar 

  3. Muhammad, A.U.S., Özkaynak, F.: SIEA: secure image encryption algorithm based on chaotic systems optimization algorithms and PUFs. Symmetry. 13, 824 (2021)

    Article  Google Scholar 

  4. Ahmad, M., Doja, M.N., Beg, M.M.S.: Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J. King Saud Univ. Comput. Inf. Sci. 33, 77–85 (2021)

    Article  Google Scholar 

  5. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Ccomput. 24, 926–934 (2006)

    Article  Google Scholar 

  6. Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.T.: Cryptanalysis of a chaotic block cipher with external key and its improved version. Chaos Solitons Fractals 37, 299–307 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  7. Tong, X.J., Wang, Z., Liu, Y., Zhang, M., Xu, L.: A novel compound chaotic block cipher for wireless sensor networks. Commun. Nonlinear Sci. Numer. Simul. 22, 120–133 (2015)

    Article  Google Scholar 

  8. Teh, J.S., Samsudin, A.: A chaos-based authenticated cipher with associated data. Security Commun. Netw. (2017). https://doi.org/10.1155/2017/9040518

  9. Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption/decryption framework for secure multimedia communications. Entropy 22, 1253 (2020)

    Article  MathSciNet  Google Scholar 

  10. Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92, 1101–1108 (2012)

    Article  Google Scholar 

  11. Zhou, Y., Bao, L., Chen, C.P.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)

    Article  Google Scholar 

  12. Zhang, Y.Q., Wang, X.Y.: A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)

    Article  Google Scholar 

  13. Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  14. Chai, X., Fu, X., Gan, Z., Lu, Y., Chen, Y.: A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 155, 44–62 (2019)

    Article  Google Scholar 

  15. Tsafack, N., Kengne, J., Abd-El-Atty, B., Iliyasu, A.M., Hirota, K., Abd EL-Latif, A.A.: Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 515, 191–217 (2020)

    Article  Google Scholar 

  16. Farah, M.A., Farah, A., Farah, T.: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 99, 3041–3064 (2020)

    Article  Google Scholar 

  17. Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46–62 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  18. Xu, C., Sun, J., Wang, C.: An image encryption algorithm based on random walk and hyperchaotic systems. Int. J. Bifurc. Chaos 30, 2050060 (2020)

    Article  MathSciNet  Google Scholar 

  19. Cleary, B., Simonton, B., Bezney, J., Murray, E., Alam, S., Sinha, A., Regev, A.: Compressed sensing for highly efficient imaging transcriptomics. Nat. Biotechnol. 39, 936–942 (2021)

    Article  Google Scholar 

  20. Dou, Y., Li, M.: An image encryption algorithm based on a novel 1D chaotic map and compressive sensing. Multimedia Tools Appl. 80, 24437–24454 (2021)

    Article  Google Scholar 

  21. Zhou, N., Pan, S., Cheng, S., Zhou, Z.: Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Optics Laser Technol. 82, 121–133 (2016)

    Article  Google Scholar 

  22. Gong, L., Qiu, K., Deng, C., Zhou, N.: An image compression and encryption algorithm based on chaotic system and compressive sensing. Optics Laser Technol. 115, 257–267 (2019)

    Article  Google Scholar 

  23. Wang, X., Su, Y.: Image encryption based on compressed sensing and DNA encoding. Signal Process. Image Commun. 95, 116246 (2021)

    Google Scholar 

  24. Xu, Q., Sun, K., He, S., Zhu, C.: An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Optics Lasers Eng. 134, 106178 (2020)

    Article  Google Scholar 

  25. Ponuma, R., Amutha, R.: Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimedia Tools Appl. 77, 19209–19234 (2018)

    Article  Google Scholar 

  26. Ponuma, R., Amutha, R.: Image encryption using sparse coding and compressive sensing. Multidimens. Syst. Signal Process. 30, 1895–1909 (2019)

    Article  MATH  Google Scholar 

  27. Zhang, B., Xiao, D., Zhang, Z., Yang, L.: Compressing Encrypted Images by Using 2D Compressed Sensing, pp. 1914–1919. IEEE (2019)

  28. Zhu, H., Zhao, C., Zhang, X.: A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process. Image Commun. 28, 670–680 (2013)

    Google Scholar 

Download references

Funding

This work was supported National Natural Science Foundation of China (61971014, 11675199) and Young Backbone Teacher Training Program of Henan Colleges and Universities (2021GGJS170).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study’s conception and design. (1) JL: Conceptualization, methodology, software, data curation, writing—original draft, writing—review and editing; (2) YZ: Validation, investigation, resources, writing, visualization, funding acquisition. (3) BG: Methodology, formal analysis, review & editing, supervision, project administration, and funding acquisition.

Corresponding author

Correspondence to Bei Gong.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Ethical approval

This article does not contain any studies with animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Zhang, Y. & Gong, B. A data compression and encryption method for green edge computing. Cluster Comput 26, 3341–3359 (2023). https://doi.org/10.1007/s10586-023-03968-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-023-03968-1

Keywords

Navigation