Abstract
Green edge computing aims to reasonably allocate computing resources on the premise of ensuring the reliability of information services. The computing power gap between terminal and edge server makes the traditional encryption algorithm waste too much energy when dealing with massive redundant data. How to improve encryption efficiency and reduce the computing consumption of massive data terminal equipment on the premise of ensuring data security is one of the goals of green edge computing. We proposed a data compression and encryption scheme based on compression sensing, which greatly reduces the computing consumption of computing limited data terminals; At the same time, the hyper chaotic system is used to further encrypt the data by Arnold transform, bitwise XOR and data random scrambling. In order to solve the problem that compressed sensing can not accurately recover data, we designed a nonlinear encryption scheme based on Chinese Remainder Theorem as a supplement. The simulation results show that the proposed data compression and encryption method is effective and reliable, which has high security performance, compression ability for text data and images, and high recovery ability when the compression ratio is more than 0.5.
Similar content being viewed by others
Data availability
Images “Lena”, “peppers” and “Lake” are obtained through Google. The meteorological data are available in http://data.cma.cn/Market/Detail/code/A.0012.0001/type/0.html.
References
Gu, L., Cai, J., Zeng, D., Zhang, Y., Jin, H., Dai, W.: Energy efficient task allocation and energy scheduling in green energy powered edge computing. Future Gen. Comput. Syst. 95, 89–99 (2019)
Murugan, B., Nanjappa Gounder, A.G.: Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput. Vis. 10, 593–602 (2016)
Muhammad, A.U.S., Özkaynak, F.: SIEA: secure image encryption algorithm based on chaotic systems optimization algorithms and PUFs. Symmetry. 13, 824 (2021)
Ahmad, M., Doja, M.N., Beg, M.M.S.: Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J. King Saud Univ. Comput. Inf. Sci. 33, 77–85 (2021)
Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Ccomput. 24, 926–934 (2006)
Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.T.: Cryptanalysis of a chaotic block cipher with external key and its improved version. Chaos Solitons Fractals 37, 299–307 (2008)
Tong, X.J., Wang, Z., Liu, Y., Zhang, M., Xu, L.: A novel compound chaotic block cipher for wireless sensor networks. Commun. Nonlinear Sci. Numer. Simul. 22, 120–133 (2015)
Teh, J.S., Samsudin, A.: A chaos-based authenticated cipher with associated data. Security Commun. Netw. (2017). https://doi.org/10.1155/2017/9040518
Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption/decryption framework for secure multimedia communications. Entropy 22, 1253 (2020)
Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92, 1101–1108 (2012)
Zhou, Y., Bao, L., Chen, C.P.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)
Zhang, Y.Q., Wang, X.Y.: A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)
Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)
Chai, X., Fu, X., Gan, Z., Lu, Y., Chen, Y.: A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 155, 44–62 (2019)
Tsafack, N., Kengne, J., Abd-El-Atty, B., Iliyasu, A.M., Hirota, K., Abd EL-Latif, A.A.: Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 515, 191–217 (2020)
Farah, M.A., Farah, A., Farah, T.: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 99, 3041–3064 (2020)
Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46–62 (2020)
Xu, C., Sun, J., Wang, C.: An image encryption algorithm based on random walk and hyperchaotic systems. Int. J. Bifurc. Chaos 30, 2050060 (2020)
Cleary, B., Simonton, B., Bezney, J., Murray, E., Alam, S., Sinha, A., Regev, A.: Compressed sensing for highly efficient imaging transcriptomics. Nat. Biotechnol. 39, 936–942 (2021)
Dou, Y., Li, M.: An image encryption algorithm based on a novel 1D chaotic map and compressive sensing. Multimedia Tools Appl. 80, 24437–24454 (2021)
Zhou, N., Pan, S., Cheng, S., Zhou, Z.: Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Optics Laser Technol. 82, 121–133 (2016)
Gong, L., Qiu, K., Deng, C., Zhou, N.: An image compression and encryption algorithm based on chaotic system and compressive sensing. Optics Laser Technol. 115, 257–267 (2019)
Wang, X., Su, Y.: Image encryption based on compressed sensing and DNA encoding. Signal Process. Image Commun. 95, 116246 (2021)
Xu, Q., Sun, K., He, S., Zhu, C.: An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Optics Lasers Eng. 134, 106178 (2020)
Ponuma, R., Amutha, R.: Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimedia Tools Appl. 77, 19209–19234 (2018)
Ponuma, R., Amutha, R.: Image encryption using sparse coding and compressive sensing. Multidimens. Syst. Signal Process. 30, 1895–1909 (2019)
Zhang, B., Xiao, D., Zhang, Z., Yang, L.: Compressing Encrypted Images by Using 2D Compressed Sensing, pp. 1914–1919. IEEE (2019)
Zhu, H., Zhao, C., Zhang, X.: A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process. Image Commun. 28, 670–680 (2013)
Funding
This work was supported National Natural Science Foundation of China (61971014, 11675199) and Young Backbone Teacher Training Program of Henan Colleges and Universities (2021GGJS170).
Author information
Authors and Affiliations
Contributions
All authors contributed to the study’s conception and design. (1) JL: Conceptualization, methodology, software, data curation, writing—original draft, writing—review and editing; (2) YZ: Validation, investigation, resources, writing, visualization, funding acquisition. (3) BG: Methodology, formal analysis, review & editing, supervision, project administration, and funding acquisition.
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Ethical approval
This article does not contain any studies with animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, J., Zhang, Y. & Gong, B. A data compression and encryption method for green edge computing. Cluster Comput 26, 3341–3359 (2023). https://doi.org/10.1007/s10586-023-03968-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-023-03968-1