Abstract
Recently, digital communication and storage over the Internet through the cloud have increased in a rapid manner. Accordingly, data security becomes a vital issue as there are many hackers who want to steal or alter others’ private data. Fog computing comes to secure and facilitate the connection to the cloud. It works as an intermediary between the cloud and the peripheral devices. Accordingly, the channel between the fog and those devices must be secured against attacks. Many efforts have been done to secure the fog through the use of steganography to embed important data into a cover digital medium and cryptography to encrypt the data into a meaningless form. As steganography and cryptography have their own advantages, combining them into a hybrid system will certainly promote the security level. Video steganography uses video as a cover media for hiding secret data as video streaming over internet is very popular and common that cannot be doubted by intruders. The advantage of using video files as a cover is that they are more secure against hacker attacks due to their relative complexity compared to other multimedia types and the data redundancy which permits to embed large amount of secret data. In this paper a new hybrid security strategy (HS2) merging the advantages of both cryptography and steganography for securing the fog has been proposed. HS2 embeds a secret image into a video .mp4 as the host medium. HS2 has two main contributions. The first is a new encryption technique that depends on α-blocks of linear feedback shift registers (LFSRs) merged with an adder/subtractor to generate a strong secret key for each block. All blocks outputs are combined using a nonlinear function to construct the final key. Such generated key will be XORed with the secret image to produce the encrypted secret image. The second contribution is a new steganography methodology based on an enhanced discrete wavelet packet transform (DWPT) to embed the encrypted secret image into a cover video. Experimental results and security analysis have shown that the proposed HS2 outperforms recent security strategies and resist common attacks when applied to the fog environment.
Similar content being viewed by others
References
El-Latif, A. A. A., Abd-El-Atty, B., Hossain, M. S., Elmougy, S., & Ghoniem, A. (2018, January). Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access.
Munir, A., Kansakar, P., & Khan, S. U. (2017). IFCIoT: Integrated fog cloud IoT: a novel architectural paradigm for the future Internet of Things. IEEE Consumer Electronics Magazine,6(3), 74–82.
Usman, M., Irfan, A., Aslam, M. I., Khan, S., & Shah, U. A. (2017). SIT: A lightweight encryption algorithm for secure internet of things. International Journal of Advanced Computer Science and Applications,8(1), 2017.
Kaur, G. (2017). Necessity of fog computing for security of cloud data. ECONSPEAK: A Journal of Advances in Management IT & Social Sciences,7(5), 2017.
Sowjanya, V. K. (2017). Security framework for sharing data in fog computing. International Journal of Advanced Research in Computer and Communication Engineering,6(6), 2017.
Maksimovic, M. (2017). Implementation of Fog computing in IoT-based healthcare system. Journal of Information Technology and Applications (JITA),7(2), 100–107.
Nagarani, C., & Kousalya, R. (2018). Comparison of security and performance issues in fog enabled cloud computing. International Journal of Computer Applications,180(22), 2018.
Kumar, H., Shinde, S., & Talele, P. (2017). Secure fog computing system using emoticon technique. International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC),5(7), 808–811.
Waghmare, S., Ahire, S., Fegade, Himali, & Darekar, P. (2017). Securing cloud using fog computing with hadoop framework. International Journal of Science, Engineering and Technology,5(3), 2017.
Martin, B. A., Michaud, F., Banks, D., & Mosenia, A. (2017). OpenFog security requirements and approaches. In IEEE Communications Society Invited Paper, IEEE Conference (pp. 1–6).
Baby, A., & Krishnan, H. (2017). Combined strength of steganography and cryptography—A literature survey. International Journal of Advanced Research in Computer Science,8(3), 2017.
Abed Shukur, W., Najah Abdullah, W., & Kareem Qurban, L. (2018). Information hiding in digital video using DCT, DWT and CvT. IOP Conference Series: Journal of Physics,1003(1), 2018.
Yari, I. A., & Zargari, S. (2017). An overview and computer forensic challenges in image steganography. In IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
Venčkauskas, A., Morkevicius, N., Bagdonas, K., Damaševičius, R., & Maskeliūnas, R. (2017). A lightweight protocol for secure video streaming. Sensors,18, 2018.
Weng, X., Li, Y., Chi, L., Mu, Y. (2018). Convolutional video steganography with temporal residual modeling. CoRR, abs/1806.02941.
Vishwanath, A., Peruri, R., & He, J. (2016). Security in fog computing through encryption. International Journal of Information Technology and Computer Science,5, 28–36.
Ibrahim, M. M., Abdel Kader, N. S., & Zorkany, M. (2014). Video multiple watermarking technique based on image interlacing using DWT. The Scientific World Journal.
Krishna, B. M., Madhumati, G. L., & Khan, H. (2019). FPGA based pseudo random sequence generator using XOR/XNOR for communication cryptography and VLSI testing applications. International Journal of Innovative Technology and Exploring Engineering,8(4), 485–494.
Al Hamid, H. A., Rahman, S. M., Hossain, M. S., Almogren, A., & Alamri, A. (2017). A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access,5, 22313–22328.
Desai, J., Hemalatha, S., & Shishira, S. R. (2014). Comparison between DCT and DWT Steganography Algorithms. International Journal of Advanced Information Science and Technology (IJAIST),24(24), 51–55.
Sahu, P., & Sinha, S. (2017). Discrete wavelet packet transform based video steganography. International Journal of Mineral Processing and Extractive Metallurgy,2(1), 7–12.
Goresky, M., & Klapper, A. M. (2002). Fibonacci and galois representations of feedback-with-carry shift registers. IEEE Transactions on Information Theory,48(11), 2002.
Yue, Wu, Noonan, Joseph P., & Agaian, Sos. (2011). NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications,2, 31–38.
Saleema, A., & Amarunnishad, T. (2016). A new steganography algorithm using hybrid fuzzy neural networks. International Conference on Emerging Trends in Engineering, Science and Technology,24, 1566–1574.
Kavitha, P. K., & Vidhya Saraswathi, P. (2018). Color image encryption: A new public key cryptosystem based on polynomial equation. In Proceedings of the International Conference on ISMAC in Computational Vision and Bio-engineering (pp. 69–78).
Wang, Xingyuan, Zhu, Xiaoqiang, & Zhang, Yingqian. (2018). An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access,6, 23733–23746.
Chuman, Tatsuya, Sirichotedumrong, Warit, & Kiya, Hitoshi. (2019). Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Transactions on Information Forensics and Security,14(6), 1515–1525.
Mohamed, H. M., Ali, A. F., & Altaweel, G. S. (2017). A hybrid curvelet transform and genetic algorithm for image steganography. International Journal of Advanced Computer Science and Applications,8(8), 2017.
Al-Taweel, S. A., Al-Hada, M. H., & Nasser, A. M. (2018). Image in image steganography technique based on arnold transform and LSB algorithms. International Journal of Computer Applications,181(10), 2018.
Bharti, S., Behal, S., & Sharma, V. (2018). Security enhancements for high quality image transaction with hybrid image steganography algorithm. In Second International Conference on Computing Methodologies and Communication (ICCMC), 2018.
Mukherjee, S., & Sanyal, G. (2019) A multi-level image steganography methodology based on adaptive PMS and block based pixel swapping. In Multimedia Tools and Applications (pp. 1–16).
Razzaq, M. A., Baig, M. A., Shaikh, R. A., & Memon, A. A. (2017). Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications,8(5), 2017.
Mstafa, R. J., & Abdelfattah, E. (2017). Robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access,5, 5354–5365.
Shashidhara, H. N., & Usha, B. A. (2017). Video steganography using zero order hold method for secured data transmission. International Journal of Computer Applications,176(5), 44–48.
Alrawais, A., Alhothaily, A., Hu, C., Xing, Xiaoshuang, & Cheng, X. (2017). An attribute-based encryption scheme to secure fog communications. IEEE Access,5, 9131–9138.
Deepika, (2017). Enhancement of data security for cloud environment using cryptography and steganography technique. International Journal of Innovative Research in Computer and Communication Engineering,5(1), 2017.
Baliga, J., Ayre, R., Hinton, K., & Tucker, R. (2011). Green cloud computing: Balancing energy in processing, storage, and transport. Proceedings of the IEEE,99(1), 149–167.
Assila, B., Kobbane, A., Walid, A., & El Koutbi, M. (2019). Achieving low-energy consumption in fog computing environment: A matching game approach. IEEE Transactions on Communications and Networking,3(1), 250–263.
Nithya, R., Paviya, M., Poornimadevi, A., & Ravi, S. (2015). A performance comparison of low power LFSR structures. International Journal of Recent Research in Science, Engineering and Technology,1(1), 2015.
Dhinesh, H., Adhiyaman, G., & Esakki Muthu, A. (2019). A high performance parallel architecture for linear feedback shift register. International Research Journal of Engineering and Technology,6(3), 2019.
Tulluru, S., & Anuradha, S. G. (2018). Fog computing a paradigm: scenarios and security issues. International Journal of Engineering Research in Computer Science and Engineering,5(4), 2018.
Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M. A., Choudhury, N., et al. (2017). Security and privacy in fog computing: Challenges. IEEE Access,5, 19293–19304.
Naher, N., & Haque, M. M. (2019) Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC. In Proceedings of the International Ethical Hacking Conference (pp. 139–150).
Lu, Y., & Da Xu, L. (2018). Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things Journal,6, 2103–2115.
Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications,1, 53–66.
Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2018). Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommunication Systems,67(2), 247–267.
Stojmenovic, I., & Wen, S. (2014). The fog computing paradigm: Scenarios and security issues. In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, 7–10 September (pp. 1–8).
Hamed, T., Ernst, J. B., & Kremer, S. C. (2018). A survey and taxonomy of classifiers of intrusion detection systems. In Computer and Network Security Essentials (pp. 21–39).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Human and animal rights
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hussein, S.A., Saleh, A.I., Mostafa, H.ED. et al. A hybrid security strategy (HS2) for reliable video streaming in fog computing. Wireless Netw 26, 1389–1416 (2020). https://doi.org/10.1007/s11276-019-02203-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-019-02203-3