Skip to main content
Log in

A hybrid security strategy (HS2) for reliable video streaming in fog computing

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Recently, digital communication and storage over the Internet through the cloud have increased in a rapid manner. Accordingly, data security becomes a vital issue as there are many hackers who want to steal or alter others’ private data. Fog computing comes to secure and facilitate the connection to the cloud. It works as an intermediary between the cloud and the peripheral devices. Accordingly, the channel between the fog and those devices must be secured against attacks. Many efforts have been done to secure the fog through the use of steganography to embed important data into a cover digital medium and cryptography to encrypt the data into a meaningless form. As steganography and cryptography have their own advantages, combining them into a hybrid system will certainly promote the security level. Video steganography uses video as a cover media for hiding secret data as video streaming over internet is very popular and common that cannot be doubted by intruders. The advantage of using video files as a cover is that they are more secure against hacker attacks due to their relative complexity compared to other multimedia types and the data redundancy which permits to embed large amount of secret data. In this paper a new hybrid security strategy (HS2) merging the advantages of both cryptography and steganography for securing the fog has been proposed. HS2 embeds a secret image into a video .mp4 as the host medium. HS2 has two main contributions. The first is a new encryption technique that depends on α-blocks of linear feedback shift registers (LFSRs) merged with an adder/subtractor to generate a strong secret key for each block. All blocks outputs are combined using a nonlinear function to construct the final key. Such generated key will be XORed with the secret image to produce the encrypted secret image. The second contribution is a new steganography methodology based on an enhanced discrete wavelet packet transform (DWPT) to embed the encrypted secret image into a cover video. Experimental results and security analysis have shown that the proposed HS2 outperforms recent security strategies and resist common attacks when applied to the fog environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40
Fig. 41
Fig. 42
Fig. 43
Fig. 44
Fig. 45

Similar content being viewed by others

References

  1. El-Latif, A. A. A., Abd-El-Atty, B., Hossain, M. S., Elmougy, S., & Ghoniem, A. (2018, January). Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access.

  2. Munir, A., Kansakar, P., & Khan, S. U. (2017). IFCIoT: Integrated fog cloud IoT: a novel architectural paradigm for the future Internet of Things. IEEE Consumer Electronics Magazine,6(3), 74–82.

    Article  Google Scholar 

  3. Usman, M., Irfan, A., Aslam, M. I., Khan, S., & Shah, U. A. (2017). SIT: A lightweight encryption algorithm for secure internet of things. International Journal of Advanced Computer Science and Applications,8(1), 2017.

    Article  Google Scholar 

  4. Kaur, G. (2017). Necessity of fog computing for security of cloud data. ECONSPEAK: A Journal of Advances in Management IT & Social Sciences,7(5), 2017.

    Google Scholar 

  5. Sowjanya, V. K. (2017). Security framework for sharing data in fog computing. International Journal of Advanced Research in Computer and Communication Engineering,6(6), 2017.

    Google Scholar 

  6. Maksimovic, M. (2017). Implementation of Fog computing in IoT-based healthcare system. Journal of Information Technology and Applications (JITA),7(2), 100–107.

    Google Scholar 

  7. Nagarani, C., & Kousalya, R. (2018). Comparison of security and performance issues in fog enabled cloud computing. International Journal of Computer Applications,180(22), 2018.

    Article  Google Scholar 

  8. Kumar, H., Shinde, S., & Talele, P. (2017). Secure fog computing system using emoticon technique. International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC),5(7), 808–811.

    Google Scholar 

  9. Waghmare, S., Ahire, S., Fegade, Himali, & Darekar, P. (2017). Securing cloud using fog computing with hadoop framework. International Journal of Science, Engineering and Technology,5(3), 2017.

    Google Scholar 

  10. Martin, B. A., Michaud, F., Banks, D., & Mosenia, A. (2017). OpenFog security requirements and approaches. In IEEE Communications Society Invited Paper, IEEE Conference (pp. 1–6).

  11. Baby, A., & Krishnan, H. (2017). Combined strength of steganography and cryptography—A literature survey. International Journal of Advanced Research in Computer Science,8(3), 2017.

    Google Scholar 

  12. Abed Shukur, W., Najah Abdullah, W., & Kareem Qurban, L. (2018). Information hiding in digital video using DCT, DWT and CvT. IOP Conference Series: Journal of Physics,1003(1), 2018.

    Google Scholar 

  13. Yari, I. A., & Zargari, S. (2017). An overview and computer forensic challenges in image steganography. In IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

  14. Venčkauskas, A., Morkevicius, N., Bagdonas, K., Damaševičius, R., & Maskeliūnas, R. (2017). A lightweight protocol for secure video streaming. Sensors,18, 2018.

    Google Scholar 

  15. Weng, X., Li, Y., Chi, L., Mu, Y. (2018). Convolutional video steganography with temporal residual modeling. CoRR, abs/1806.02941.

  16. Vishwanath, A., Peruri, R., & He, J. (2016). Security in fog computing through encryption. International Journal of Information Technology and Computer Science,5, 28–36.

    Article  Google Scholar 

  17. Ibrahim, M. M., Abdel Kader, N. S., & Zorkany, M. (2014). Video multiple watermarking technique based on image interlacing using DWT. The Scientific World Journal.

  18. Krishna, B. M., Madhumati, G. L., & Khan, H. (2019). FPGA based pseudo random sequence generator using XOR/XNOR for communication cryptography and VLSI testing applications. International Journal of Innovative Technology and Exploring Engineering,8(4), 485–494.

    Google Scholar 

  19. Al Hamid, H. A., Rahman, S. M., Hossain, M. S., Almogren, A., & Alamri, A. (2017). A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access,5, 22313–22328.

    Article  Google Scholar 

  20. Desai, J., Hemalatha, S., & Shishira, S. R. (2014). Comparison between DCT and DWT Steganography Algorithms. International Journal of Advanced Information Science and Technology (IJAIST),24(24), 51–55.

    Google Scholar 

  21. Sahu, P., & Sinha, S. (2017). Discrete wavelet packet transform based video steganography. International Journal of Mineral Processing and Extractive Metallurgy,2(1), 7–12.

    Article  Google Scholar 

  22. Goresky, M., & Klapper, A. M. (2002). Fibonacci and galois representations of feedback-with-carry shift registers. IEEE Transactions on Information Theory,48(11), 2002.

    Article  MathSciNet  MATH  Google Scholar 

  23. Yue, Wu, Noonan, Joseph P., & Agaian, Sos. (2011). NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications,2, 31–38.

    Google Scholar 

  24. Saleema, A., & Amarunnishad, T. (2016). A new steganography algorithm using hybrid fuzzy neural networks. International Conference on Emerging Trends in Engineering, Science and Technology,24, 1566–1574.

    Google Scholar 

  25. Kavitha, P. K., & Vidhya Saraswathi, P. (2018). Color image encryption: A new public key cryptosystem based on polynomial equation. In Proceedings of the International Conference on ISMAC in Computational Vision and Bio-engineering (pp. 69–78).

  26. Wang, Xingyuan, Zhu, Xiaoqiang, & Zhang, Yingqian. (2018). An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access,6, 23733–23746.

    Article  Google Scholar 

  27. Chuman, Tatsuya, Sirichotedumrong, Warit, & Kiya, Hitoshi. (2019). Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Transactions on Information Forensics and Security,14(6), 1515–1525.

    Article  Google Scholar 

  28. Mohamed, H. M., Ali, A. F., & Altaweel, G. S. (2017). A hybrid curvelet transform and genetic algorithm for image steganography. International Journal of Advanced Computer Science and Applications,8(8), 2017.

    Google Scholar 

  29. Al-Taweel, S. A., Al-Hada, M. H., & Nasser, A. M. (2018). Image in image steganography technique based on arnold transform and LSB algorithms. International Journal of Computer Applications,181(10), 2018.

    Google Scholar 

  30. Bharti, S., Behal, S., & Sharma, V. (2018). Security enhancements for high quality image transaction with hybrid image steganography algorithm. In Second International Conference on Computing Methodologies and Communication (ICCMC), 2018.

  31. Mukherjee, S., & Sanyal, G. (2019) A multi-level image steganography methodology based on adaptive PMS and block based pixel swapping. In Multimedia Tools and Applications (pp. 1–16).

  32. Razzaq, M. A., Baig, M. A., Shaikh, R. A., & Memon, A. A. (2017). Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications,8(5), 2017.

    Google Scholar 

  33. Mstafa, R. J., & Abdelfattah, E. (2017). Robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access,5, 5354–5365.

    Google Scholar 

  34. Shashidhara, H. N., & Usha, B. A. (2017). Video steganography using zero order hold method for secured data transmission. International Journal of Computer Applications,176(5), 44–48.

    Article  Google Scholar 

  35. Alrawais, A., Alhothaily, A., Hu, C., Xing, Xiaoshuang, & Cheng, X. (2017). An attribute-based encryption scheme to secure fog communications. IEEE Access,5, 9131–9138.

    Article  Google Scholar 

  36. Deepika, (2017). Enhancement of data security for cloud environment using cryptography and steganography technique. International Journal of Innovative Research in Computer and Communication Engineering,5(1), 2017.

    MathSciNet  Google Scholar 

  37. Baliga, J., Ayre, R., Hinton, K., & Tucker, R. (2011). Green cloud computing: Balancing energy in processing, storage, and transport. Proceedings of the IEEE,99(1), 149–167.

    Article  Google Scholar 

  38. Assila, B., Kobbane, A., Walid, A., & El Koutbi, M. (2019). Achieving low-energy consumption in fog computing environment: A matching game approach. IEEE Transactions on Communications and Networking,3(1), 250–263.

    Article  Google Scholar 

  39. Nithya, R., Paviya, M., Poornimadevi, A., & Ravi, S. (2015). A performance comparison of low power LFSR structures. International Journal of Recent Research in Science, Engineering and Technology,1(1), 2015.

    Google Scholar 

  40. Dhinesh, H., Adhiyaman, G., & Esakki Muthu, A. (2019). A high performance parallel architecture for linear feedback shift register. International Research Journal of Engineering and Technology,6(3), 2019.

    Google Scholar 

  41. Tulluru, S., & Anuradha, S. G. (2018). Fog computing a paradigm: scenarios and security issues. International Journal of Engineering Research in Computer Science and Engineering,5(4), 2018.

    Google Scholar 

  42. Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M. A., Choudhury, N., et al. (2017). Security and privacy in fog computing: Challenges. IEEE Access,5, 19293–19304.

    Article  Google Scholar 

  43. Naher, N., & Haque, M. M. (2019) Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC. In Proceedings of the International Ethical Hacking Conference (pp. 139–150).

  44. Lu, Y., & Da Xu, L. (2018). Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things Journal,6, 2103–2115.

    Article  Google Scholar 

  45. Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications,1, 53–66.

    Article  Google Scholar 

  46. Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2018). Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommunication Systems,67(2), 247–267.

    Article  Google Scholar 

  47. Stojmenovic, I., & Wen, S. (2014). The fog computing paradigm: Scenarios and security issues. In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, 7–10 September (pp. 1–8).

  48. Hamed, T., Ernst, J. B., & Kremer, S. C. (2018). A survey and taxonomy of classifiers of intrusion detection systems. In Computer and Network Security Essentials (pp. 21–39).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed I. Saleh.

Ethics declarations

Human and animal rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hussein, S.A., Saleh, A.I., Mostafa, H.ED. et al. A hybrid security strategy (HS2) for reliable video streaming in fog computing. Wireless Netw 26, 1389–1416 (2020). https://doi.org/10.1007/s11276-019-02203-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-02203-3

Keywords

Navigation