Abstract
Fog computing has become a fast intermediate between the cloud and the internet of things (IOT) devices. So, the communication channel between the fog and IOT devices must be secured against attacks. Both Cryptography and steganography are well-known techniques for data security. Each of them has its own advantages and strength points, hence, combining Cryptography and steganography in a hybrid system certainly promotes the system’s level of security. Although several hybrid security strategies have been proposed, they suffer from many drawbacks especially when they are applied in fog environments. Fog computing requires not only high security level but also a real time transmission. Hence, recent hybrid security strategies cannot be applied directly in fog environments as they suffer from long processing time. This paper introduces a new Fog Based Security Strategy (FBS2). FBS2 is a hybrid security strategy as it combines Cryptography and steganography techniques. The proposed Cryptography Technique (PCT) is divided into two phases, namely; confusion and diffusion. The former scrambles the secret image pixels, while the latter changes the pixels values using new confusion and diffusion methodologies respectively. Confusion divides the secret images into closed loops of pixels, then rearrange the pixels into straight paths, while diffusion employs a Programmable Linear Feedback Shift Register (PLFSR). On the other hand, the Proposed Steganography Technique is implemented using the discrete wavelet packet transform. Embedding process depends on a new matching procedure, which is based on the most significant bits of both the encrypted secret image and the corresponding employed cover image pixels. Least significant bits (LSBs) are used as indicators to the matching process. At first an intermediate code is derived from the matching process, then, it is encrypted to represent the LSBs of the stego-image. Experimental results have shown that the proposed FBS2 outperforms the previous counterparts in terms of efficiency, security, and processing time, which proves its suitability for application on the fog.
Similar content being viewed by others
References
Ahmed A, Bassem A, Hossain M, Samir E, Ahmed G (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Access 6:10332–10340
Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21:34–42
Ammar M, Abdelhamied A, Abdukodir K, Irina G, Abdelrahman A, Konstantin S, Andrey K (2019) Secure IoT network structure based on distributed Fog computing, with SDN/Blockchain. J Sens Actuator Netw 8:15. https://www.researchgate.net/publication/330702991
Anita P, Sekhar K, Gandharba S (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng. https://doi.org/10.1155/2018/1804953
Ankita B, Mohit D, Dua Shelza (2018) A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. J Ambient Intell Human Comput 10:3519–3531. https://doi.org/10.1007/s12652-018-1072-0
Arwa A, Abdulrahman A, Chunqiang H, Xiaoshuang X, Xiuzhen C (2017) An attribute-based encryption scheme to secure fog communications. IEEE Access 5:9131–9138
Ashraf D, Aboul Ella H, Mohamed E, Arun S, Khan M (2017) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0659-1
Awais M, Munam S, Hasan K, Ikram U, Muhammad K (2019) Multi-tier authentication schemes for fog computing: architecture, security perspective, and challenges. Int J Commun Syst. https://doi.org/10.1002/dac.4033
Bao Z, Guo Y, Li X et al (2019) A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01345-8
Blanca C, Manuel D (2018) Steganography algorithm based on the nonlocal maximum likelihood noise estimation for mobile applications. Secur Commun Netw. https://doi.org/10.1155/2018/1404826
Bridget M, Frank M, Don B, Arsalan M, Riaz Z, Susanto I, Sven S, John Z (2017) Open fog security requirements and approaches. IEEE fog world congress USA. https://doi.org/10.1109/FWC.2017.8368537
Carlo P, Carlo V, Enzo M, Giovanni M, Francesco L, Antonio P (2019) Container migration in the fog: a performance evaluation. Sensors 19:1488
Chong F, Gao Z, Mai Z, Zhe C, Wei L (2018) A new chaos-based color image encryption scheme with an efficient substitution key stream generation strategy. Hindawi Secur Commun Netw. https://doi.org/10.1155/2018/2708532
Deepak P, Mohammad O, Priyadarsi N, Mukesh P, Saraju M, Albert Z (2018) Secure and sustainable load balancing of edge data centers in fog computing. IEEE Commun Mag 56:60–65
Dena A, Salah A (2018) Image encryption algorithm based on Rc4 and henon map. J Theor Appl Inf Technol 96:7065–7076
Deniz E, Nursin C (2018) An efficient image encryption algorithm for the period of Arnold’s CAT map. Int J Intell Syst Appl Eng 6:80–84
Gandharba S (2018) High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis. Secur Commun Netw. https://www.researchgate.net/publication/319644497
Gupta B, Nalin A, Konstantinos P (2017) Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun Syst 67:247–267. https://www.researchgate.net/publication/317044956
Hany D, Robert W, Gary W (2018) Fog computing and the internet of things: a review. Big Data Cogn Comput. https://doi.org/10.3390/bdcc2020010
Hikmat A, Sura Y, Alejandro V (2018) Spatial and transform domain based steganography using chaotic maps for color images. J Fundam Appl Sci 10:551–556
Ivan S, Sheng W (2014) The fog computing paradigm: scenarios and security issues. Fed Conf Comput Sci Inf Syst 2:1–8
Jimoh Y, Shafi A, Haruna C, Haruna C, Mohammed A (2019) Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ. https://doi.org/10.1007/s40860-019-00081-2
Kanghyo L, Donghyun K, Dongsoo H, Ubaidullah R, Heekuck O (2015) On security and privacy issues of fog computing supported Internet of Things environment. Conf Netw Future. https://doi.org/10.1109/nof.2015.7333287
Kavitha K, Vidhya P (2019) Color image encryption: a new public key cryptosystem based on polynomial equation. Springer Nat Switz Proc Int Conf Ismac Comput Vis Bio-Eng 30:69–78
Khan A, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Future Gener Comput Syst 82:395–411. https://doi.org/10.1016/j.future.2017.11.022
Kiswara S, Fatmawati M, Herry S (2018) On max-plus algebra and its application on image steganography. Sci World J. https://doi.org/10.1155/2018/6718653
Malathi D, Subramaniyaswamy V, Vijayakumar V, Logesh R (2019) Fog-assisted personalized healthcare-support system for remote patients with diabetes. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01291-5
Mansi S, Mankar VH (2019) Image steganography using contourlet transform and matrix decomposition techniques. Multimedia Tools Appl 78:22155. https://doi.org/10.1007/s11042-019-7512-9
Mithun M, Rakesh M, Lei S, Leandros M, Mohamed F, Nikumani C, Vikas K (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304
Mohamed M, Jalel B, Mohamed H (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1:53–66
Muhammad U, Irfan A, Aslam M, Shujaat K, Usman S (2017) SIT: a lightweight encryption algorithm for secure Internet of Things. Int J Adv Comput Sci Appl 8:402–411
Musbah A, Ziad A, Ammar A (2018) RGB color image encryption decryption using image segmentation and matrix multiplication. Int J Eng Technol 7:104–107
Nadeem A, Muhammad A, Noshina T, Thar B, Sohail A (2019) A mechanism for securing IoT-enabled applications at the fog layer. J Sens Actuator Netw 8:16. https://doi.org/10.3390/jsan8010016
Nazmun N, Mokammel H, Asaduzzaman (2018) Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC. eHaCON, Kolkata. pp 139–150. https://www.researchgate.net/publication/328105690
Noshina T, Muhammad A, Feras A, Muhammad F, Thar B, Mohammad H, Ibrahim G (2019) The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors 19:1788
Olena S, Stefan S, Michael B, Philipp L (2016) Resource provisioning for IoT services in the fog. In: IEEE 9th international conference on service oriented computing and applications, pp 32–39
Parinita S, Swapnil S (2017) Discrete wavelet packet transform based video steganography. Int J Miner Process Extr Metall 2:7–12
Peng Z, Joseph L, Yu F, Mehdi S, Man A, Xiapu L (2018) A survey on access control in fog computing. IEEE Commun Mag 56:144–149
Pranjali S, Shruti P, Surabhi S, Anita L (2018) An image cryptography using henon map and arnold cat map. Int Res J Eng Technol 5:1900–1904
Reem H, Huda A (2018) Cipher secret image using hybrid visual cryptography. ARPN J Eng Appl Sci 13:1015–1021
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698. https://doi.org/10.1016/j.future.2016.11.009
Rongxing L, Kevin H, Arash L, Ali G (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312
Sadik A, Mohammed A, Ahmed N (2018) Image in image steganography technique based on arnold transform and LSB algorithms. Int J Comput Appl 181:32–39
Sahu AK, Swain G, Babu ES (2018) Digital image steganography using bit flipping. Cybern Inf Technol 18:69–80
Sai T, Anuradha G (2018) Fog Computing a Paradigm: Scenarios and Security Issues. Int J Eng Res Comput Sci Eng 5:433–437
Sajay KR, Suvanam B, Yellepeddi V (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01403-1
Saleema A, Amarunnishad T (2016) A new steganography algorithm using hybrid fuzzy neural networks. international conference on emerging trends in engineering, science and technology 24:1566–1574. http://creativecommons.org/licenses/by-nc-nd/4.0
Salvatore V, Alba A (2018) A methodology for deployment of IoT application in fog. J Ambient Intell Human Comput 10:1955–1976. https://doi.org/10.1007/s12652-018-0785-4
Shashidhara N, Usha A (2017) Video steganography using zero order hold method for secured data transmission. Int J Comput Appl 176:44–48
Sneha S, Syam S, Ashok K (2019) A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01385-0
Syed I, Neha S, Malik M (2018) Secure data transmission based on combined effect of cryptography and steganography using visible light spectrum. Int J Pure Appl Math 118:2851–2860. http://www.ijpam.eu
Tarfa H, Jason E, Stefan K (2018) A survey and taxonomy of classifiers of intrusion detection systems. In: Computer and network security essentials. pp 21–39
Tatsuya C, Warit S, Hitoshi K (2019) Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans Inf Forensics Secur 14:1515–1525
Xiaoling H, Guodong Y (2018) An image encryption algorithm based on time-delay and random insertion. Entropy 20:974. https://doi.org/10.3390/e20120974
Xin J, Sui Y, Xiaodong L, Geng Z, Zhaohui T, Nan S, Shuyun Z (2017) Color image encryption in ycbcr space. Int Conf Wirel Commun Signal Process. https://ieeexplore.ieee.org/document/7752646
Xin J, Sui Y, Ningning L, Xiaodong L, Geng Z, Shiming G (2018) Color image encryption in non RGB color spaces. Multimedia Tools Appl 77:15851–15873. https://doi.org/10.1007/s11042-017-5159-y
Xingyuan W, Xiaoqiang Z, Yingqian Z (2018) An image encryption algorithm based on josephus traversing and mixed chaotic map. IEEE Access 6:23733–23746
Yang L, Li X (2018) Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J 6:2103–2115
Yonglin Xu, Shaofei Wu, Mingqing W, Yuntao Z (2018) Design and implementation of distributed RSA algorithm based on Hadoop. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-1021-y
Yue W, Joseph N, Sos A (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 2:31–38
Yung Y, Chih H, Sin Y, Hsin L (2018) Data hiding method for AMBTC compressed images. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-1048-0
Yuvaraja T, Sabeenian R (2019) Dual tree complex wavelet transform-based image security using steganography. Appl Math Inf Sci 13:215–222
Zhenhao L, Wei X, Baosheng W, Yong T, Qianqian X (2019) EasyStego: robust steganography based on quick-response barcodes for crossing domains. Symmetry 11:222. https://doi.org/10.3390/sym11020222
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical statement
Hereby, authors consciously assure that for this paper, the following is fulfilled: (1) This material is the authors’ own original work, which has not been previously published elsewhere, (2) the paper is not currently being considered for publication elsewhere, (3) the paper reflects the authors’ own research and analysis in a truthful and complete manner, (4) the paper properly credits the meaningful contributions of co-authors and co-researchers, (5) the results are appropriately placed in the context of prior and existing research, (6) all sources used are properly disclosed (correct citation), (7) all authors have been personally and actively involved in substantial work leading to the paper, and will take public responsibility for its content.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hussein, S.A., Saleh, A.I. & Mostafa, H.ED. A new fog based security strategy (FBS2) for reliable image transmission. J Ambient Intell Human Comput 11, 3265–3303 (2020). https://doi.org/10.1007/s12652-019-01512-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-019-01512-x