Skip to main content

Advertisement

Log in

A resource-efficient encryption algorithm for multimedia big data

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In this paper, we have designed and developed a resource-efficient encryption system for encrypting multimedia big data in IoT. The proposed system takes the advantages of the Feistel Encryption Scheme, an Advanced Encryption Standard (AES), and genetic algorithms. To satisfy high throughput, the GPU has also been used in the proposed system. This system is evaluated on real IoT medical multimedia data to benchmark the encryption algorithms such as MARS, RC6, 3-DES, DES, and Blowfish in terms of computational running time and throughput for both encryption and decryption processes as well as the avalanche effect. The results show that the proposed system has the lowest running time and highest throughput for both encryption and decryption processes and highest avalanche effect with compared to the existing encryption algorithms. To satisfy the security objective, the developed algorithm has better Avalanche Effect with compared to any of the other existing algorithms and hence can be incorporated in the process of encryption/decryption of any plain multimedia big data. Also, it has shown that the classical and modern ciphers have very less Avalanche Effect and hence cannot be used for encryption of confidential multimedia messages or confidential big data. The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50. Therefore, such system is able to secure the multimedia big data against real-time attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Aljawarneh S (2011) Cloud security engineering: avoiding security threats the right way. Int J Cloud Appl Comput (IJCAC) 1(2):64–70. doi:10.4018/ijcac.2011040105

    Google Scholar 

  2. Aljawarneh S, Raja M, Abdelsalam M (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77

    Article  Google Scholar 

  3. Atzori L, Iera A, Morabito G (2010) Internet of things: a survey. Comput Netw 54:2787–2805

    Article  MATH  Google Scholar 

  4. Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 58:49–69

    Article  Google Scholar 

  5. Chen M, Shiwen M, Yunhao L (2014) Big data: a survey. Mob Netw Appl 19:171–209

    Article  Google Scholar 

  6. Dave E (2016) The internet of things: how the next evolution of the internet is changing everything. Cisco

  7. Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10:216–222

    Google Scholar 

  8. Evans D (2011) The internet of things how the next evolution of the internet is changing everything. Cisco Internet Business Solutions Group (IBSG)

  9. Hart J, Martinez K (2015) Toward an environmental internet of things. AGU Earth Space Sci 2:194–200

    Article  Google Scholar 

  10. http://www.nvidia.com/content/pdf/kepler/tesla-k20-passive-bd-06455-001-v07.pdf. Accessed 14 July 2016

  11. http://www.sesame.org.jo. Accessed 30 Aug 2016

  12. Kalyani V, Gaur P, Vats S (2015) IoT: ‘machine to machine’ application a future vision. J Manag Eng Inf Technol (JMEIT) 2:2394–8124

    Google Scholar 

  13. Kuehner H, Hartenstein H (2016) decentralized secure data sharing with attribute-based encryption: a resource consumption analysis. Proceedings of the 4th ACM International Workshop on Security in Cloud Computing

  14. Kumar A, Rajpal N, Tayal A (2005) New signal security system for multimedia data transmission using genetic algorithms. NCC05

  15. Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. Proceedings of the International Symposium on Next Generation Electronics

  16. Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17:243–259

    Article  Google Scholar 

  17. Madakam S (2015) Internet of things: smart things. Int J Future Comput Commun 4:250–253

    Article  Google Scholar 

  18. Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability-based access control (IACAC) for the internet of things. J Cyber Secur Mob 1:309–348

    Google Scholar 

  19. Prasetyo KN, Purwanto Y, Darlis D (2014) An Implementation of data encryption for internet of things using blowfish algorithm on FPGA. International Conference on Information and Communication Technology

  20. Santucci G (2009) From internet to data to internet of things. Proceedings of the International Conference on Future Trends of the Internet

  21. Schneier B (1996) Applied cryptography, 2nd edn. Wiley

  22. Schweitzer D, Boleng J (2009) Designing web labs for teaching security concepts. J Comput Sci Coll 25:39–45

    Google Scholar 

  23. Smith J (2013) Riding the multimedia big data wave. In: Proceedings of the International ACM SIGIR Conference on Research and development in Information Retrieval (SIGIR’13)

  24. Stallings W (1999) Cryptography and network security principle and practice, 2nd edn. Prentice Hall

  25. Sundaram BV, Ramnath M, Prasanth M, Sundaram V (2015) Encryption and hash based security in internet of things. Proceedings of International Conference on Signal Processing, Communication and Networking

  26. Tavares SE, Heys HM (1995) Avalanche characteristics of substitution-permutation encryption networks. IEEE Trans Comput 44:1131–1139

    Article  MATH  Google Scholar 

  27. Wang W, Hu Y, Chen L, Huang X, Sunar B (2012) accelerating fully homomorphic encryption using GPU. Proceedings of the IEEE Conference on High-Performance Extreme Computing (HPEC)

  28. Xin M (2015) A mixed encryption algorithm used in internet of things security transmission system. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

  29. Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112

    Article  Google Scholar 

  30. Zhao Y (2013) Research on data security technology in internet of thing. Proceedings of the International Conference on Mechatronics and Control Engineering

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shadi Aljawarneh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aljawarneh, S., Yassein, M.B. & Talafha, W.A. A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76, 22703–22724 (2017). https://doi.org/10.1007/s11042-016-4333-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4333-y

Keywords

Navigation