A resource-efficient encryption algorithm for multimedia big data

被引:131
作者
Aljawarneh, Shadi [1 ]
Yassein, Muneer Bani [1 ]
Talafha, We'am Adel [1 ]
机构
[1] Jordan Univ Sci & Technol, Fac Comp & Informat Technol, Irbid, Jordan
关键词
Internet of things; Multimedia big data; Encryption; AES; GPU; INTERNET;
D O I
10.1007/s11042-016-4333-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In this paper, we have designed and developed a resource-efficient encryption system for encrypting multimedia big data in IoT. The proposed system takes the advantages of the Feistel Encryption Scheme, an Advanced Encryption Standard (AES), and genetic algorithms. To satisfy high throughput, the GPU has also been used in the proposed system. This system is evaluated on real IoT medical multimedia data to benchmark the encryption algorithms such as MARS, RC6, 3-DES, DES, and Blowfish in terms of computational running time and throughput for both encryption and decryption processes as well as the avalanche effect. The results show that the proposed system has the lowest running time and highest throughput for both encryption and decryption processes and highest avalanche effect with compared to the existing encryption algorithms. To satisfy the security objective, the developed algorithm has better Avalanche Effect with compared to any of the other existing algorithms and hence can be incorporated in the process of encryption/decryption of any plain multimedia big data. Also, it has shown that the classical and modern ciphers have very less Avalanche Effect and hence cannot be used for encryption of confidential multimedia messages or confidential big data. The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50. Therefore, such system is able to secure the multimedia big data against real-time attacks.
引用
收藏
页码:22703 / 22724
页数:22
相关论文
共 28 条
[1]
Abd Elminaam DiaaSalama., 2010, IJ NETWORK SECURITY, V10, P216
[2]
Cloud Security Engineering: Avoiding Security Threats the Right Way [J].
Aljawarneh, Shadi .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (02) :64-70
[3]
Investigations of automatic methods for detecting the polymorphic worms signatures [J].
Aljawarneh, Shadi A. ;
Moftah, Raja A. ;
Maatuk, Abdelsalam M. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 60 :67-77
[4]
The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[5]
Internet of Things: Applications and Challenges in Technology and Standardization [J].
Bandyopadhyay, Debasis ;
Sen, Jaydip .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) :49-69
[6]
Big Data: A Survey [J].
Chen, Min ;
Mao, Shiwen ;
Liu, Yunhao .
MOBILE NETWORKS & APPLICATIONS, 2014, 19 (02) :171-209
[7]
Dave E., 2016, INTERNET THINGS NEXT
[8]
Evans D., 2011, CISCO
[9]
Toward an environmental Internet of Things [J].
Hart, Jane K. ;
Martinez, Kirk .
EARTH AND SPACE SCIENCE, 2015, 2 (05) :194-200
[10]
AVALANCHE CHARACTERISTICS OF SUBSTITUTION-PERMUTATION ENCRYPTION NETWORKS [J].
HEYS, HM ;
TAVARES, SE .
IEEE TRANSACTIONS ON COMPUTERS, 1995, 44 (09) :1131-1139