Harnessing the Hybrid Cloud for Secure Big Image Data Service

Various kinds of image sensors capture a large number of images in Internet of Things (IoT) every day. It is increasingly concerned how to securely store and share these big image data from IoT. In this paper, we harness the hybrid cloud to provide secure big image data storage and share service for users. The basic idea is to partition each image into a small set of sensitive data and a large set of insensitive data, which are securely stored in the private cloud and the public cloud, respectively. Specially, the private cloud divides each image into the sensitive data (<20%) and the insensitive data (>80%) based on sensitivity identification approaches like Sobel edge detector. The sensitive data are encrypted in parallel at a counter mode and then stored in the private cloud. The insensitive data are encrypted-then-subsampled and then placed in the public cloud, in which the encryption employs the permutation-diffusion architecture and the subsampling utilizes compressed sampling technique. The keystreams used in encryption operations are managed by the tent-logistic system with high initial value sensitivity. Once users make a request for an image, the public cloud provides a privacy-guaranteed insensitive data reconstruction service, and the private cloud decrypts the sensitive and insensitive data and regroups them into a complete image. Experimental results demonstrate that the proposed framework can provide secure big image data service.

[1]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Yuan Yan Tang,et al.  Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling , 2014, IEEE Transactions on Information Forensics and Security.

[3]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[4]  Xiaogang Wang,et al.  Optical Image Encryption With Divergent Illumination and Asymmetric Keys , 2017, IEEE Photonics Journal.

[5]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[6]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Seiichi Uchida,et al.  A parallel image encryption method based on compressive sensing , 2012, Multimedia Tools and Applications.

[8]  Huiqian Du,et al.  Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain , 2014 .

[9]  Xiang Peng,et al.  Double-lock for image encryption with virtual optical wavelength. , 2002, Optics express.

[10]  Zhenxing Qian,et al.  Scalable Coding of Encrypted Images , 2012, IEEE Trans. Image Process..

[11]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[12]  Di Xiao,et al.  Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform , 2013 .

[13]  Xiaobo Li,et al.  Image compression and encryption using tree structures , 1997, Pattern Recognit. Lett..

[14]  Xiaoling Huang,et al.  An image encryption algorithm based on hyper-chaos and DNA sequence , 2012, Multimedia Tools and Applications.

[15]  Hai Jiang,et al.  Permutation Meets Parallel Compressed Sensing: How to Relax Restricted Isometry Property for 2D Sparse Signals , 2013, IEEE Transactions on Signal Processing.

[16]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[17]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[18]  Kwok-Wo Wong,et al.  Embedding cryptographic features in compressive sensing , 2014, Neurocomputing.

[19]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[20]  Yong Xiang,et al.  Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds , 2017 .

[21]  Kwok-Wo Wong,et al.  A chaotic image encryption scheme owning temp-value feedback , 2013, Commun. Nonlinear Sci. Numer. Simul..

[22]  Zhenxing Qian,et al.  Compressing Encrypted Images With Auxiliary Information , 2014, IEEE Transactions on Multimedia.

[23]  Li-Hua Gong,et al.  Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing , 2014 .

[24]  Stephen P. Boyd,et al.  Disciplined Convex Programming , 2006 .

[25]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[26]  Kwok-Wo Wong,et al.  On the security of symmetric ciphers based on DNA coding , 2014, Inf. Sci..

[27]  Yushu Zhang,et al.  Exploiting random convolution and random subsampling for image encryption and compression , 2015 .

[28]  Li-Hua Gong,et al.  Novel optical image encryption scheme based on fractional Mellin transform , 2011 .

[29]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[30]  Bencheng Chai,et al.  An Image Encryption Algorithm Based on Sequence , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[31]  Shiguo Lian,et al.  A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..

[32]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[33]  Cong Wang,et al.  Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud , 2013, IEEE Transactions on Emerging Topics in Computing.

[34]  Kwok-Wo Wong,et al.  A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..

[35]  Jing Li,et al.  A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations , 2013, Signal Process. Image Commun..

[36]  Wen Chen,et al.  Optical Multiple-Image Encryption Using Three-Dimensional Space , 2016, IEEE Photonics Journal.

[37]  B Deepan,et al.  Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique. , 2014, Applied optics.

[38]  Kwok-Wo Wong,et al.  Bi-level Protected Compressive Sampling , 2016, IEEE Transactions on Multimedia.

[39]  V.K. Goyal,et al.  Compressive Sampling and Lossy Compression , 2008, IEEE Signal Processing Magazine.

[40]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[41]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .