A Secure and Efficient Cryptography System Based on Chaotic Maps for Securing Data Image in Fog Computing

Full Text (PDF, 1602KB), PP.64-80

Views: 0 Downloads: 0


Samaa Y. Tarabay 1,* Abeer Twakol 1 Ahmed S. Samrah 1 Ibrahim Yasser 1

1. Mansoura University / Communication and Electronics Engineering Department, Mansoura, 35516, Egypt

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2023.01.06

Received: 7 Sep. 2022 / Revised: 20 Oct. 2022 / Accepted: 29 Nov. 2022 / Published: 8 Feb. 2023

Index Terms

Cryptography, Chaotic System, Securing Data, Fog Computing, Image Security


The huge availability and prosperity of net technology results in raised on-line media sharing over the cloud platform which has become one of the important resources and tools for development in our societies. So, in the epoch of enormous data great amount of sensitive information and transmission of different media transmitted over the net for communication. And recently, fog computing has captured the world's attention due to their inherent features relevant compared to the cloud domain, But this push to head for many issues related to data security and privacy in fog computing which it's still under studied in their initial juncture. Therefore, in this paper, we will review a security system that relies on encryption as a kind of effective solution to secure image data. We use an approach of using chaotic map plus space curve techniques moreover the confusion and diffusion strategies are carried out utilizing Hilbert curvature and chaotic map such as two-dimensional Henon map (2D-HM) to assert image confusion with pixel level permutation .Also we relied in our system the way of shuffling the image with blocks and use a key for each block, which is chooses randomly to have a high degree of security. The efficiency of the proposed technique has been tested utilizing different investigations like analysis of entropy [7.9993], NPCR [99.6908%] and finally UACI [33.6247%]. Analysis of results revealed that the proposed system of image encryption technique has favorable effects, and can achieve a good results moreover it fights different attacks and by comparing with another techniques denote that our proposed fulfills high security level with high quality.

Cite This Paper

Samaa Y. Tarabay, Abeer Twakol, Ahmed S. Samrah, Ibrahim Yasser, "A Secure and Efficient Cryptography System Based on Chaotic Maps for Securing Data Image in Fog Computing", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.1, pp.64-80, 2023. DOI:10.5815/ijcnis.2023.01.06


[1]Ni, J., Zhang, K., Lin, X., & Shen, X. (2017). Securing fog computing for internet of things applications: Challenges and solutions. IEEE Communications Surveys & Tutorials, 20(1), 601-628.
[2]Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F., Niakanlahiji, A., & Jue, J. P. (2019). All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture, 98, 289-330.
[3]Guan, Y., Shao, J., Wei, G., & Xie, M. (2018). Data security and privacy in fog computing. IEEE Network, 32(5), 106-111.
[4]Ashi, Z., Al-Fawa’reh, M., & Al-Fayoumi, M. (2020). Fog computing: security challenges and countermeasures. Int J Comput Appl, 975, 8887.
[5]Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: a review of current applications and security solutions. Journal of Cloud Computing, 6(1), 1-22.
[6]M. N. Alenezi, H. Alabdulrazzaq, “Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish,” International Journal of Communication Networks and Information Security, Vol. 14, No. 1, 2022
[7]Masood, F., Driss, M., Boulila, W., Ahmad, J., Rehman, S. U., Jan, S. U., & Buchanan, W. J. (2021). A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wireless Personal Communications, 1-28.
[8]Mohammad, O. F., Rahim, M. S. M., Zeebaree, S. R. M., & Ahmed, F. Y. (2017). A survey and analysis of the image encryption methods. International Journal of Applied Engineering Research, 12(23), 13265-13280.
[9]Masood, F., Ahmad, J., Shah, S. A., Jamal, S. S., & Hussain, I. (2020). A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map. Entropy, 22(3), 274.
[10]Yasser, I., Khalifa, F., Mohamed, M. A., & Samrah, A. S. (2020). A new image encryption scheme based on hybrid chaotic maps. Complexity.
[11]Albahrani, E. A., & Alshekly, T. K. (2017). New chaotic substation and permutation method for image encryption. International Journal of Applied Information Systems, 12(4), 34-39.
[12]Teng, L., Wang, X., & Meng, J. (2018). A chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications, 77(6), 6883-6896.
[13]Benlashram, Arwa, et al. "A novel approach of image encryption using pixel shuffling and 3D chaotic map." Journal of Physics: Conference Series. Vol. 1447. No. 1. IOP Publishing, 2020.
[14]Zhu, S., & Zhu, C. (2020). Secure image encryption algorithm based on hyper chaos and dynamic DNA coding. Entropy, 22(7), 772.
[15]Murali, P., & Sankaradass, V. (2019). An efficient space filling curve based image encryption. Multimedia Tools and Applications, 78(2), 2135-2156.
[16]Zhang, X., Wang, L., Zhou, Z., & Niu, Y. (2019). A chaos-based image encryption technique utilizing hilbert curves and H-fractals. IEEE Access, 7, 74734-74746.
[17]Shahna, K. U., & Mohamed, A. (2018, July). An image encryption technique using logistic map and Z-order curve. In 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research IEEE (ICETIETR) (pp. 1-6).
[18]Raza, S. F., & Satpute, V. (2019). A novel bit permutation-based image encryption algorithm. Nonlinear Dynamics, 95(2), 859-873.
[19]Kari, A. P., Navin, A. H., Bidgoli, A. M., & Mirnia, M. (2021). A new image encryption scheme based on hybrid chaotic maps. Multimedia Tools and Applications, 80(2), 2753-2772.
[20]Farah, M. A., Farah, A., & Farah, T. (2020). An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, 99(4), 3041-3064.
[21]Wu, J., Liao, X., & Yang, B. (2018). Image encryption using 2D Hénon-Sine map and DNA approach. Signal Processing, 153, 11-23.
[22]Sheela, S. J., Suresh, K. V., & Tandur, D. (2017). A novel audio cryptosystem using chaotic maps and DNA encoding. Journal of Computer Networks and Communications.
[23]Yousif, S. F. (2018, January). Grayscale image confusion and diffusion based on multiple chaotic maps. In 2018 1st International scientific conference of engineering sciences-3rd scientific conference of engineering science (ISCES) (pp. 114-119).
[24]Patro, K. A. K., Soni, A., Netam, P. K., & Acharya, B. (2020). Multiple grayscale image encryption using cross-coupled chaotic maps. Journal of Information Security and Applications, 52, 102470.
[25]Lu, Q., Zhu, C., & Deng, X. (2020). An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access, 8, 25664-25678.
[26]Belazi, A., Abd El-Latif, A. A., & Belghith, S. (2016). A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing, 128, 155-170.
[27]Diab, H. (2018). An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE access, 6, 42227-42244.
[28]Benlashram, A., Al-Ghamdi, M., AlTalhi, R., & Laabidi, P. K. (2020). A novel approach of image encryption using pixel shuffling and 3D chaotic map. In Journal of Physics: Conference Series (Vol. 1447, No. 1, p. 012009). IOP Publishing.
[29]Girdhar, A., Kapur, H., & Kumar, V. (2021). A novel grayscale image encryption approach based on chaotic maps and image blocks. Applied Physics B, 127(3), 1-12.
[30]Abdelfatah, R. I., Nasr, M. E., & Alsharqawy, M. A. (2020). Encryption for multimedia based on chaotic map: Several scenarios. Multimedia Tools and Applications, 79(27), 19717-19738.
[31]Idrees, B., Zafar, S., Rashid, T., & Gao, W. (2020). Image encryption algorithm using S-box and dynamic Hénon bit level permutation. Multimedia Tools and Applications, 79(9), 6135-6162.
[32]Arab, A., Rostami, M. J., & Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. The Journal of Supercomputing, 75(10), 6663-6682.
[33]Zhu, S., Zhu, C., Fu, Y., Zhang, W., & Wu, X. (2020). A secure image encryption scheme with compression-confusion-diffusion structure. Multimedia Tools and Applications, 79(43), 31957-31980.
[34]Cheng, G., Wang, C., & Chen, H. (2019). A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. International Journal of Bifurcation and Chaos, 29(09), 1950115.
[35]Hosny, K. M. (Ed.). (2020). Multimedia security using chaotic maps: principles and methodologies (Vol. 884). Springer Nature.
[36]Nkandeu, Y. P. K., & Tiedeu, A. (2019). An image encryption algorithm based on substitution technique and chaos mixing. Multimedia Tools and Applications, 78(8), 10013-10034.
[37]Zhang, X., Zhou, Z., & Niu, Y. (2018). An image encryption method based on the feistel network and dynamic DNA encoding. IEEE Photonics Journal, 10(4), 1-14.
[38]Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2016). A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dynamics, 83(3), 1123-1136.
[39]Slimane, N. B., Bouallegue, K., & Machhout, M. (2017). Designing a multi-scroll chaotic system by operating Logistic map with fractal process. Nonlinear Dynamics, 88(3), 1655-1675.
[40]Li, C., Luo, G., & Li, C. (2019). An Image Encryption Scheme Based on the Three-dimensional Chaotic Logistic Map. Int. J. Netw. Secur., 21(1), 22-29.