Abstract
Nowadays, digital medical images have become an essential source for the grand success of e-health technology. At the same time, the massive storage also plays a vital role. One of cloud storage’s main objectives is the affordable and easily accessible storage of vast amounts of multi-structured data. The cloud paradigm gives an illusion of infinite storage of data. The future of Cyber-Physical Systems (CPS) relies upon technologies like cloud computing to thrive. However, the major lacuna is data security. This paper deals with the Confidentiality Integrity Availability (CIA) aspects required for cloud-based medical image repositories. Since it is for the medical image, the Region of Interest (RoI) is separated, and the integrity check is applied for RoI. A two-tier security for the medical image has been proposed, including an additional security layer for RoI. A 3-D Lorenz chaotic attractor has been used to generate the key where the keyspace is widely increased. Deoxyribonucleic Acid (DNA) based image diffusion in different stages of cryptosystem offered an average entropy of 7.98042 and a correlation of 0.002864 for RoI only and for ciphered medical image an average entropy of 7.99724 and a correlation of − 0.00063. Text encryption is performed over metadata to ensure the privacy of client authentication. Encrypted metadata and 320 bits have been generated for the RoI part embedded in an image’s Non-Region of Interest (NRoI) part in the random pixel indexes obtained using a 1D Tent map. This proposed approach also gives a Graphical User Interface developed using Python 3.8 to support non-technical persons or medical practitioners. The proposed security framework provides a complete CIA triad for medical image repositories in the cloud.
Similar content being viewed by others
Data availability
The datasets generated during and/or analysed during the current study are available from the corresponding author upon reasonable request.
References
Zandesh, Z., Ghazisaeedi, M., Devarakonda, M.V., Haghighi, M.S.: Legal framework for health cloud: a systematic review. Int. J. Med. Inform. 132, 103953 (2019)
Akinrolabu, O., Nurse, J.R.C., Martin, A., New, S.: Cyber risk assessment in cloud provider environments: current models and future needs. Comput. Secur. 87, 101600 (2019)
Azeez, N.A., der Vyver, C.: Security and privacy issues in e-health cloudbasedsystem: a comprehensive content analysis. Egypt. Inform. J. 20(2), 97–108 (2019)
Rady, M., Abdelkader, T., Ismail, R.: Integrity and confidentiality in cloud outsourced data. Ain Shams Eng. J. 10(2), 275–285 (2019)
Borra, S., Thanki, R., Dey, N., Borisagar, K.: Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform andcompressive sensing. Smart Heal. 12, 35–48 (2019)
Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., Amirtharajan, R.: DNA chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 6(8), 850–858 (2017)
Hua, Z., Yi, S., Zhou, Y.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144, 134–144 (2018)
Zhang, Y.: 2020“The fast image encryption algorithm based on lifting scheme and chaos. Inform. Sci. 520, 177–194 (2020)
Lone, M.A., Qureshi, S.: RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher. Optik (2022). https://doi.org/10.1016/j.ijleo.2022.168880
Zhao, C.F., Ren, H.P.: Image encryption based on hyper-chaotic multi-attractors. Nonlinear Dyn. 100, 679–698 (2020). https://doi.org/10.1007/s11071-020-05526-5
Lakshmi, C., Thenmozhi, K., Rayappan, J.B.B., et al.: Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput. Appl. 33, 6671–6684 (2021). https://doi.org/10.1007/s00521-020-05447-9
Li, J., Chen, L., Cai, W., Xiao, J., Zhu, J., Hu, Y., Wen, K.: Holographic encryption algorithm based on bit-plane decomposition and hyperchaotic lorenz system. Opt. Laser Technol. (2022). https://doi.org/10.1016/j.optlastec.2022.108127
Dash, S., Padhy, S., Devi, S.A., Sachi, S., Patro, K.A.K.: An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment. Exp. Syst. Appl. 231, 120622 (2023)
Sheng, Q., Fu, C., Lin, Z., Tie, M., Chen, J., Sham, C.W.: A one-time-pad-like chaotic image encryption scheme using data steganography. J. Inform. Secur. Appl. 78, 103592 (2023)
Zhang, F., Zhang, X., Cao, M., Ma, F., Li, Z.: Characteristic analysis of 2D lag-complex logistic map and its application in image encryption. IEEE Multimed 28(4), 96–106 (2021). https://doi.org/10.1109/MMUL.2021.3080579
Kumar, K., Roy, S., Rawat, U., Malhotra, S.: IEHC: An efficient image encryption technique using hybrid chaotic map. Chaos Solitons Fractals 158, 111994 (2022)
Rezaei, B., Mobasseri, M., Enayatifar, R.: A secure, efficient and super-fast chaos-based image encryption algorithm for real-time applications. J. Real-Time Image Proc. 20(2), 30 (2023)
Zhao, J., Wang, S., Zhang, L.: Block Image encryption algorithm based on novel chaos and DNA encoding. Information 14, 150 (2023). https://doi.org/10.3390/info14030150
Mahalingam, H., Veeramalai, T., Menon, A.R., Amirtharajan, R.: Dual-Domain image encryption in unsecure medium—A secure communication perspective. Mathematics (2023). https://doi.org/10.3390/math11020457
Jiang, Z., Liu, X.: Image encryption algorithm based on discrete quantum baker map and chen hyperchaotic system. Int. J. Theor. Phys. 62, 22 (2023)
Wang, W.T., Sun, J.Y., Zhang, H., Zhang, J.: Quantum cryptosystem and circuit design for color image based on novel 3D Julia-fractal chaos system. Quantum Inf. Process. 22(1), 64 (2023)
Wang, H.K., Xu, G.B., Jiang, D.H.: Quantum grayscale image encryption and secret sharing schemes based on Rubik’s Cube. Phys. A: Stat. Mech. Appl. 612, 128482 (2023)
Hao, W., Zhang, T., Chen, X., Zhou, X.: A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding. Signal Process. 205, 108890 (2023)
Kumari, P., Mondal, B.: Lightweight image encryption algorithm using NLFSR and CBC mode. J. Supercomput. (2023). https://doi.org/10.1007/s11227-023-05415-9
Huang, J., Guo, Y., Gao, R., et al.: Medical image encryption based on fisher-yates scrambling and filter diffusion. J. Shanghai Jiaotong Univ. (Sci.) (2023). https://doi.org/10.1007/s12204-023-2618-7
Wang, X., Xue, W., An, J.: Image encryption algorithm based on LDCML and DNA coding sequence. Multimed. Tools Appl. (2020). https://doi.org/10.1007/s11042-020-09688-7
Aashiq Banu, S., Amirtharajan, R.: Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach. Multimed. Tools Appl. (2020). https://doi.org/10.1007/s11042-020-09501-5
Dagadu, J.C., Li, J.P., Aboagye, E.O.: Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Pers. Commun. 108, 591–612 (2019). https://doi.org/10.1007/s11277-019-06420-z
Zhu, S., Deng, X., Zhang, W., Zhu, C.: Image encryption scheme based on newly designed chaotic map and parallel DNA coding. Mathematics 11, 231 (2023). https://doi.org/10.3390/math11010231
Mahalingam, H., Velupillai Meikandan, P., Thenmozhi, K., Moria, K.M., Lakshmi, C., Chidambaram, N., Amirtharajan, R.: Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments. Mathematics. 11(8), 1769 (2023). https://doi.org/10.3390/math11081769
Kaur, C., Kanwal, N.: An analysis of image forgery detection techniques. Stat. Optim. Inf. Comput. 7, 486–500 (2019)
Chidambaram, N., Raj, P., Thenmozhi, K., et al.: A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images. Multimed. Tools Appl. 80, 23359–23375 (2021). https://doi.org/10.1007/s11042-020-10210-2
Rajagopalan, S., Poori, S., Narasimhan, M., et al.: Chua’s diode and strange attractor: a three-layer hardware–software co-design for medical image confidentiality. IET Image Proc. 14, 1248–1256 (2020). https://doi.org/10.1049/iet-ipr.2019.0562
Ke, G., Wang, H., Zhou, S., Zhang, H.: Encryption of medical image with most significant bit and high capacity in piecewise linear chaos graphics. Measurement 135, 385–391 (2019)
Watson, J.D., Crick, F.H.C., et al.: Molecular structure of nucleic acids. Nature 171(4356), 737–738 (1953)
Acknowledgements
Authors thank the Department of Science & Technology, New Delhi, for the FIST funding (SR/FST/ETI/2018/221(C)). Also, the authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University, for providing infrastructural support to carry out this research work.
Funding
DST FIST FUND,SR/FST/ET-I/2018/221(C),SR/FST/ET-I/2018/221(C)
Author information
Authors and Affiliations
Contributions
CN: Conceptualisation, Methodology, Software, Data curation, Writing- Original draft preparation. PR: Validation, Visualisation, Investigation, Data curation, KT and RA: Validation, Supervision. Writing- Reviewing and Editing. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Ethical approval
This article does not contain any studies with human participants performed by authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chidambaram, N., Thenmozhi, K., Raj, P. et al. DNA-chaos governed cryptosystem for cloud-based medical image repository. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04391-w
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10586-024-04391-w