Skip to main content
Log in

Leveraging chaos for enhancing encryption and compression in large cloud data transfers

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

A Publisher Correction to this article was published on 19 February 2024

This article has been updated

Abstract

One of the routine exercises to manage and improve the performance and utility of the cloud is the migration or transfer of cloud data whether it is large or small. However, it is extremely challenging to protect both data privacy and integrity concurrently while moving cloud data, particularly when it is very vast. Collectively, prior works fail to offer a complete solution to these problem. Even though data encryption and steganography techniques are popular and efficient, they provide higher time and space complexities and introduce information loss. As a result, the goal of this research is to provide a chaos compression and encryption system based on chaos theory to guarantee both data privacy and integrity during the transit or migration of massive cloud data. During data transmission, the entire data are compressed using a chaotic substitution box followed by an adaptive Huffman encoding algorithms. Therefore, the input data are efficiently transformed into a non-readable form which replaces the original data, making it difficult for an unethical individual or group to determine its true sense. Our evaluation results show that the proposed chaotic technique has a maximum entropy value of 7.99, which supports its ability to provide more privacy when compared to previous techniques. It also delivers the best bits per code of 4.41, a throughput of 2.89 MB/s, and a minimal information loss percentage of 0.0011%, demonstrating its superior time, space efficiency, and ability to improve data integrity over existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

All of the data utilized in this study were collected from open sources. The relevant download URLs are shown in Table 5 of “Appendix”.

Change history

References

  1. Mishra S, Alowaidi MA, Sharma SK (2021) Impact of security standards and policies on the credibility of e-government. J Ambient Intell Humaniz Comput 8:1–12

    Google Scholar 

  2. Subramanian N, Jeyaraj A (2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42

    Article  Google Scholar 

  3. Bhattacharjee S, Rahim LBA, Watada J, Roy A (2020) Unified GPU technique to boost confidentiality, integrity and trim data loss in big data transmission. IEEE Access 8:45477–45495

    Article  Google Scholar 

  4. Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76(12):9493–9532

    Article  Google Scholar 

  5. Jayapandian N, Zubair Rahman AM (2017) Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Clust Comput 20(2):1561–1573

    Article  Google Scholar 

  6. Yi X, Yang K, Zhao X, Wang Y, Yu H (2019) Ahcm: adaptive Huffman code mapping for audio steganography based on psychoacoustic model. IEEE Trans Inf Forensics Secur 14(8):2217–2231

    Article  Google Scholar 

  7. Wahab OFA, Khalaf AA, Hussein AI, Hamed HF (2021) Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 9:31805–31815

    Article  Google Scholar 

  8. Wong K-W, Lin Q, Chen J (2010) Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Trans Circuits Syst II Express Briefs 57(2):146–150

    Google Scholar 

  9. Camtepe S, Duda J, Mahboubi A, Morawiecki P, Nepal S, Pawłowski M, Pieprzyk J (2021) Compcrypt-lightweight ANS-based compression and encryption. IEEE Trans Inf Forensics Secur 16:3859–3873

    Article  Google Scholar 

  10. Kalaivani S, Tharini C (2020) Analysis and implementation of novel rice golomb coding algorithm for wireless sensor networks. Comput Commun 150:463–471

    Article  Google Scholar 

  11. Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput Math Appl 60(2):326–337

    Article  MathSciNet  Google Scholar 

  12. Sabyasachi AS, Kabir HMD, Abdelmoniem AM, Mondal SK (2017) A resilient auction framework for deadline-aware jobs in cloud spot market. In: 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)

  13. Bhattacharjee S, Rahim LBA, Aziz IB (2016) A security scheme to minimize information loss during big data transmission over the internet. In: 2016 3rd International Conference on Computer and Information Sciences (ICCOINS). IEEE, pp 215–220

  14. Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single s-box. IEEE Access 8:25664–25678

    Article  Google Scholar 

  15. Ahmed A, Latif R, Latif S, Abbas H, Khan FA (2018) Malicious insiders attack in IoT based multi-cloud e-healthcare environment: a systematic literature review. Multimed Tools Appl 77:21947–21965

    Article  Google Scholar 

  16. Ameen Suhail K, Sankar S (2020) Image compression and encryption combining autoencoder and chaotic logistic map. Iran J Sci Technol Trans A Sci 44:1091–1100

    Article  MathSciNet  Google Scholar 

  17. Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based s-box. Chaos Solitons Fractals 95:92–101

    Article  ADS  Google Scholar 

  18. Farah MB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99(4):3041–3064

    Article  Google Scholar 

  19. Rupa C, Harshitha M, Srivastava G, Gadekallu TR, Maddikunta PKR (2022) Securing multimedia using a deep learning based chaotic logistic map. IEEE J Biomed Health Inform 27(3):1154–1162

    Article  Google Scholar 

  20. Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5d chaotic map. Futur Gener Comput Syst 107:333–350

    Article  Google Scholar 

  21. Wang Y, Wu C, Kang S, Wang Q, Mikulovich V (2020) Multi-channel chaotic encryption algorithm for color image based on DNA coding. Multimed Tools Appl 79:18317–18342

    Article  Google Scholar 

  22. Zhou M, Wang C (2020) A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process 171:107484

    Article  Google Scholar 

  23. Liu Y, Jiang Z, Xu X, Zhang F, Xu J (2020) Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Opt Laser Technol 127:106171

    Article  Google Scholar 

  24. Radwan AG, AbdElHaleem SH, Abd-El-Hafiz SK (2016) Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J Adv Res 7(2):193–208

    Article  PubMed  Google Scholar 

  25. Bhattacharjee S, Midhun Chakkaravarthy D, Chakkaravarthy M, Rahim LBA (2020) An integrated technique to ensure confidentiality and integrity in data transmission through the strongest and authentic hotspot selection mechanism. In: Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019, vol 2. Springer, pp 459–474

  26. Xue X, Chen Z, Wang S, Feng Z, Duan Y, Zhou Z (2020) Value entropy: a systematic evaluation model of service ecosystem evolution. IEEE Trans Serv Comput 15(4):1760–1773

    Article  Google Scholar 

  27. Papadogiannaki E, Ioannidis S (2021) A survey on encrypted network traffic analysis applications, techniques, and countermeasures. ACM Comput Surv (CSUR) 54(6):1–35

    Article  Google Scholar 

  28. Tong X-J, Wang Z, Zhang M, Liu Y (2013) A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dyn 72:229–241

    Article  MathSciNet  Google Scholar 

  29. Namasudra S, Chakraborty R, Kadry S, Manogaran G, Rawal BS (2021) Fast: Fast accessing scheme for data transmission in cloud computing. Peer-to-Peer Netw Appl 14:2430–2442

    Article  Google Scholar 

  30. Shukla S, Hassan MF, Tran DC, Akbar R, Paputungan IV, Khan MK (2021) Improving latency in internet-of-things and cloud computing for real-time data transmission: a systematic literature review (SLR). Clust Comput 8:1–24

    CAS  Google Scholar 

  31. Abdelmoniem AM, Bensaou B (2017) Enforcing transport-agnostic congestion control in sdn-based data centers. In: IEEE 42nd Conference on Local Computer Networks (LCN)

  32. Abdelmoniem AM, Bensaou B (2015) Efficient switch-assisted congestion control for data centers: an implementation and evaluation. In: IEEE International Performance Computing and Communications Conference (IPCCC)

  33. Adeel A, Ahmad J, Larijani H, Hussain A (2020) A novel real-time, lightweight chaotic-encryption scheme for next-generation audio-visual hearing aids. Cogn Comput 12:589–601

    Article  Google Scholar 

  34. Yang F, Mou J, Ma C, Cao Y (2020) Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application. Opt Lasers Eng 129:106031

    Article  Google Scholar 

  35. Cheng G, Wang C, Xu C (2020) A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing. Multimed Tools Appl 79(39–40):29243–29263

    Article  Google Scholar 

  36. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58

    Article  Google Scholar 

  37. Ibrahim S, Alhumyani H, Masud M, Alshamrani SS, Cheikhrouhou O, Muhammad G, Hossain MS, Abbas AM (2020) Framework for efficient medical image encryption using dynamic s-boxes and chaotic maps. Ieee Access 8:160433–160449

    Article  Google Scholar 

  38. Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78(22):31035–31055

    Article  Google Scholar 

  39. Tong X-J, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dyn 84:2333–2356

    Article  Google Scholar 

  40. Kim S, Lee K, Cho W, Nam Y, Cheon JH, Rutenbar RA (2020) Hardware architecture of a number theoretic transform for a bootstrappable rns-based homomorphic encryption scheme. In: 2020 IEEE 28th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp 56–64. https://doi.org/10.1109/FCCM48280.2020.00017

  41. Singh M, Singh AK (2023) A comprehensive survey on encryption techniques for digital images. Multimed Tools Appl 82(8):11155–11187

    Article  Google Scholar 

  42. Bhattacharjee S, Chakkaravarhty DM, Chakkaravarty M, Rahim LBA, Ramadhani AW (2021) A GPU unified platform to secure big data transportation using an error-prone elliptic curve cryptography. In: Data Management, Analytics and Innovation: Proceedings of ICDMAI 2020, vol 1. Springer, pp 263–280

  43. Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:1–35

    Article  Google Scholar 

  44. Bhabani B, Mahapatro J (2023) Clurma: a cluster-based RSU-enabled message aggregation scheme for vehicular ad hoc networks. Veh Commun 39:100564

    Google Scholar 

  45. Hidayat T, Zakaria MH, Pee ANC (2023) Increasing the Huffman generation code algorithm to equalize compression ratio and time in lossless 16-bit data archiving. Multimed Tools Appl 82(16):24031–24068

    Article  Google Scholar 

  46. Mou J, Yang F, Chu R, Cao Y (2021) Image compression and encryption algorithm based on hyper-chaotic map. Mobile Netw Appl 26:1849–1861

    Article  Google Scholar 

  47. Dai J, Hao X, Li P, Li Z, Yan X (2020) Antijamming design and analysis of a novel pulse compression radar signal based on radar identity and chaotic encryption. IEEE Access 8:5873–5884

    Article  Google Scholar 

  48. Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression-encryption scheme based on hyper-chaotic system and 2d compressive sensing. Opt Laser Technol 82:121–133

    Article  ADS  Google Scholar 

  49. Karmakar J, Nandi D, Mandal MK (2020) A novel hyper-chaotic image encryption with sparse-representation based compression. Multimed Tools Appl 79:28277–28300

    Article  Google Scholar 

  50. Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-iii based 4-d chaotic maps: image encryption. J Ambient Intell Humaniz Comput 11:1309–1324

    Article  Google Scholar 

  51. Abdelmoniem AM, Bensaou B (2023) Enhancing TCP via hysteresis switching: theoretical analysis and empirical evaluation. IEEE ACM Trans Network (ToN)

  52. Abdelmoniem AM, Bensaou B (2021) T-RACKs: a faster recovery mechanism for TCP in data center networks. IEEE/ACM Trans Network (ToN) 29(3):1074–1087. https://doi.org/10.1109/TNET.2021.3059913

    Article  Google Scholar 

  53. Gong L, Qiu K, Deng C, Zhou N (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol 115:257–267

    Article  ADS  Google Scholar 

  54. Wang B, Zheng X, Zhou S, Zhou C, Wei X, Zhang Q, Che C (2014) Encrypting the compressed image by chaotic map and arithmetic coding. Optik 125(20):6117–6122

    Article  ADS  Google Scholar 

  55. Gao L, Battistelli G, Chisci L (2020) Multiobject fusion with minimum information loss. IEEE Signal Process Lett 27:201–205

    Article  ADS  Google Scholar 

  56. Nesspor TC, Kinealy K, Mazzanti N, Diem MD, Boye K, Hoffman H, Springer C, Sprenkle J, Powers G, Jiang H et al (2020) High-throughput generation of bipod (fab\(\times\) scfv) bispecific antibodies exploits differential chain expression and affinity capture. Sci Rep 10(1):7557

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  57. Wu H, Li X, Deng Y (2020) Deep learning-driven wireless communication for edge-cloud computing: opportunities and challenges. J Cloud Comput 9:1–14

    Article  Google Scholar 

  58. Abdelmoniem M, Susanto A, Bensaou HB (2019) taming latency in data centers via active congestion-probing. In: IEEE International Conference on Distributed Computing Systems (IEEE ICDCS)

  59. Ahmad I, Shin S (2021) A novel hybrid image encryption-compression scheme by combining chaos theory and number theory. Signal Process Image Commun 98:116418

    Article  Google Scholar 

  60. Zhao K, Xu H, Cheng Y, Li X, Gao K (2021) Representation iterative fusion based on heterogeneous graph neural network for joint entity and relation extraction. Knowl-Based Syst 219:106888

    Article  Google Scholar 

  61. Rahim LBA, Bhattacharjee S, Aziz IB (2014) An audio steganography technique to maximize data hiding capacity along with least modification of host. In: Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013). Springer, pp 277–289

  62. Bhattacharjee S, Chakkaravarthy M, Midhun Chakkaravarthy D (2019) Gpu-based integrated security system for minimizing data loss in big data transmission. In: Data Management, Analytics and Innovation: Proceedings of ICDMAI 2018, vol 2. Springer, pp 421–435

  63. Bhattacharjee S, Rahim LBA, Aziz IBA (2015) A lossless compression technique to increase robustness in big data transmission system. Int J Adv Soft Comput Appl

  64. Krishnan PT, Raj ANJ, Balasubramanian P, Chen Y (2020) Schizophrenia detection using multivariateempirical mode decomposition and entropy measures from multichannel eeg signal. Biocybern Biomed Eng 40(3):1124–1139

    Article  Google Scholar 

  65. Bao B, Zhao Q, Yu X, Wu H, Xu Q (2023) Complex dynamics and initial state effects in a two-dimensional sine-bounded memristive map. Chaos Solitons Fractals 173:113748

    Article  MathSciNet  Google Scholar 

  66. Hua Z, Zhou B, Zhou Y (2017) Sine-transform-based chaotic system with FPGA implementation. IEEE Trans Ind Electron 65(3):2557–2566

    Article  Google Scholar 

  67. Ucuz D et al (2020) Comparison of the IoT platform vendors, microsoft azure, amazon web services, and google cloud, from users’ perspectives. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, pp 1–4

  68. Palumbo F, Aceto G, Botta A, Ciuonzo D, Persico V, Pescapé A (2021) Characterization and analysis of cloud-to-user latency: the case of azure and AWS. Comput Netw 184:107693

    Article  Google Scholar 

  69. Huo H, Gao J, Zhao N, Zhang D, Holmes NG, Li X, Sun Y, Fu J, Li R, Guo X et al (2021) A flexible electron-blocking interfacial shield for dendrite-free solid lithium metal batteries. Nat Commun 12(1):176

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  70. Li J, Wang Q, Lee PP, Shi C (2023) An in-depth comparative analysis of cloud block storage workloads: findings and implications. ACM Trans Storage 19(2):1–32

    Article  CAS  Google Scholar 

  71. Balasubramanian V, DeCross M, Kar A, Parrikar O (2020) Quantum complexity of time evolution with chaotic hamiltonians. J High Energy Phys 2020(1):1–44

    Article  MathSciNet  Google Scholar 

  72. Champion T, Bowman H, Grześ M (2022) Branching time active inference: empirical study and complexity class analysis. Neural Netw 152:450–466

    Article  PubMed  Google Scholar 

  73. Zhan W, Liang H, Shi F, Huang Z (2007) Test data compression scheme based on variable-to-fixed-plus-variable-length coding. J Syst Architect 53(11):877–887

    Article  Google Scholar 

  74. Mohanty SN, Ramya K, Rani SS, Gupta D, Shankar K, Lakshmanaprabu S, Khanna A (2020) An efficient lightweight integrated blockchain (elib) model for IoT security and privacy. Futur Gener Comput Syst 102:1027–1037

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

This study was collaboratively developed, carried out, and presented by Shiladitya Bhattacharjee and Himanshi Sharma. Tanupriya Choudhury helped by providing insightful comments. Ahmed M. Abdelmoniem contributed extensively to the writing, organization, editing, review, and revisions of this manuscript.

Corresponding authors

Correspondence to Shiladitya Bhattacharjee or Ahmed M. Abdelmoniem.

Ethics declarations

Conflict of interest

The authors have no competing interests to declare that are relevant to the content of this research article.

Ethical approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

See Tables 5 and 6

Table 5 Downloading sources
Table 6 Nomenclatures

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhattacharjee, S., Sharma, H., Choudhury, T. et al. Leveraging chaos for enhancing encryption and compression in large cloud data transfers. J Supercomput (2024). https://doi.org/10.1007/s11227-024-05906-3

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-05906-3

Keywords

Navigation