Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage
M. Lavanya,K. Joseph Abraham Sundar,S. Saravanan
DOI: https://doi.org/10.1007/s11042-023-17969-0
IF: 2.577
2024-01-07
Multimedia Tools and Applications
Abstract:Cloud computing is a domain that provides the on-demand availability of IT resources, which can be accessed from a remote server over the internet. A widely used cloud service model is Infrastructure as a Service (IAAS). Clients offload their documents, images, and multimedia files to the cloud storage service. Securing the information of the clients is the challenging job of the cloud service providers (CSP). To ensure the Quality of Service (QoS) of the information CSP follows efficient encryption algorithms. To enhance the security of the image files this paper proposes a new Simplified Image Encryption Algorithm (SIEA) using an efficient key generation module, which uses the basic structure of Feistel cipher. The proposed secure algorithm encrypts the images and stores them in the cloud storage to overcome the data attack. The plain image is converted into corresponding pixel values and the converted plaintext is divided into blocks of 128 bits each. The 128-bit cipher key is used to find the sub-keys for 10 rounds. Five sub keys (K0 to K4) are generated with 32-bit each. It also contains 5 keys used in the 10 rounds of the process and after 10 rounds data will be shuffled again in the post-round step to generate the 128-bit cipher text. To ensure Shannon's confusion and diffusion logic the substitution and permutation concepts are used in the proposed algorithm. To show the performance of the algorithm the images of three categories black and white, gray-scale, and color images are taken as input and the algorithm produces encrypted images. The cloud storage devices store the encrypted images. This proposed SIEA algorithm is compared with standard AES algorithms and other recent and competitive algorithms in terms of various statistical analysis methods like key sensitivity, information entropy, correlation, histogram, and differential attack analysis shows that the proposed algorithm outperforms other algorithms in terms of security and robustness with its lightweight process.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering