Skip to main content
Top
Published in: Wireless Networks 2/2020

09-12-2019

A hybrid security strategy (HS2) for reliable video streaming in fog computing

Authors: Shaimaa A. Hussein, Ahmed I. Saleh, Hossam El-Din Mostafa, Marwa I. Obaya

Published in: Wireless Networks | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, digital communication and storage over the Internet through the cloud have increased in a rapid manner. Accordingly, data security becomes a vital issue as there are many hackers who want to steal or alter others’ private data. Fog computing comes to secure and facilitate the connection to the cloud. It works as an intermediary between the cloud and the peripheral devices. Accordingly, the channel between the fog and those devices must be secured against attacks. Many efforts have been done to secure the fog through the use of steganography to embed important data into a cover digital medium and cryptography to encrypt the data into a meaningless form. As steganography and cryptography have their own advantages, combining them into a hybrid system will certainly promote the security level. Video steganography uses video as a cover media for hiding secret data as video streaming over internet is very popular and common that cannot be doubted by intruders. The advantage of using video files as a cover is that they are more secure against hacker attacks due to their relative complexity compared to other multimedia types and the data redundancy which permits to embed large amount of secret data. In this paper a new hybrid security strategy (HS2) merging the advantages of both cryptography and steganography for securing the fog has been proposed. HS2 embeds a secret image into a video .mp4 as the host medium. HS2 has two main contributions. The first is a new encryption technique that depends on α-blocks of linear feedback shift registers (LFSRs) merged with an adder/subtractor to generate a strong secret key for each block. All blocks outputs are combined using a nonlinear function to construct the final key. Such generated key will be XORed with the secret image to produce the encrypted secret image. The second contribution is a new steganography methodology based on an enhanced discrete wavelet packet transform (DWPT) to embed the encrypted secret image into a cover video. Experimental results and security analysis have shown that the proposed HS2 outperforms recent security strategies and resist common attacks when applied to the fog environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference El-Latif, A. A. A., Abd-El-Atty, B., Hossain, M. S., Elmougy, S., & Ghoniem, A. (2018, January). Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access. El-Latif, A. A. A., Abd-El-Atty, B., Hossain, M. S., Elmougy, S., & Ghoniem, A. (2018, January). Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access.
2.
go back to reference Munir, A., Kansakar, P., & Khan, S. U. (2017). IFCIoT: Integrated fog cloud IoT: a novel architectural paradigm for the future Internet of Things. IEEE Consumer Electronics Magazine,6(3), 74–82.CrossRef Munir, A., Kansakar, P., & Khan, S. U. (2017). IFCIoT: Integrated fog cloud IoT: a novel architectural paradigm for the future Internet of Things. IEEE Consumer Electronics Magazine,6(3), 74–82.CrossRef
3.
go back to reference Usman, M., Irfan, A., Aslam, M. I., Khan, S., & Shah, U. A. (2017). SIT: A lightweight encryption algorithm for secure internet of things. International Journal of Advanced Computer Science and Applications,8(1), 2017.CrossRef Usman, M., Irfan, A., Aslam, M. I., Khan, S., & Shah, U. A. (2017). SIT: A lightweight encryption algorithm for secure internet of things. International Journal of Advanced Computer Science and Applications,8(1), 2017.CrossRef
4.
go back to reference Kaur, G. (2017). Necessity of fog computing for security of cloud data. ECONSPEAK: A Journal of Advances in Management IT & Social Sciences,7(5), 2017. Kaur, G. (2017). Necessity of fog computing for security of cloud data. ECONSPEAK: A Journal of Advances in Management IT & Social Sciences,7(5), 2017.
5.
go back to reference Sowjanya, V. K. (2017). Security framework for sharing data in fog computing. International Journal of Advanced Research in Computer and Communication Engineering,6(6), 2017. Sowjanya, V. K. (2017). Security framework for sharing data in fog computing. International Journal of Advanced Research in Computer and Communication Engineering,6(6), 2017.
6.
go back to reference Maksimovic, M. (2017). Implementation of Fog computing in IoT-based healthcare system. Journal of Information Technology and Applications (JITA),7(2), 100–107. Maksimovic, M. (2017). Implementation of Fog computing in IoT-based healthcare system. Journal of Information Technology and Applications (JITA),7(2), 100–107.
7.
go back to reference Nagarani, C., & Kousalya, R. (2018). Comparison of security and performance issues in fog enabled cloud computing. International Journal of Computer Applications,180(22), 2018.CrossRef Nagarani, C., & Kousalya, R. (2018). Comparison of security and performance issues in fog enabled cloud computing. International Journal of Computer Applications,180(22), 2018.CrossRef
8.
go back to reference Kumar, H., Shinde, S., & Talele, P. (2017). Secure fog computing system using emoticon technique. International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC),5(7), 808–811. Kumar, H., Shinde, S., & Talele, P. (2017). Secure fog computing system using emoticon technique. International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC),5(7), 808–811.
9.
go back to reference Waghmare, S., Ahire, S., Fegade, Himali, & Darekar, P. (2017). Securing cloud using fog computing with hadoop framework. International Journal of Science, Engineering and Technology,5(3), 2017. Waghmare, S., Ahire, S., Fegade, Himali, & Darekar, P. (2017). Securing cloud using fog computing with hadoop framework. International Journal of Science, Engineering and Technology,5(3), 2017.
10.
go back to reference Martin, B. A., Michaud, F., Banks, D., & Mosenia, A. (2017). OpenFog security requirements and approaches. In IEEE Communications Society Invited Paper, IEEE Conference (pp. 1–6). Martin, B. A., Michaud, F., Banks, D., & Mosenia, A. (2017). OpenFog security requirements and approaches. In IEEE Communications Society Invited Paper, IEEE Conference (pp. 1–6).
11.
go back to reference Baby, A., & Krishnan, H. (2017). Combined strength of steganography and cryptography—A literature survey. International Journal of Advanced Research in Computer Science,8(3), 2017. Baby, A., & Krishnan, H. (2017). Combined strength of steganography and cryptography—A literature survey. International Journal of Advanced Research in Computer Science,8(3), 2017.
12.
go back to reference Abed Shukur, W., Najah Abdullah, W., & Kareem Qurban, L. (2018). Information hiding in digital video using DCT, DWT and CvT. IOP Conference Series: Journal of Physics,1003(1), 2018. Abed Shukur, W., Najah Abdullah, W., & Kareem Qurban, L. (2018). Information hiding in digital video using DCT, DWT and CvT. IOP Conference Series: Journal of Physics,1003(1), 2018.
13.
go back to reference Yari, I. A., & Zargari, S. (2017). An overview and computer forensic challenges in image steganography. In IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Yari, I. A., & Zargari, S. (2017). An overview and computer forensic challenges in image steganography. In IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
14.
go back to reference Venčkauskas, A., Morkevicius, N., Bagdonas, K., Damaševičius, R., & Maskeliūnas, R. (2017). A lightweight protocol for secure video streaming. Sensors,18, 2018. Venčkauskas, A., Morkevicius, N., Bagdonas, K., Damaševičius, R., & Maskeliūnas, R. (2017). A lightweight protocol for secure video streaming. Sensors,18, 2018.
15.
go back to reference Weng, X., Li, Y., Chi, L., Mu, Y. (2018). Convolutional video steganography with temporal residual modeling. CoRR, abs/1806.02941. Weng, X., Li, Y., Chi, L., Mu, Y. (2018). Convolutional video steganography with temporal residual modeling. CoRR, abs/1806.02941.
16.
go back to reference Vishwanath, A., Peruri, R., & He, J. (2016). Security in fog computing through encryption. International Journal of Information Technology and Computer Science,5, 28–36.CrossRef Vishwanath, A., Peruri, R., & He, J. (2016). Security in fog computing through encryption. International Journal of Information Technology and Computer Science,5, 28–36.CrossRef
17.
go back to reference Ibrahim, M. M., Abdel Kader, N. S., & Zorkany, M. (2014). Video multiple watermarking technique based on image interlacing using DWT. The Scientific World Journal. Ibrahim, M. M., Abdel Kader, N. S., & Zorkany, M. (2014). Video multiple watermarking technique based on image interlacing using DWT. The Scientific World Journal.
18.
go back to reference Krishna, B. M., Madhumati, G. L., & Khan, H. (2019). FPGA based pseudo random sequence generator using XOR/XNOR for communication cryptography and VLSI testing applications. International Journal of Innovative Technology and Exploring Engineering,8(4), 485–494. Krishna, B. M., Madhumati, G. L., & Khan, H. (2019). FPGA based pseudo random sequence generator using XOR/XNOR for communication cryptography and VLSI testing applications. International Journal of Innovative Technology and Exploring Engineering,8(4), 485–494.
19.
go back to reference Al Hamid, H. A., Rahman, S. M., Hossain, M. S., Almogren, A., & Alamri, A. (2017). A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access,5, 22313–22328.CrossRef Al Hamid, H. A., Rahman, S. M., Hossain, M. S., Almogren, A., & Alamri, A. (2017). A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access,5, 22313–22328.CrossRef
20.
go back to reference Desai, J., Hemalatha, S., & Shishira, S. R. (2014). Comparison between DCT and DWT Steganography Algorithms. International Journal of Advanced Information Science and Technology (IJAIST),24(24), 51–55. Desai, J., Hemalatha, S., & Shishira, S. R. (2014). Comparison between DCT and DWT Steganography Algorithms. International Journal of Advanced Information Science and Technology (IJAIST),24(24), 51–55.
21.
go back to reference Sahu, P., & Sinha, S. (2017). Discrete wavelet packet transform based video steganography. International Journal of Mineral Processing and Extractive Metallurgy,2(1), 7–12.CrossRef Sahu, P., & Sinha, S. (2017). Discrete wavelet packet transform based video steganography. International Journal of Mineral Processing and Extractive Metallurgy,2(1), 7–12.CrossRef
22.
go back to reference Goresky, M., & Klapper, A. M. (2002). Fibonacci and galois representations of feedback-with-carry shift registers. IEEE Transactions on Information Theory,48(11), 2002.MathSciNetMATHCrossRef Goresky, M., & Klapper, A. M. (2002). Fibonacci and galois representations of feedback-with-carry shift registers. IEEE Transactions on Information Theory,48(11), 2002.MathSciNetMATHCrossRef
23.
go back to reference Yue, Wu, Noonan, Joseph P., & Agaian, Sos. (2011). NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications,2, 31–38. Yue, Wu, Noonan, Joseph P., & Agaian, Sos. (2011). NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications,2, 31–38.
24.
go back to reference Saleema, A., & Amarunnishad, T. (2016). A new steganography algorithm using hybrid fuzzy neural networks. International Conference on Emerging Trends in Engineering, Science and Technology,24, 1566–1574. Saleema, A., & Amarunnishad, T. (2016). A new steganography algorithm using hybrid fuzzy neural networks. International Conference on Emerging Trends in Engineering, Science and Technology,24, 1566–1574.
25.
go back to reference Kavitha, P. K., & Vidhya Saraswathi, P. (2018). Color image encryption: A new public key cryptosystem based on polynomial equation. In Proceedings of the International Conference on ISMAC in Computational Vision and Bio-engineering (pp. 69–78). Kavitha, P. K., & Vidhya Saraswathi, P. (2018). Color image encryption: A new public key cryptosystem based on polynomial equation. In Proceedings of the International Conference on ISMAC in Computational Vision and Bio-engineering (pp. 69–78).
26.
go back to reference Wang, Xingyuan, Zhu, Xiaoqiang, & Zhang, Yingqian. (2018). An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access,6, 23733–23746.CrossRef Wang, Xingyuan, Zhu, Xiaoqiang, & Zhang, Yingqian. (2018). An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access,6, 23733–23746.CrossRef
27.
go back to reference Chuman, Tatsuya, Sirichotedumrong, Warit, & Kiya, Hitoshi. (2019). Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Transactions on Information Forensics and Security,14(6), 1515–1525.CrossRef Chuman, Tatsuya, Sirichotedumrong, Warit, & Kiya, Hitoshi. (2019). Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Transactions on Information Forensics and Security,14(6), 1515–1525.CrossRef
28.
go back to reference Mohamed, H. M., Ali, A. F., & Altaweel, G. S. (2017). A hybrid curvelet transform and genetic algorithm for image steganography. International Journal of Advanced Computer Science and Applications,8(8), 2017. Mohamed, H. M., Ali, A. F., & Altaweel, G. S. (2017). A hybrid curvelet transform and genetic algorithm for image steganography. International Journal of Advanced Computer Science and Applications,8(8), 2017.
29.
go back to reference Al-Taweel, S. A., Al-Hada, M. H., & Nasser, A. M. (2018). Image in image steganography technique based on arnold transform and LSB algorithms. International Journal of Computer Applications,181(10), 2018. Al-Taweel, S. A., Al-Hada, M. H., & Nasser, A. M. (2018). Image in image steganography technique based on arnold transform and LSB algorithms. International Journal of Computer Applications,181(10), 2018.
30.
go back to reference Bharti, S., Behal, S., & Sharma, V. (2018). Security enhancements for high quality image transaction with hybrid image steganography algorithm. In Second International Conference on Computing Methodologies and Communication (ICCMC), 2018. Bharti, S., Behal, S., & Sharma, V. (2018). Security enhancements for high quality image transaction with hybrid image steganography algorithm. In Second International Conference on Computing Methodologies and Communication (ICCMC), 2018.
31.
go back to reference Mukherjee, S., & Sanyal, G. (2019) A multi-level image steganography methodology based on adaptive PMS and block based pixel swapping. In Multimedia Tools and Applications (pp. 1–16). Mukherjee, S., & Sanyal, G. (2019) A multi-level image steganography methodology based on adaptive PMS and block based pixel swapping. In Multimedia Tools and Applications (pp. 1–16).
32.
go back to reference Razzaq, M. A., Baig, M. A., Shaikh, R. A., & Memon, A. A. (2017). Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications,8(5), 2017. Razzaq, M. A., Baig, M. A., Shaikh, R. A., & Memon, A. A. (2017). Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications,8(5), 2017.
33.
go back to reference Mstafa, R. J., & Abdelfattah, E. (2017). Robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access,5, 5354–5365. Mstafa, R. J., & Abdelfattah, E. (2017). Robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access,5, 5354–5365.
34.
go back to reference Shashidhara, H. N., & Usha, B. A. (2017). Video steganography using zero order hold method for secured data transmission. International Journal of Computer Applications,176(5), 44–48.CrossRef Shashidhara, H. N., & Usha, B. A. (2017). Video steganography using zero order hold method for secured data transmission. International Journal of Computer Applications,176(5), 44–48.CrossRef
35.
go back to reference Alrawais, A., Alhothaily, A., Hu, C., Xing, Xiaoshuang, & Cheng, X. (2017). An attribute-based encryption scheme to secure fog communications. IEEE Access,5, 9131–9138.CrossRef Alrawais, A., Alhothaily, A., Hu, C., Xing, Xiaoshuang, & Cheng, X. (2017). An attribute-based encryption scheme to secure fog communications. IEEE Access,5, 9131–9138.CrossRef
36.
go back to reference Deepika, (2017). Enhancement of data security for cloud environment using cryptography and steganography technique. International Journal of Innovative Research in Computer and Communication Engineering,5(1), 2017.MathSciNet Deepika, (2017). Enhancement of data security for cloud environment using cryptography and steganography technique. International Journal of Innovative Research in Computer and Communication Engineering,5(1), 2017.MathSciNet
37.
go back to reference Baliga, J., Ayre, R., Hinton, K., & Tucker, R. (2011). Green cloud computing: Balancing energy in processing, storage, and transport. Proceedings of the IEEE,99(1), 149–167.CrossRef Baliga, J., Ayre, R., Hinton, K., & Tucker, R. (2011). Green cloud computing: Balancing energy in processing, storage, and transport. Proceedings of the IEEE,99(1), 149–167.CrossRef
38.
go back to reference Assila, B., Kobbane, A., Walid, A., & El Koutbi, M. (2019). Achieving low-energy consumption in fog computing environment: A matching game approach. IEEE Transactions on Communications and Networking,3(1), 250–263.CrossRef Assila, B., Kobbane, A., Walid, A., & El Koutbi, M. (2019). Achieving low-energy consumption in fog computing environment: A matching game approach. IEEE Transactions on Communications and Networking,3(1), 250–263.CrossRef
39.
go back to reference Nithya, R., Paviya, M., Poornimadevi, A., & Ravi, S. (2015). A performance comparison of low power LFSR structures. International Journal of Recent Research in Science, Engineering and Technology,1(1), 2015. Nithya, R., Paviya, M., Poornimadevi, A., & Ravi, S. (2015). A performance comparison of low power LFSR structures. International Journal of Recent Research in Science, Engineering and Technology,1(1), 2015.
40.
go back to reference Dhinesh, H., Adhiyaman, G., & Esakki Muthu, A. (2019). A high performance parallel architecture for linear feedback shift register. International Research Journal of Engineering and Technology,6(3), 2019. Dhinesh, H., Adhiyaman, G., & Esakki Muthu, A. (2019). A high performance parallel architecture for linear feedback shift register. International Research Journal of Engineering and Technology,6(3), 2019.
41.
go back to reference Tulluru, S., & Anuradha, S. G. (2018). Fog computing a paradigm: scenarios and security issues. International Journal of Engineering Research in Computer Science and Engineering,5(4), 2018. Tulluru, S., & Anuradha, S. G. (2018). Fog computing a paradigm: scenarios and security issues. International Journal of Engineering Research in Computer Science and Engineering,5(4), 2018.
42.
go back to reference Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M. A., Choudhury, N., et al. (2017). Security and privacy in fog computing: Challenges. IEEE Access,5, 19293–19304.CrossRef Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M. A., Choudhury, N., et al. (2017). Security and privacy in fog computing: Challenges. IEEE Access,5, 19293–19304.CrossRef
43.
go back to reference Naher, N., & Haque, M. M. (2019) Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC. In Proceedings of the International Ethical Hacking Conference (pp. 139–150). Naher, N., & Haque, M. M. (2019) Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC. In Proceedings of the International Ethical Hacking Conference (pp. 139–150).
44.
go back to reference Lu, Y., & Da Xu, L. (2018). Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things Journal,6, 2103–2115.CrossRef Lu, Y., & Da Xu, L. (2018). Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things Journal,6, 2103–2115.CrossRef
45.
go back to reference Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications,1, 53–66.CrossRef Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications,1, 53–66.CrossRef
46.
go back to reference Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2018). Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommunication Systems,67(2), 247–267.CrossRef Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2018). Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommunication Systems,67(2), 247–267.CrossRef
47.
go back to reference Stojmenovic, I., & Wen, S. (2014). The fog computing paradigm: Scenarios and security issues. In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, 7–10 September (pp. 1–8). Stojmenovic, I., & Wen, S. (2014). The fog computing paradigm: Scenarios and security issues. In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, 7–10 September (pp. 1–8).
48.
go back to reference Hamed, T., Ernst, J. B., & Kremer, S. C. (2018). A survey and taxonomy of classifiers of intrusion detection systems. In Computer and Network Security Essentials (pp. 21–39). Hamed, T., Ernst, J. B., & Kremer, S. C. (2018). A survey and taxonomy of classifiers of intrusion detection systems. In Computer and Network Security Essentials (pp. 21–39).
Metadata
Title
A hybrid security strategy (HS2) for reliable video streaming in fog computing
Authors
Shaimaa A. Hussein
Ahmed I. Saleh
Hossam El-Din Mostafa
Marwa I. Obaya
Publication date
09-12-2019
Publisher
Springer US
Published in
Wireless Networks / Issue 2/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-02203-3

Other articles of this Issue 2/2020

Wireless Networks 2/2020 Go to the issue