Abstract
Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In this paper, we have designed and developed a resource-efficient encryption system for encrypting multimedia big data in IoT. The proposed system takes the advantages of the Feistel Encryption Scheme, an Advanced Encryption Standard (AES), and genetic algorithms. To satisfy high throughput, the GPU has also been used in the proposed system. This system is evaluated on real IoT medical multimedia data to benchmark the encryption algorithms such as MARS, RC6, 3-DES, DES, and Blowfish in terms of computational running time and throughput for both encryption and decryption processes as well as the avalanche effect. The results show that the proposed system has the lowest running time and highest throughput for both encryption and decryption processes and highest avalanche effect with compared to the existing encryption algorithms. To satisfy the security objective, the developed algorithm has better Avalanche Effect with compared to any of the other existing algorithms and hence can be incorporated in the process of encryption/decryption of any plain multimedia big data. Also, it has shown that the classical and modern ciphers have very less Avalanche Effect and hence cannot be used for encryption of confidential multimedia messages or confidential big data. The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50. Therefore, such system is able to secure the multimedia big data against real-time attacks.













Similar content being viewed by others
References
Aljawarneh S (2011) Cloud security engineering: avoiding security threats the right way. Int J Cloud Appl Comput (IJCAC) 1(2):64–70. doi:10.4018/ijcac.2011040105
Aljawarneh S, Raja M, Abdelsalam M (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77
Atzori L, Iera A, Morabito G (2010) Internet of things: a survey. Comput Netw 54:2787–2805
Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 58:49–69
Chen M, Shiwen M, Yunhao L (2014) Big data: a survey. Mob Netw Appl 19:171–209
Dave E (2016) The internet of things: how the next evolution of the internet is changing everything. Cisco
Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10:216–222
Evans D (2011) The internet of things how the next evolution of the internet is changing everything. Cisco Internet Business Solutions Group (IBSG)
Hart J, Martinez K (2015) Toward an environmental internet of things. AGU Earth Space Sci 2:194–200
http://www.nvidia.com/content/pdf/kepler/tesla-k20-passive-bd-06455-001-v07.pdf. Accessed 14 July 2016
http://www.sesame.org.jo. Accessed 30 Aug 2016
Kalyani V, Gaur P, Vats S (2015) IoT: ‘machine to machine’ application a future vision. J Manag Eng Inf Technol (JMEIT) 2:2394–8124
Kuehner H, Hartenstein H (2016) decentralized secure data sharing with attribute-based encryption: a resource consumption analysis. Proceedings of the 4th ACM International Workshop on Security in Cloud Computing
Kumar A, Rajpal N, Tayal A (2005) New signal security system for multimedia data transmission using genetic algorithms. NCC05
Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. Proceedings of the International Symposium on Next Generation Electronics
Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17:243–259
Madakam S (2015) Internet of things: smart things. Int J Future Comput Commun 4:250–253
Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability-based access control (IACAC) for the internet of things. J Cyber Secur Mob 1:309–348
Prasetyo KN, Purwanto Y, Darlis D (2014) An Implementation of data encryption for internet of things using blowfish algorithm on FPGA. International Conference on Information and Communication Technology
Santucci G (2009) From internet to data to internet of things. Proceedings of the International Conference on Future Trends of the Internet
Schneier B (1996) Applied cryptography, 2nd edn. Wiley
Schweitzer D, Boleng J (2009) Designing web labs for teaching security concepts. J Comput Sci Coll 25:39–45
Smith J (2013) Riding the multimedia big data wave. In: Proceedings of the International ACM SIGIR Conference on Research and development in Information Retrieval (SIGIR’13)
Stallings W (1999) Cryptography and network security principle and practice, 2nd edn. Prentice Hall
Sundaram BV, Ramnath M, Prasanth M, Sundaram V (2015) Encryption and hash based security in internet of things. Proceedings of International Conference on Signal Processing, Communication and Networking
Tavares SE, Heys HM (1995) Avalanche characteristics of substitution-permutation encryption networks. IEEE Trans Comput 44:1131–1139
Wang W, Hu Y, Chen L, Huang X, Sunar B (2012) accelerating fully homomorphic encryption using GPU. Proceedings of the IEEE Conference on High-Performance Extreme Computing (HPEC)
Xin M (2015) A mixed encryption algorithm used in internet of things security transmission system. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112
Zhao Y (2013) Research on data security technology in internet of thing. Proceedings of the International Conference on Mechatronics and Control Engineering
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Aljawarneh, S., Yassein, M.B. & Talafha, W.A. A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76, 22703–22724 (2017). https://doi.org/10.1007/s11042-016-4333-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4333-y