Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments
Hemalatha Mahalingam,
Padmapriya Velupillai Meikandan,
Karuppuswamy Thenmozhi,
Kawthar Mostafa Moria,
Chandrasekaran Lakshmi,
Nithya Chidambaram () and
Rengarajan Amirtharajan ()
Additional contact information
Hemalatha Mahalingam: Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah 22254, Saudi Arabia
Padmapriya Velupillai Meikandan: Department of Computer Sciences, Marquette University, Milwaukee, WI 53233, USA
Karuppuswamy Thenmozhi: School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613401, India
Kawthar Mostafa Moria: Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia
Chandrasekaran Lakshmi: School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613401, India
Nithya Chidambaram: School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613401, India
Rengarajan Amirtharajan: School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613401, India
Mathematics, 2023, vol. 11, issue 8, 1-23
Abstract:
Cloud services offer doctors and data scientists access to medical data from multiple locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore, cyber threats to medical data at rest, in transit and when used by applications need to be pinpointed and prevented preemptively through a host of proven cryptographical solutions. The presented work integrates adaptive key generation, neural-based confusion and non-XOR, namely DNA diffusion, which offers a more extensive and unique key, adaptive confusion and unpredictable diffusion algorithm. Only authenticated users can store this encrypted image in cloud storage. The proposed security framework uses logistics, tent maps and adaptive key generation modules. The adaptive key is generated using a multilayer and nonlinear neural network from every input plain image. The Hopfield neural network (HNN) is a recurrent temporal network that updates learning with every plain image. We have taken Amazon Web Services (AWS) and Simple Storage Service (S3) to store encrypted images. Using benchmark evolution metrics, the ability of image encryption is validated against brute force and statistical attacks, and encryption quality analysis is also made. Thus, it is proved that the proposed scheme is well suited for hosting cloud storage for secure images.
Keywords: chaos key generator; adaptive key generator; DNA encoding; image ciphering; neural networks; cloud storage (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/11/8/1769/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/8/1769/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:8:p:1769-:d:1118299
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().