1. CLOAK: Visible Touching and Invisible Protecting: Cloud Privacy Protection Based on LSB and Chaotic Approach
- Author
-
Meiya Dong, Biaokai Zhu, Dengao Li, Jumin Zhao, and Zhaobin Liu
- Subjects
Information privacy ,Steganography ,business.industry ,Computer science ,Cloak ,020206 networking & telecommunications ,Access control ,Cryptography ,Cloud computing ,02 engineering and technology ,Information security ,Computer security ,computer.software_genre ,Encryption ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Recently a variety of approaches have been applied in protecting information privacy in Internet of Things systems such as intelligent security protection systems, smart home systems, or digital access control systems. In this paper, we study a fatal problem: how to remain secure in common sensing layer of cloud based IOT systems. For example, how to hide biological information such as fingerprint, facial expression, and body gestures, which are reversible to keep users' privacy still remains challengeable. We propose CLOAK which is a novel light-weight approach to ensure the privacy security in cloud based IOT systems. CLOAK takes Least Significant Bits (LSB) steganography to hide the vital information in fingerprint image, and it takes chaotic sequence encryption to resolve the information. CLOAK can resists static attack and protects the real users' privacy in terms of information security and integrity. Experimental and theoretical results demonstrate the effectiveness and security of the CLOAK. more...
- Published
- 2018
- Full Text
- View/download PDF