A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service

被引:65
|
作者
Zheng, Qiming [1 ]
Wang, Xiaomin [1 ]
Khan, Muhammad Khurram [2 ]
Zhang, Wenfang [1 ]
Gupta, B. B. [3 ]
Guo, Wei [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
[2] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
[3] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Chaos; cryptography; message authentication; encryption; Internet of Things; security; clouds; hardware; SECURITY;
D O I
10.1109/ACCESS.2017.2775038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, intelligent railway operation and maintenance using cloud technology have received wide consideration for the provision of public transport services. Under the cloud environment, information security is critical to ensure the integrity of data through protection from unauthorized manipulation and the confidentiality through protection against the leakage of sensitive information. This paper proposes a lightweight authenticated encryption scheme with associated data based on a novel discrete chaotic S-box coupled map lattice (SCML), which avoids the dynamic degradation of the digital chaotic system and low efficiency of the chaos-based cryptosystem. Based on the chaotic SCML, an authenticated encryption scheme that protects the confidentiality and integrity in one pass is presented in detail. The security analysis and performance simulations in software and hardware show that the proposed scheme is efficient and provides adequate security through authentication and encryption. Such a scheme could be used for applications in a railway cloud service that requires moderate security and low-cost implementations.
引用
收藏
页码:711 / 722
页数:12
相关论文
共 50 条
  • [41] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [42] SLAE6: Secure and Lightweight Authenticated Encryption Scheme for 6LoWPAN Networks
    Ashrif, Fatma Foad
    Sundarajan, Elankovan A.
    Ahmed, Rami
    Hasan, Mohammad Kamrul
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, SENSORNETS 2023, 2023, : 67 - 78
  • [43] Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
    K. L. Neela
    V. Kavitha
    Applied Intelligence, 2023, 53 : 4733 - 4747
  • [44] Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
    Neela, K. L.
    Kavitha, V
    APPLIED INTELLIGENCE, 2023, 53 (04) : 4733 - 4747
  • [45] A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting
    Lin, Tsung-Hung
    Tsung, Chen-Kun
    Lee, Tian-Fu
    Wang, Zeng-Bo
    SENSORS, 2017, 17 (12)
  • [46] A based on blinded CP-ABE searchable encryption cloud storage service scheme
    Cao, Laicheng
    Zhang, Jinbo
    Dong, Xiaoye
    Xi, Chengzhe
    Wang, Yafei
    Zhang, Yangyang
    Guo, Xian
    Feng, Tao
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)
  • [47] A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps
    Behnia, S.
    Akhshani, A.
    Ahadpour, S.
    Mahmodi, H.
    Akhavan, A.
    PHYSICS LETTERS A, 2007, 366 (4-5) : 391 - 396
  • [48] A Secure and Lightweight Chaos Based Image Encryption Scheme
    Khan, Fadia Ali
    Ahmed, Jameel
    Alqahtani, Fehaid
    Alsuhibany, Suliman A.
    Ahmed, Fawad
    Ahmad, Jawad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 279 - 294
  • [49] A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
    Chen, Zhen
    Zhang, Wenfang
    Wang, Xiaomin
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 10 - 13
  • [50] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATION SCIENCES, 2014, 278 : 577 - 587