A resource-efficient encryption algorithm for multimedia big data

Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In th...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 76; no. 21; pp. 22703 - 22724
Main Authors Aljawarneh, Shadi, Yassein, Muneer Bani, Talafha, We’am Adel
Format Journal Article
LanguageEnglish
Published New York Springer US 01.11.2017
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In this paper, we have designed and developed a resource-efficient encryption system for encrypting multimedia big data in IoT. The proposed system takes the advantages of the Feistel Encryption Scheme, an Advanced Encryption Standard (AES), and genetic algorithms. To satisfy high throughput, the GPU has also been used in the proposed system. This system is evaluated on real IoT medical multimedia data to benchmark the encryption algorithms such as MARS, RC6, 3-DES, DES, and Blowfish in terms of computational running time and throughput for both encryption and decryption processes as well as the avalanche effect. The results show that the proposed system has the lowest running time and highest throughput for both encryption and decryption processes and highest avalanche effect with compared to the existing encryption algorithms. To satisfy the security objective, the developed algorithm has better Avalanche Effect with compared to any of the other existing algorithms and hence can be incorporated in the process of encryption/decryption of any plain multimedia big data. Also, it has shown that the classical and modern ciphers have very less Avalanche Effect and hence cannot be used for encryption of confidential multimedia messages or confidential big data. The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50. Therefore, such system is able to secure the multimedia big data against real-time attacks.
AbstractList Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In this paper, we have designed and developed a resource-efficient encryption system for encrypting multimedia big data in IoT. The proposed system takes the advantages of the Feistel Encryption Scheme, an Advanced Encryption Standard (AES), and genetic algorithms. To satisfy high throughput, the GPU has also been used in the proposed system. This system is evaluated on real IoT medical multimedia data to benchmark the encryption algorithms such as MARS, RC6, 3-DES, DES, and Blowfish in terms of computational running time and throughput for both encryption and decryption processes as well as the avalanche effect. The results show that the proposed system has the lowest running time and highest throughput for both encryption and decryption processes and highest avalanche effect with compared to the existing encryption algorithms. To satisfy the security objective, the developed algorithm has better Avalanche Effect with compared to any of the other existing algorithms and hence can be incorporated in the process of encryption/decryption of any plain multimedia big data. Also, it has shown that the classical and modern ciphers have very less Avalanche Effect and hence cannot be used for encryption of confidential multimedia messages or confidential big data. The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50. Therefore, such system is able to secure the multimedia big data against real-time attacks.
Author Yassein, Muneer Bani
Talafha, We’am Adel
Aljawarneh, Shadi
Author_xml – sequence: 1
  givenname: Shadi
  surname: Aljawarneh
  fullname: Aljawarneh, Shadi
  email: saaljawarneh@just.edu.jo
  organization: Faculty of Computer and Information Technology, Jordan University of Science and Technology
– sequence: 2
  givenname: Muneer Bani
  surname: Yassein
  fullname: Yassein, Muneer Bani
  organization: Faculty of Computer and Information Technology, Jordan University of Science and Technology
– sequence: 3
  givenname: We’am Adel
  surname: Talafha
  fullname: Talafha, We’am Adel
  organization: Faculty of Computer and Information Technology, Jordan University of Science and Technology
BookMark eNp9kDtPAzEQhC0UJJLAD6A7idrgtX32XRlFvCQkGqgtn88Oju4RbKe4f4-jo0BIUO0W8-3MzgothnGwCF0DuQVC5F0EIJxiAgJzxhieztASSsmwlBQWeWcVwbIkcIFWMe5JFpaUL9FmUwQbx2MwFlvnvPF2SIUdTJgOyY9DobvdGHz66As3hqI_dsn3tvW6aPyuaHXSl-jc6S7aq--5Ru8P92_bJ_zy-vi83bxgw0AkTJloDGjhuKXatkxw0jjNDXWk0g20pTZOOgG6psZorolgRFguXWXBNBVla3Qz3z2E8fNoY1L7HHvIlgpqXtdlKUmVVTCrTBhjDNapQ_C9DpMCok5NqbkplQtQp6bUlBn5izE-6dP3KWjf_UvSmYzZZdjZ8CPTn9AXaMWAYA
CitedBy_id crossref_primary_10_1155_2021_7212688
crossref_primary_10_1007_s11042_019_07796_7
crossref_primary_10_1007_s11042_018_5729_7
crossref_primary_10_1080_03772063_2020_1782781
crossref_primary_10_1007_s10699_019_09593_9
crossref_primary_10_3390_electronics11071083
crossref_primary_10_1007_s10699_019_09595_7
crossref_primary_10_1007_s10586_017_1107_x
crossref_primary_10_1007_s11042_022_13933_6
crossref_primary_10_2139_ssrn_3434931
crossref_primary_10_1007_s11042_019_08190_z
crossref_primary_10_1088_1742_6596_2010_1_012058
crossref_primary_10_1007_s12083_022_01372_x
crossref_primary_10_1371_journal_pone_0293418
crossref_primary_10_1007_s11277_019_06120_8
crossref_primary_10_1016_j_compeleceng_2021_107418
crossref_primary_10_12688_f1000research_72890_1
crossref_primary_10_12688_f1000research_72890_2
crossref_primary_10_4018_IJACI_293148
crossref_primary_10_1166_jmihi_2021_3888
crossref_primary_10_1007_s11042_020_09478_1
crossref_primary_10_1109_ACCESS_2020_2964280
crossref_primary_10_1007_s00521_019_04062_7
crossref_primary_10_1109_ACCESS_2018_2815614
crossref_primary_10_1007_s11042_020_08994_4
crossref_primary_10_3390_app14114341
crossref_primary_10_3390_electronics12132930
crossref_primary_10_12688_f1000research_72890_3
crossref_primary_10_1016_j_jksuci_2020_08_005
crossref_primary_10_1007_s11042_017_4873_9
crossref_primary_10_1515_jisys_2018_0365
crossref_primary_10_2174_2213275912666190103142858
crossref_primary_10_1155_2021_6751423
crossref_primary_10_1007_s10699_019_09588_6
crossref_primary_10_1007_s10699_019_09589_5
crossref_primary_10_1007_s11042_020_09446_9
crossref_primary_10_1002_cmm4_1075
crossref_primary_10_11648_j_advances_20240503_13
crossref_primary_10_3390_s21134419
crossref_primary_10_4018_IJITWE_2019100102
crossref_primary_10_1007_s11042_017_5556_2
crossref_primary_10_1007_s13369_023_07924_4
crossref_primary_10_1007_s11042_019_07852_2
crossref_primary_10_1007_s10699_019_09591_x
crossref_primary_10_1007_s11042_020_08823_8
crossref_primary_10_1007_s11042_020_08826_5
crossref_primary_10_1007_s11042_020_08694_z
crossref_primary_10_1007_s11042_018_5663_8
Cites_doi 10.1007/s10796-014-9492-7
10.1007/s11036-013-0489-0
10.1016/j.future.2014.10.010
10.1007/s11277-011-0288-5
10.7763/IJFCC.2015.V4.395
10.1016/j.comnet.2010.05.010
10.1109/12.464391
10.1016/j.future.2016.01.020
10.1002/2014EA000044
10.1109/ICoICT.2014.6914043
10.4018/ijcac.2011040105
10.1145/2898445.2898449
10.1109/CyberC.2015.9
10.4028/www.scientific.net/AMM.433-435.1752
10.1109/ISNE.2014.6839375
10.1145/2484028.2494492
10.1109/HPEC.2012.6408660
ContentType Journal Article
Copyright Springer Science+Business Media New York 2017
Multimedia Tools and Applications is a copyright of Springer, 2017.
Copyright_xml – notice: Springer Science+Business Media New York 2017
– notice: Multimedia Tools and Applications is a copyright of Springer, 2017.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s11042-016-4333-y
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Global (Alumni Edition)
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
ProQuest Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 22724
ExternalDocumentID 10_1007_s11042_016_4333_y
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACMFV
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
7SC
7XB
8AL
8FD
8FK
ABRTQ
JQ2
L.-
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c316t-236bc1a6f4e2aed3640bfa4c2f08ab1d5acf7f61a92cca4a06306e47f8e1cb823
IEDL.DBID U2A
ISSN 1380-7501
IngestDate Sun Jul 13 04:13:50 EDT 2025
Tue Jul 01 02:06:41 EDT 2025
Thu Apr 24 22:53:14 EDT 2025
Fri Feb 21 02:32:04 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 21
Keywords Multimedia big data
Internet of things
Encryption
GPU
AES
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-236bc1a6f4e2aed3640bfa4c2f08ab1d5acf7f61a92cca4a06306e47f8e1cb823
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1949955708
PQPubID 54626
PageCount 22
ParticipantIDs proquest_journals_1949955708
crossref_primary_10_1007_s11042_016_4333_y
crossref_citationtrail_10_1007_s11042_016_4333_y
springer_journals_10_1007_s11042_016_4333_y
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20171100
2017-11-00
20171101
PublicationDateYYYYMMDD 2017-11-01
PublicationDate_xml – month: 11
  year: 2017
  text: 20171100
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2017
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References CR19
CR15
CR14
CR13
Atzori, Iera, Morabito (CR3) 2010; 54
CR11
Li, Da Xu, Zhao (CR16) 2015; 17
Aljawarneh (CR1) 2011; 1
CR10
Elminaam, Abdual-Kader, Hadhoud (CR7) 2010; 10
Schweitzer, Boleng (CR22) 2009; 25
CR30
Aljawarneh, Raja, Abdelsalam (CR2) 2016; 60
CR6
CR8
CR28
Hart, Martinez (CR9) 2015; 2
CR27
CR25
CR24
CR23
Madakam (CR17) 2015; 4
CR21
CR20
Mahalle, Anggorojati, Prasad, Prasad (CR18) 2013; 1
Bandyopadhyay, Sen (CR4) 2011; 58
Kalyani, Gaur, Vats (CR12) 2015; 2
Yao, Chen, Tian (CR29) 2015; 49
Chen, Shiwen, Yunhao (CR5) 2014; 19
Tavares, Heys (CR26) 1995; 44
X Yao (4333_CR29) 2015; 49
D Schweitzer (4333_CR22) 2009; 25
S Madakam (4333_CR17) 2015; 4
S Aljawarneh (4333_CR1) 2011; 1
4333_CR20
4333_CR21
4333_CR24
4333_CR23
V Kalyani (4333_CR12) 2015; 2
4333_CR25
4333_CR28
4333_CR8
4333_CR27
J Hart (4333_CR9) 2015; 2
4333_CR6
DS Elminaam (4333_CR7) 2010; 10
D Bandyopadhyay (4333_CR4) 2011; 58
S Aljawarneh (4333_CR2) 2016; 60
4333_CR30
4333_CR11
4333_CR10
4333_CR13
L Atzori (4333_CR3) 2010; 54
4333_CR15
4333_CR14
4333_CR19
S Li (4333_CR16) 2015; 17
PN Mahalle (4333_CR18) 2013; 1
M Chen (4333_CR5) 2014; 19
SE Tavares (4333_CR26) 1995; 44
References_xml – volume: 2
  start-page: 2394
  year: 2015
  end-page: 8124
  ident: CR12
  article-title: IoT: ‘machine to machine’ application a future vision
  publication-title: J Manag Eng Inf Technol (JMEIT)
– volume: 1
  start-page: 64
  issue: 2
  year: 2011
  end-page: 70
  ident: CR1
  article-title: Cloud security engineering: avoiding security threats the right way
  publication-title: Int J Cloud Appl Comput (IJCAC)
– volume: 17
  start-page: 243
  year: 2015
  end-page: 259
  ident: CR16
  article-title: The internet of things: a survey
  publication-title: Inf Syst Front
  doi: 10.1007/s10796-014-9492-7
– volume: 25
  start-page: 39
  year: 2009
  end-page: 45
  ident: CR22
  article-title: Designing web labs for teaching security concepts
  publication-title: J Comput Sci Coll
– volume: 19
  start-page: 171
  year: 2014
  end-page: 209
  ident: CR5
  article-title: Big data: a survey
  publication-title: Mob Netw Appl
  doi: 10.1007/s11036-013-0489-0
– ident: CR14
– ident: CR30
– ident: CR10
– ident: CR6
– volume: 49
  start-page: 104
  year: 2015
  end-page: 112
  ident: CR29
  article-title: A lightweight attribute-based encryption scheme for the internet of things
  publication-title: Futur Gener Comput Syst
  doi: 10.1016/j.future.2014.10.010
– ident: CR8
– volume: 10
  start-page: 216
  year: 2010
  end-page: 222
  ident: CR7
  article-title: Evaluating the performance of symmetric encryption algorithms
  publication-title: IJ Netw Secur
– ident: CR25
– ident: CR27
– ident: CR23
– ident: CR21
– ident: CR19
– volume: 58
  start-page: 49
  year: 2011
  end-page: 69
  ident: CR4
  article-title: Internet of things: applications and challenges in technology and standardization
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-011-0288-5
– ident: CR15
– volume: 4
  start-page: 250
  year: 2015
  end-page: 253
  ident: CR17
  article-title: Internet of things: smart things
  publication-title: Int J Future Comput Commun
  doi: 10.7763/IJFCC.2015.V4.395
– volume: 54
  start-page: 2787
  year: 2010
  end-page: 2805
  ident: CR3
  article-title: Internet of things: a survey
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2010.05.010
– volume: 44
  start-page: 1131
  year: 1995
  end-page: 1139
  ident: CR26
  article-title: Avalanche characteristics of substitution-permutation encryption networks
  publication-title: IEEE Trans Comput
  doi: 10.1109/12.464391
– ident: CR13
– volume: 60
  start-page: 67
  year: 2016
  end-page: 77
  ident: CR2
  article-title: Investigations of automatic methods for detecting the polymorphic worms signatures
  publication-title: Futur Gener Comput Syst
  doi: 10.1016/j.future.2016.01.020
– ident: CR11
– volume: 2
  start-page: 194
  year: 2015
  end-page: 200
  ident: CR9
  article-title: Toward an environmental internet of things
  publication-title: AGU Earth Space Sci
  doi: 10.1002/2014EA000044
– volume: 1
  start-page: 309
  year: 2013
  end-page: 348
  ident: CR18
  article-title: Identity authentication and capability-based access control (IACAC) for the internet of things
  publication-title: J Cyber Secur Mob
– ident: CR28
– ident: CR24
– ident: CR20
– ident: 4333_CR19
  doi: 10.1109/ICoICT.2014.6914043
– ident: 4333_CR24
– volume: 10
  start-page: 216
  year: 2010
  ident: 4333_CR7
  publication-title: IJ Netw Secur
– volume: 54
  start-page: 2787
  year: 2010
  ident: 4333_CR3
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2010.05.010
– ident: 4333_CR8
– ident: 4333_CR20
– volume: 2
  start-page: 194
  year: 2015
  ident: 4333_CR9
  publication-title: AGU Earth Space Sci
  doi: 10.1002/2014EA000044
– volume: 60
  start-page: 67
  year: 2016
  ident: 4333_CR2
  publication-title: Futur Gener Comput Syst
  doi: 10.1016/j.future.2016.01.020
– volume: 25
  start-page: 39
  year: 2009
  ident: 4333_CR22
  publication-title: J Comput Sci Coll
– ident: 4333_CR11
– volume: 1
  start-page: 64
  issue: 2
  year: 2011
  ident: 4333_CR1
  publication-title: Int J Cloud Appl Comput (IJCAC)
  doi: 10.4018/ijcac.2011040105
– ident: 4333_CR13
  doi: 10.1145/2898445.2898449
– ident: 4333_CR21
– ident: 4333_CR28
  doi: 10.1109/CyberC.2015.9
– volume: 17
  start-page: 243
  year: 2015
  ident: 4333_CR16
  publication-title: Inf Syst Front
  doi: 10.1007/s10796-014-9492-7
– ident: 4333_CR25
– volume: 44
  start-page: 1131
  year: 1995
  ident: 4333_CR26
  publication-title: IEEE Trans Comput
  doi: 10.1109/12.464391
– volume: 49
  start-page: 104
  year: 2015
  ident: 4333_CR29
  publication-title: Futur Gener Comput Syst
  doi: 10.1016/j.future.2014.10.010
– volume: 4
  start-page: 250
  year: 2015
  ident: 4333_CR17
  publication-title: Int J Future Comput Commun
  doi: 10.7763/IJFCC.2015.V4.395
– ident: 4333_CR30
  doi: 10.4028/www.scientific.net/AMM.433-435.1752
– volume: 2
  start-page: 2394
  year: 2015
  ident: 4333_CR12
  publication-title: J Manag Eng Inf Technol (JMEIT)
– volume: 58
  start-page: 49
  year: 2011
  ident: 4333_CR4
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-011-0288-5
– ident: 4333_CR10
– volume: 1
  start-page: 309
  year: 2013
  ident: 4333_CR18
  publication-title: J Cyber Secur Mob
– volume: 19
  start-page: 171
  year: 2014
  ident: 4333_CR5
  publication-title: Mob Netw Appl
  doi: 10.1007/s11036-013-0489-0
– ident: 4333_CR14
– ident: 4333_CR15
  doi: 10.1109/ISNE.2014.6839375
– ident: 4333_CR6
– ident: 4333_CR23
  doi: 10.1145/2484028.2494492
– ident: 4333_CR27
  doi: 10.1109/HPEC.2012.6408660
SSID ssj0016524
Score 2.509304
Snippet Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 22703
SubjectTerms Algorithms
Avalanches
Big Data
Computer Communication Networks
Computer Science
Data encryption
Data management
Data Structures and Information Theory
Encryption
Genetic algorithms
Internet
Messages
Multimedia
Multimedia Information Systems
Run time (computers)
Special Purpose and Application-Based Systems
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LTwIxEJ4oXPTgAzWiaHrwpGncdnfLcjJoIMREYowk3DZtt0UTBAQ88O_tLF1AEz1vt8nOtPPNzuMbgCvsym1w5X5LQhHQSKiEqgwD-TKwUmrlEALjHU9d0elFj_247wNuM19WWdjE3FBnY40x8luGLCrIF5XcTT4pTo3C7KofobENZWeCk6QE5ftW9_lllUcQsR9rmwTUYSMr8pp58xzD1hS3BruGQrr4iUxrd_NXhjQHnvYB7HmPkTSXKj6ELTOqwH4xjYH4y1mB3Q1qwSNoNsnUR-apyWkiHLoQt3K6yI0EkcOB-7z52wdxbivJ6wrzLhKi3gcE60aPodduvT50qB-XQHXIxJzyUCjNpLCR4dJkoYgCZWWkuQ0SqVgWS23rVjDZ4E5tkUS2LWGiuk0Mc0rh4QmURuOROQXSCJVz5RxUhRrJZrQ0jHPFbRYbnmkbVCEoRJVqzyWOIy2G6ZoFGaWbYv0YSjddVOF69cpkSaTx3-JaIf_U36lZuj4BVbgpdLLx-K_Nzv7f7Bx2OEJ13l9Yg9J8-mUunKMxV5f-NH0DjhzPVw
  priority: 102
  providerName: ProQuest
Title A resource-efficient encryption algorithm for multimedia big data
URI https://link.springer.com/article/10.1007/s11042-016-4333-y
https://www.proquest.com/docview/1949955708
Volume 76
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFH4RuOjBH6gRRdKDJ82StdvKOA7Dj2gkxkiCp6XtWiRBMIAH_nv7xgZo1MRTD-t6eG_t99b3vu8BXCErt8Gk_S3xuOv4XIaOTPAiX7hGCCUtQuB9x0OPd_v-3SAYZDzueV7tnqck05N6Q3ajSCWxIQqyfDxnWYBSYH_dsY6rz6J16oAHWSfb0HUsHNI8lfnTEl_BaBNhfkuKpljTPoT9LEgk0cqrR7CjJ2U4yBswkGw_lmFvS03wGKKIzLLLeEenyhAWUIidOVum5wIR4-F0Nlq8vhEbqZK0lDAljhA5GhIsFT2Bfrv1fNt1sg4JjvIoXzjM41JRwY2vmdCJx31XGuErZtxQSJoEQpm64VQ0mPWUL1Bgi2u_bkJNrR-YdwrFyXSiz4A0PGmjN4tOnkJ9GSU0ZUwykwSaJcq4FXBzU8Uqkw_HLhbjeCN8jNaNsWQMrRsvK3C9fuV9pZ3x1-Rqbv8420bzmKJ0DoqEhRW4yX2y9fi3xc7_NfsCdhmCdcowrEJxMfvQlzbUWMgaFMJ2pwalqN1s9nDsvNy37Nhs9R6faumH9wlK19Bc
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDLYQHIADb8R45gAXUESTdqE7IDQBYzxPIHErSZoMJBgwhtD-FL8RO2sZIMGNc9OodRzbif19BlgnVG5NGjyWxCriiTIpNzld5OvIa20Negi67zi_UM2r5OS6ej0E7yUWhsoqS5sYDHX-aOmOfFsQiwrxRaV7T8-cukZRdrVsodFXi1PXe8Mj28vu8QGu74aUjcPL_SYvugpwGwvV5TJWxgqtfOKkdnmsksh4nVjpo1QbkVe19TteCV2T-HeJJlIq5ZIdnzqB305EB2jyR5IYPTkh0xtHn1kLVS2a6KYRR08syixqgOoJAsLgGMIoxbz33Q8Ogtsf-djg5hpTMFHEp6zeV6hpGHLtGZgsez-wwhTMwPgXIsNZqNdZp8gDcBdIKdCXMRzZ6QWTxPR9C4XZvX1gGCSzUMUYMCvM3LUYVanOwdW_iHEehtuPbbcArBYbDBzRMcaWqG2sdkJKI31edTK3PqpAVIoqswVzOTXQuM8GnMsk3Yyq1Ui6Wa8Cm5-vPPVpO_4avFzKPyt28Es20LcKbJVr8uXxb5Mt_j3ZGow2L8_PsrPji9MlGJMUJARk4zIMdzuvbgVDnK5ZDXrF4Oa_FfkDXRYMqA
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTyMxDLZQkdDugeeuKM8c4MIqYpKZptMDQuVR8azQapG4zSaZpCBBgVKE-tf4ddjTDAUkuHGeTKQ4ju3E_j4DrBEqtyENXktiFfFEmZSbnB7ydeS1tgY9BL13nLbVwXlydFG7GIPnEgtDZZWlTSwMdX5r6Y18UxCLCvFFpZs-lEWc7bW27-45dZCiTGvZTmOoIsdu8ITXt4etwz3c63UpW_v_dg946DDAbSxUn8tYGSu08omT2uWxSiLjdWKlj1JtRF7T1te9ErohcaWJJoIq5ZK6T53AdRDpAZr_8TrdiiowvrPfPvv7msNQtdBSN404-mVR5lQL4J4gWAyOIcRSzAfvveIo1P2QnS2cXmsaJkO0yppD9ZqBMdedhamyEwQLhmEWfr6hNZyDZpP1QlaAu4KiAj0bw5G9QWGgmL7uoDj7lzcMQ2ZW1DQWCBZmrjqMalZ_wfm3CPI3VLq3XTcPrBEbDCPRTcaWiG6sdkJKI31eczK3PqpCVIoqs4HHnNppXGcjBmaSbka1ayTdbFCFjddf7oYkHl8NXirln4Xz_JCNtK8Kf8o9efP5s8kWvp5sFSZQibOTw_bxIvyQFDEUMMclqPR7j24Z452-WQmKxeD_d-vyC0l-Ejo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+resource-efficient+encryption+algorithm+for+multimedia+big+data&rft.jtitle=Multimedia+tools+and+applications&rft.au=Aljawarneh%2C+Shadi&rft.au=Yassein%2C+Muneer+Bani&rft.au=Talafha%2C+We%E2%80%99am+Adel&rft.date=2017-11-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=76&rft.issue=21&rft.spage=22703&rft.epage=22724&rft_id=info:doi/10.1007%2Fs11042-016-4333-y&rft.externalDocID=10_1007_s11042_016_4333_y
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon