An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation

Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. In this paper, a new algorithm for data splitting called EPPA is presented to strengthen the confidentiality of data by two-phase process. In EPPA, data object is organized to be several Rubik’s cubes e...

Full description

Saved in:
Bibliographic Details
Main Authors: Wenbin Yao, Pengdi Ye, Xiaoyong Li
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:Discrete Dynamics in Nature and Society
Online Access:http://dx.doi.org/10.1155/2014/178585
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832551079850541056
author Wenbin Yao
Pengdi Ye
Xiaoyong Li
author_facet Wenbin Yao
Pengdi Ye
Xiaoyong Li
author_sort Wenbin Yao
collection DOAJ
description Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. In this paper, a new algorithm for data splitting called EPPA is presented to strengthen the confidentiality of data by two-phase process. In EPPA, data object is organized to be several Rubik’s cubes executed for several rounds transformation at the first phase. In every round, chaotic logistic maps generate pseudorandom sequences to cover the plaintext by executing Exclusive-OR operation to form the cipher. Then logistic map is used to create rotation policies to scramble data information based on Rubik’s cube transformation. At the second phase, all cubes are unfolded and combined together as a cross-shaped cube, which will be partitioned into a few data fragments to guarantee that every fragment does not contain continuous bytes. These fragments are stored on randomly chosen servers within cloud environment. Analyses and experiments show that this approach is efficient and useable for the confidentiality of user data in cloud storage system.
format Article
id doaj-art-ca676906261649aa850e76d090f6f778
institution Kabale University
issn 1026-0226
1607-887X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series Discrete Dynamics in Nature and Society
spelling doaj-art-ca676906261649aa850e76d090f6f7782025-02-03T06:05:05ZengWileyDiscrete Dynamics in Nature and Society1026-02261607-887X2014-01-01201410.1155/2014/178585178585An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube TransformationWenbin Yao0Pengdi Ye1Xiaoyong Li2Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing 100876, ChinaBeijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing 100876, ChinaBeijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing 100876, ChinaSecurity and privacy issues present a strong barrier for users to adapt to cloud storage systems. In this paper, a new algorithm for data splitting called EPPA is presented to strengthen the confidentiality of data by two-phase process. In EPPA, data object is organized to be several Rubik’s cubes executed for several rounds transformation at the first phase. In every round, chaotic logistic maps generate pseudorandom sequences to cover the plaintext by executing Exclusive-OR operation to form the cipher. Then logistic map is used to create rotation policies to scramble data information based on Rubik’s cube transformation. At the second phase, all cubes are unfolded and combined together as a cross-shaped cube, which will be partitioned into a few data fragments to guarantee that every fragment does not contain continuous bytes. These fragments are stored on randomly chosen servers within cloud environment. Analyses and experiments show that this approach is efficient and useable for the confidentiality of user data in cloud storage system.http://dx.doi.org/10.1155/2014/178585
spellingShingle Wenbin Yao
Pengdi Ye
Xiaoyong Li
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Discrete Dynamics in Nature and Society
title An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
title_full An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
title_fullStr An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
title_full_unstemmed An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
title_short An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
title_sort effective privacy preserving algorithm based on logistic map and rubik s cube transformation
url http://dx.doi.org/10.1155/2014/178585
work_keys_str_mv AT wenbinyao aneffectiveprivacypreservingalgorithmbasedonlogisticmapandrubikscubetransformation
AT pengdiye aneffectiveprivacypreservingalgorithmbasedonlogisticmapandrubikscubetransformation
AT xiaoyongli aneffectiveprivacypreservingalgorithmbasedonlogisticmapandrubikscubetransformation
AT wenbinyao effectiveprivacypreservingalgorithmbasedonlogisticmapandrubikscubetransformation
AT pengdiye effectiveprivacypreservingalgorithmbasedonlogisticmapandrubikscubetransformation
AT xiaoyongli effectiveprivacypreservingalgorithmbasedonlogisticmapandrubikscubetransformation