A MapReduce Based Approach for Secure Batch Satellite Image Encryption
Al-Khasawneh, Mahmoud Ahmad S.; Faheem, Muhammad; Aldhahri, Eman A.; Alzahrani, Abdulrahman; Alarood, Ala Abdulsalam (2023-05-24)
Al-Khasawneh, Mahmoud Ahmad S.
Faheem, Muhammad
Aldhahri, Eman A.
Alzahrani, Abdulrahman
Alarood, Ala Abdulsalam
IEEE
24.05.2023
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi-fe20231006139075
https://urn.fi/URN:NBN:fi-fe20231006139075
Kuvaus
vertaisarvioitu
©2023 The Authors. Published by IEEE. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
©2023 The Authors. Published by IEEE. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
Tiivistelmä
The overarching goal of this research was to examine the state of satellite imagery security in relation to its deteriorating form due to rising demand. The most common approaches to safeguarding satellite images during transmission across transmission networks, which are not protected by standard encryption, are the focus of this investigation. Since satellite imagery can be encrypted both in transit and while stored on a computer’s hard drive, we put the suggested Image Encryption System to the test by applying it to a collection of satellite photos. Concurrently encrypting data and running MapReduce jobs is key to the study methodology employed. This will be carried out in the Hadoop ecosystem, where an innovative method of analysing random numbers for use in Image encryption will be put to the test. The encryption was processed using MapReduce in the Hadoop ecosystem. Images were saved as BMP files with added security metadata. The evaluation of experiments was based on four (4) indicators. It was found that the processing time for batch encryption calculations grew in proportion to the amount of computations. All cluster, map, and reduction processes were put to the test using encrypted images, exposing load balancing difficulties and inefficiencies. Histogram analysis, the basis of an image encryption technique, provides evidence that the encrypted pixel values are consistent. Therefore, compared to other methods, such as a histogram or information entropy, this one is superior. Because of how it was crafted, it can withstand even the most sophisticated attacks without being compromised.
Kokoelmat
- Artikkelit [2910]