SlideShare a Scribd company logo
Compressive Sensing Based Simultaneous Data
Compression and Convergent Encryption for
Secure Deduplication
M. Tanooj Kumar Dr. M. Babu Reddy
Research Scholar Assistant Professor
Department of Computer Science Department of Computer Science
Krishna University Krishna University
Machilipatnam, India Machilipatnam, India
Abstract -- This paper proposes a new compressive
sensing based method for simultaneous data
compression and convergent encryption for secure
deduplication to efficiently use for the cloud storage. It
performs signal acquisition, its compression and
encryption at the same time. The measurement matrix
is generated using a hash key and is exploited for
encryption. It seems that it is very suitable for the cloud
model considering both the data security and the
storage efficiently.
Keywords –Convergent Encryption, Compressive Sensing,
Sparsity, Measurement Matrix, Deduplication, Cloud
storage.
I.INTRODUCTION
Enterprises, Organizations and Individuals
outsource data storage to cloud storage because of its
less maintenance, accessibility, disaster recovery and
cost savings. A survey [1] publishes that nearly 75%
of our digital world is a copy - in other words, solely
25% is unique. Keeping it in view, most of the Cloud
Storage Providers (CSP’s) have taken up the data de-
duplication, a way that avoids the storage of single
data copy multiple times. Several data deduplication
schemes have been proposed by the researchers [2]
show how data deduplication minimizes redundant
data and maximize space savings.
To outsource data optimally and securely,
the data is compressed and encrypted. Conventional
cryptography is not suitable with data de-duplication.
In conventional cryptography, users will encrypt /
decrypt the data with their individual keys. If
conventional cryptography is used, identical data
copies {of totally different or of various} users can
create different cipher-texts, causes the data de-
duplication impossible. To resolve this problem, most
of the researchers use Convergent Encryption [3] to
produce identical cipher text from identical plaintext.
The major difficulty with the existing
compression and encryption methods is the
performance and the complexity of using two
different processes [4, 5, 6]. To resolve the problem,
a new compressive sensing based method is proposed
for simultaneous data compression and convergent
encryption for secure de-duplication, which is useful
for effective utilization of cloud storage. This method
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
144 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
performs both encryption and compression at the
same time and decreases the processing time.
The reminder of this paper is as following.
Section 2 provides background; Section 3 gives the
design and implementation of our deduplication
framework; Section 4 evaluates the implementation;
and, finally, we mention conclusion in Section 5.
II. BACKGROUND
A) Convergent Encryption
In convergent Encryption, any user derives
the convergent key from the data and encrypts the
data with the key derived. By applying this
technique, two users with same plain texts will obtain
the same cipher text because the encryption key is the
same; hence the CSP will be able to perform de-
duplication on such cipher texts. Furthermore, Users
need not interact with each other for establishing an
agreement on the key because the key is generated
deterministically and users have to retain and protect
the encryption keys. Therefore, convergent
encryption becomes a good and efficient technique
for the selection of encryption and deduplication in
the cloud storage [6].
B) Compressive sensing (CS)
In compressive sensing, the input signal (x)
with N samples is converted into some domain (DCT,
DFT etc.), in which the signal(x) has sparse
representation, produces K-sparse signal. Where K is
the largest coefficients, which contains the large
portion of information about the signal, obtained
using thresolding. Finally,to produce the compressed
and encrypted signal, M-length measurement matrix,
the K-sparse signal is multiplied with sensing matrix
(Φ).
On the other side, different optimization techniques
are used for rebuilding the original signal. First
multiply the signal with sensing matrix, which gives
N samples from M measurements. Then K-sparse
signal is recovered by using convex optimization
techniques. Once again apply inverse scarcity to get
the original signal.
C) Chaotic Measurement Matrix
Chaotic sequence is used to construct the
measurement matrix, which has been proved to as
Toeplitz-structured and sufficient to satisfy Restricted
Isometry Property (RIP) with high probability.The
definitionof logistic map is
Xn+1 = μ xn(1_xn); xn ε (0,1) (1)
It becomes chaotic when μ ε [3.57, 4].
III. PROPOSED SYSTEM
The main aim of designing this system is to
introduce a simple simultaneous compression and
convergent encryption technique for optimized cloud
storage based on compressive sensing. In this
algorithm sampling, compression and encryption can
be done at the same time.
Assume that User selects a file to store it in
the cloud storage. The content of the file (message) is
changed into digital signal (x) utilizing extended
ASCII code. This accomplishes a 1D digital signal. If
the message is too long, it is divided to smaller
blocks (segments) which are encrypted separately.
Compute the hash value of the message by using
SHA-512 algorithm. If the file is not sufficiently
sparse, user uses some suitable basis (Ψ) to “sparsify”
its representation. Use hash value as key to generates
pseudo-random Chaotic measurement matrix Φ
(Hash key serves as a seed for Chaotic pseudo-
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
145 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
random number generator; using this generator, a
sequence of pseudo-random numbers is generated
and this sequence forms the columns of the
measurement matrix).
The Simultaneous Compression-Convergent
Encrypted signal is produced by multiplying the
sparse signal (x) with a random chaotic measurement
matrix (Φ). The resultant signal has a lower
dimension than initial sparse signal. Mathematically,
the compressed-encrypted signal (y) is given by y=Φ
x. The signal thus obtained is not sparse. The
resultant signal (y) is sent to the server. It is
important to note that the random matrix (Φ), which
acts as secret key,is not sent along with the cipher
text. The proposed method is shown in Algorithm1.
Algorithm 1: CS based Convergent
Encryption
Input: File Selected
Output: File Uploaded to Cloud
Procedure: CS based Convergent Encryption
begin CS-Based-Convergent-Encryption
/* select file to upload */
Sparse representation of the file (content) of
order N x1
Generate Hash value of the file (content)
Generate µ of chaotic based on Hash Value
Generate Chaotic Measurement Matrix of order
M x N
Multiply chaotic measurement matrix with
sparse representation of file (content)
Develop an M-dimensional measurement vector
end
Whenever user requests the same fie, user has to
perform decompress-decrypt the message.
Decryption of the message is done by using a greedy
algorithm (either orthogonal matching pursuit
(OMP), or matching pursuit (MP), or greedy LS etc.)
or convex relaxation algorithm (basis pursuit (BP))
with the following: random matrix encryption (Φ),
the encrypted message (the cipher text) Y, and the
base for sparsity Ψ. Any extremely small decryption
error can be corrected by rounding the decrypted
values to the nearest integer values because extended
ASCII code is built from integers.
IV. EXPERIMENTAL RESULTS
This part shows simple examples of simultaneous
compression–convergent encryption based on
compressed sensing. Let assume that the message of
the text file is
TOTO JE TAJNY VZKAZ PRO BOBA
(The message is in Czech with the meaning “This is a
secret message for Bob”). After assigning the
Extended ASCII code to each character in the
message, The binary code forms a vector of length
216; 81 vector elements are non-zero so this vector
has relative sparsity 0.375. It was checked
experimentally that measurement matrix (generated
with secret key) must have at least compression ratio
0:8 (i. e. matrix size 173 x 216) for successful
reconstruction of message.
V. CONCLUSIONS
This paper presents a possibility of using
compressed sensing for simultaneous compression
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
146 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
and convergent encryption. Chaotic Measurement
matrix (in CS) is generated according to the hash key
and it is used also for convergent encryption. Results
show that this algorithm can provide good security
and compression performance.
REFERENCES
[1] I.D. Corporation, The digital universe – are you
ready? Online 2010.
[2] Wen Xia., Hong jiang, Dan Feng et al., A
comprehensive study of the past, present, and future
of data deduplication, Proceedings of IEEE, Vol. No
104(9), (2016).
[3] Madhuri Kavade, A.C. Lomte, Secure De-
dulication using convergent keys (convergent
cryptography) for cloud storage., International
Journal of computer Applications, Vol. 126(10),
(2015).
[4] Adrain, Monica Fira, Marius Daniel, Compressed
sensing based Encryption approach for tax forms
data, International Journal of Advanced Research in
Artificial Intelligence, Vol. 4(11), (2015).
[5] Nanrun Zhou, Aidi Zhang, Fen Zheng, Lihua
Gong, Novel image compression-encryption hybrid
algorithm based on Key-controlled measurement
matrix in compressive sensing, Optics & Laser
Technology, Vol. 62, (2014).
[6] Wang et al., Simultaneous encryption and
compression of medical images based on optimized
tensor compressed sensing, Bio Med Engg. online
(2016).
AUTHOR PROFILES
M. Tanooj Kumar is presently
pursuing Ph.D from Krishna
University, working as Assistant
professor in Department of CSE, K. L.
University, Vaddeswaram. His Research interest
includes Internet of Things, Information security and
privacy. He is a member of IETE.
Dr. M. Babu Reddy, Assistant
Professor and Head of the Department
(I/C), Department of Computer
Science, Krishna University,
Macilipatnam. Completed his Ph.D in CSE from
Acharya Nagarjuna University. His Research Interest
includes Software Engineering, Data Mining, Neural
Networks and Machine Learning. He is a member of
IEEE, CSI, ISTE and African Computational Society.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
147 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

More Related Content

PDF
A hybrid security and compressive sensing based sensor data gathering scheme
PDF
A new partial image encryption method for document images using variance base...
PDF
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
PDF
Improved LSB Steganograhy Technique for grayscale and RGB images
PDF
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
PDF
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
PDF
Classification of secure encrypted relationaldata in cloud computing
PDF
A novel secure image steganography method based on chaos theory in spatial do...
A hybrid security and compressive sensing based sensor data gathering scheme
A new partial image encryption method for document images using variance base...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
Improved LSB Steganograhy Technique for grayscale and RGB images
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
Classification of secure encrypted relationaldata in cloud computing
A novel secure image steganography method based on chaos theory in spatial do...

What's hot (19)

PDF
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
PDF
Cv4201644655
PDF
Ew4301904907
PDF
Data security framework for cloud computing networks
PDF
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
PDF
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
PDF
Color Image Encryption and Decryption Using Multiple Chaotic Maps
PDF
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
PDF
Information Hiding using LSB Technique based on Developed PSO Algorithm
PDF
RSA Based Secured Image Steganography Using DWT Approach
PDF
Image Steganography Based On Hill Cipher with Key Hiding Technique
PPTX
Performance evluvation of chaotic encryption technique
PDF
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
PDF
A Review of Comparison Techniques of Image Steganography
PDF
A1804010105
PPTX
Homomorphic encryption
PDF
Template Protection with Homomorphic Encryption
PDF
Image encryption and decryption using aes algorithm
PDF
Stegnography of high embedding efficiency by using an extended matrix encodin...
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Cv4201644655
Ew4301904907
Data security framework for cloud computing networks
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Color Image Encryption and Decryption Using Multiple Chaotic Maps
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Information Hiding using LSB Technique based on Developed PSO Algorithm
RSA Based Secured Image Steganography Using DWT Approach
Image Steganography Based On Hill Cipher with Key Hiding Technique
Performance evluvation of chaotic encryption technique
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
A Review of Comparison Techniques of Image Steganography
A1804010105
Homomorphic encryption
Template Protection with Homomorphic Encryption
Image encryption and decryption using aes algorithm
Stegnography of high embedding efficiency by using an extended matrix encodin...
Ad

Similar to Compressive Sensing Based Simultaneous Data Compression and Convergent Encryption for Secure Deduplication (20)

PDF
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
PDF
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
PDF
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
PDF
Implementation on Data Security Approach in Dynamic Multi Hop Communication
PDF
Advanced approach for encryption using advanced encryption standard with chao...
PDF
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
PDF
37de29c2ae88c046317fcfbebd7a66784874
PDF
A Modified Technique For Performing Data Encryption & Data Decryption
PDF
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
PDF
Improved steganographic security by
PDF
Highly secure scalable compression of encrypted images
PDF
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
PDF
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
PDF
L017217579
PDF
G04433953
PDF
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
PDF
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
PDF
Hybrid information security system via combination of compression, cryptogra...
PDF
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
PDF
IJSRED-V2I2P12
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
Implementation on Data Security Approach in Dynamic Multi Hop Communication
Advanced approach for encryption using advanced encryption standard with chao...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
37de29c2ae88c046317fcfbebd7a66784874
A Modified Technique For Performing Data Encryption & Data Decryption
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
Improved steganographic security by
Highly secure scalable compression of encrypted images
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
L017217579
G04433953
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
Hybrid information security system via combination of compression, cryptogra...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
IJSRED-V2I2P12
Ad

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Network Security Unit 5.pdf for BCA BBA.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx

Compressive Sensing Based Simultaneous Data Compression and Convergent Encryption for Secure Deduplication

  • 1. Compressive Sensing Based Simultaneous Data Compression and Convergent Encryption for Secure Deduplication M. Tanooj Kumar Dr. M. Babu Reddy Research Scholar Assistant Professor Department of Computer Science Department of Computer Science Krishna University Krishna University Machilipatnam, India Machilipatnam, India Abstract -- This paper proposes a new compressive sensing based method for simultaneous data compression and convergent encryption for secure deduplication to efficiently use for the cloud storage. It performs signal acquisition, its compression and encryption at the same time. The measurement matrix is generated using a hash key and is exploited for encryption. It seems that it is very suitable for the cloud model considering both the data security and the storage efficiently. Keywords –Convergent Encryption, Compressive Sensing, Sparsity, Measurement Matrix, Deduplication, Cloud storage. I.INTRODUCTION Enterprises, Organizations and Individuals outsource data storage to cloud storage because of its less maintenance, accessibility, disaster recovery and cost savings. A survey [1] publishes that nearly 75% of our digital world is a copy - in other words, solely 25% is unique. Keeping it in view, most of the Cloud Storage Providers (CSP’s) have taken up the data de- duplication, a way that avoids the storage of single data copy multiple times. Several data deduplication schemes have been proposed by the researchers [2] show how data deduplication minimizes redundant data and maximize space savings. To outsource data optimally and securely, the data is compressed and encrypted. Conventional cryptography is not suitable with data de-duplication. In conventional cryptography, users will encrypt / decrypt the data with their individual keys. If conventional cryptography is used, identical data copies {of totally different or of various} users can create different cipher-texts, causes the data de- duplication impossible. To resolve this problem, most of the researchers use Convergent Encryption [3] to produce identical cipher text from identical plaintext. The major difficulty with the existing compression and encryption methods is the performance and the complexity of using two different processes [4, 5, 6]. To resolve the problem, a new compressive sensing based method is proposed for simultaneous data compression and convergent encryption for secure de-duplication, which is useful for effective utilization of cloud storage. This method International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 144 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 2. performs both encryption and compression at the same time and decreases the processing time. The reminder of this paper is as following. Section 2 provides background; Section 3 gives the design and implementation of our deduplication framework; Section 4 evaluates the implementation; and, finally, we mention conclusion in Section 5. II. BACKGROUND A) Convergent Encryption In convergent Encryption, any user derives the convergent key from the data and encrypts the data with the key derived. By applying this technique, two users with same plain texts will obtain the same cipher text because the encryption key is the same; hence the CSP will be able to perform de- duplication on such cipher texts. Furthermore, Users need not interact with each other for establishing an agreement on the key because the key is generated deterministically and users have to retain and protect the encryption keys. Therefore, convergent encryption becomes a good and efficient technique for the selection of encryption and deduplication in the cloud storage [6]. B) Compressive sensing (CS) In compressive sensing, the input signal (x) with N samples is converted into some domain (DCT, DFT etc.), in which the signal(x) has sparse representation, produces K-sparse signal. Where K is the largest coefficients, which contains the large portion of information about the signal, obtained using thresolding. Finally,to produce the compressed and encrypted signal, M-length measurement matrix, the K-sparse signal is multiplied with sensing matrix (Φ). On the other side, different optimization techniques are used for rebuilding the original signal. First multiply the signal with sensing matrix, which gives N samples from M measurements. Then K-sparse signal is recovered by using convex optimization techniques. Once again apply inverse scarcity to get the original signal. C) Chaotic Measurement Matrix Chaotic sequence is used to construct the measurement matrix, which has been proved to as Toeplitz-structured and sufficient to satisfy Restricted Isometry Property (RIP) with high probability.The definitionof logistic map is Xn+1 = μ xn(1_xn); xn ε (0,1) (1) It becomes chaotic when μ ε [3.57, 4]. III. PROPOSED SYSTEM The main aim of designing this system is to introduce a simple simultaneous compression and convergent encryption technique for optimized cloud storage based on compressive sensing. In this algorithm sampling, compression and encryption can be done at the same time. Assume that User selects a file to store it in the cloud storage. The content of the file (message) is changed into digital signal (x) utilizing extended ASCII code. This accomplishes a 1D digital signal. If the message is too long, it is divided to smaller blocks (segments) which are encrypted separately. Compute the hash value of the message by using SHA-512 algorithm. If the file is not sufficiently sparse, user uses some suitable basis (Ψ) to “sparsify” its representation. Use hash value as key to generates pseudo-random Chaotic measurement matrix Φ (Hash key serves as a seed for Chaotic pseudo- International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 145 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 3. random number generator; using this generator, a sequence of pseudo-random numbers is generated and this sequence forms the columns of the measurement matrix). The Simultaneous Compression-Convergent Encrypted signal is produced by multiplying the sparse signal (x) with a random chaotic measurement matrix (Φ). The resultant signal has a lower dimension than initial sparse signal. Mathematically, the compressed-encrypted signal (y) is given by y=Φ x. The signal thus obtained is not sparse. The resultant signal (y) is sent to the server. It is important to note that the random matrix (Φ), which acts as secret key,is not sent along with the cipher text. The proposed method is shown in Algorithm1. Algorithm 1: CS based Convergent Encryption Input: File Selected Output: File Uploaded to Cloud Procedure: CS based Convergent Encryption begin CS-Based-Convergent-Encryption /* select file to upload */ Sparse representation of the file (content) of order N x1 Generate Hash value of the file (content) Generate µ of chaotic based on Hash Value Generate Chaotic Measurement Matrix of order M x N Multiply chaotic measurement matrix with sparse representation of file (content) Develop an M-dimensional measurement vector end Whenever user requests the same fie, user has to perform decompress-decrypt the message. Decryption of the message is done by using a greedy algorithm (either orthogonal matching pursuit (OMP), or matching pursuit (MP), or greedy LS etc.) or convex relaxation algorithm (basis pursuit (BP)) with the following: random matrix encryption (Φ), the encrypted message (the cipher text) Y, and the base for sparsity Ψ. Any extremely small decryption error can be corrected by rounding the decrypted values to the nearest integer values because extended ASCII code is built from integers. IV. EXPERIMENTAL RESULTS This part shows simple examples of simultaneous compression–convergent encryption based on compressed sensing. Let assume that the message of the text file is TOTO JE TAJNY VZKAZ PRO BOBA (The message is in Czech with the meaning “This is a secret message for Bob”). After assigning the Extended ASCII code to each character in the message, The binary code forms a vector of length 216; 81 vector elements are non-zero so this vector has relative sparsity 0.375. It was checked experimentally that measurement matrix (generated with secret key) must have at least compression ratio 0:8 (i. e. matrix size 173 x 216) for successful reconstruction of message. V. CONCLUSIONS This paper presents a possibility of using compressed sensing for simultaneous compression International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 146 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 4. and convergent encryption. Chaotic Measurement matrix (in CS) is generated according to the hash key and it is used also for convergent encryption. Results show that this algorithm can provide good security and compression performance. REFERENCES [1] I.D. Corporation, The digital universe – are you ready? Online 2010. [2] Wen Xia., Hong jiang, Dan Feng et al., A comprehensive study of the past, present, and future of data deduplication, Proceedings of IEEE, Vol. No 104(9), (2016). [3] Madhuri Kavade, A.C. Lomte, Secure De- dulication using convergent keys (convergent cryptography) for cloud storage., International Journal of computer Applications, Vol. 126(10), (2015). [4] Adrain, Monica Fira, Marius Daniel, Compressed sensing based Encryption approach for tax forms data, International Journal of Advanced Research in Artificial Intelligence, Vol. 4(11), (2015). [5] Nanrun Zhou, Aidi Zhang, Fen Zheng, Lihua Gong, Novel image compression-encryption hybrid algorithm based on Key-controlled measurement matrix in compressive sensing, Optics & Laser Technology, Vol. 62, (2014). [6] Wang et al., Simultaneous encryption and compression of medical images based on optimized tensor compressed sensing, Bio Med Engg. online (2016). AUTHOR PROFILES M. Tanooj Kumar is presently pursuing Ph.D from Krishna University, working as Assistant professor in Department of CSE, K. L. University, Vaddeswaram. His Research interest includes Internet of Things, Information security and privacy. He is a member of IETE. Dr. M. Babu Reddy, Assistant Professor and Head of the Department (I/C), Department of Computer Science, Krishna University, Macilipatnam. Completed his Ph.D in CSE from Acharya Nagarjuna University. His Research Interest includes Software Engineering, Data Mining, Neural Networks and Machine Learning. He is a member of IEEE, CSI, ISTE and African Computational Society. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 147 https://sites.google.com/site/ijcsis/ ISSN 1947-5500