Welcome to Scholar Publishing Group

Distributed Processing System, 2021, 2(2); doi: 10.38007/DPS.2021.020201.

Design and Implementation of Distributed System Platform Based on Chaos Theory and Encryption Algorithm

Author(s)

Michele Settanni

Corresponding Author:
Michele Settanni
Affiliation(s)

Univ Fed Rio Grande do Sul, Informat Inst, Av Bento Goncalves 9500, Porto Alegre, RS, Brazil

Abstract

Image information is stored and transmitted more and more frequently in the public network. How to protect information security becomes particularly important. Because the image data has the characteristics of high redundancy and high correlation between adjacent pixels, the traditional encryption scheme is no longer suitable for image encryption. As a deterministic nonlinear system, chaotic system has many excellent characteristics, which makes it very suitable for image encryption. This paper designs a distributed system platform by combining encryption algorithm and chaos theory, which can solve the security problem of the platform. After testing and analyzing the system platform, the functions of the platform can run stably and the performance is normal.

Keywords

Chaos theory, Encryption Algorithm, Distributed System, Image Encryption

Cite This Paper

Michele Settanni. Design and Implementation of Distributed System Platform Based on Chaos Theory and Encryption Algorithm . Distributed Processing System (2021), Vol. 2, Issue 2: 1-8. https://doi.org/10.38007/DPS.2021.020201.

References

[1] Goldstein A, Kislyakov S, Fenomenov M. Chaos Theory Methods for Contact-Center Dinamic Control. Proceedings of Telecommunication Universities, 2021, 7(2):18-23.

[2] Taylor P. How Chaos Theory is Changing Management Tech. ITNOW, 2021, 63(3):58-59.

[3] Vzhytynska K Y. Chaos Theory In The Business Space. Collection of Scientific Publications NUS, 2021(1):106-110.

[4] Bhardwaj K K, Banyal S, Sharma D K. Probabilistic routing protocol with firefly particle swarm optimisation for delay tolerant networks enhanced with chaos theory. International Journal of Innovative Computing and Applications, 2021, 12(2/3):123.

[5] Rusu-Anghel S, Mezinescu S S, Lihaciu I C. Experimental stand and researches on pantograph-catenary contact force control using chaos theory. Journal of Physics: Conference Series, 2021, 1781(1):012029-.

[6] Cha D S, Kim K I. Evaluation of the Validity of Chaos Theory Based on Systems Thinking for Non-Physicists. Open Journal of Applied Sciences, 2021, 12(5):10.

[7] Pedraza A, Deniz O, Bueno G. Approaching Adversarial Example Classification with Chaos Theory. Entropy, 2020, 22(11):1201.

[8] Postavaru O, Anton S R, Toma A. COVID-19 pandemic and chaos theory. Mathematics and Computers in Simulation, 2021, 181:138-149.

[9] Hanweck G A. Identifying House Price Booms, Bubbles and Busts: A Disequilibrium Analysis from Chaos Theory. Journal of Mathematical Finance, 2020, 10(3):448-463.

[10] Alshammari B. Cryptanalysis of a Bilateral-Diffusion image encryption algorithm based on dynamical compound chaos. Przeglad Elektrotechniczny, 2021, 1(1):130-133.

[11] Hamamreh R, Tabib E. Selective Image Compression-Encryption Algorithm Using Adaptive Huffman Coding And Aes. Journal of Theoretical and Applied Information Technology, 2021, 99(4):932-945.

[12] Hussien F, Rahma A, Wahab H. A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites. Security and Communication Networks, 2021, 2021(6):1-15.

[13] Sun J. 2D-SCMCI hyperchaotic map for image encryption algorithm. IEEE Access, 2021, PP(99):1-1.

[14] Elghandour A N, Salah A M, Elmasry Y A, et al. An Image Encryption Algorithm Based on Bisection Method and One-Dimensional Piecewise Chaotic Map. IEEE Access, 2021, PP(99):1-1.

[15] Rekha C, Krishnamurthy G N. An optimized encryption algorithm and F function with dynamic substitution for creating S-box and P-box entries for blowfish algorithm. Computer Science and Information Technologies, 2021, 2(1):16-25.

[16] Thomas A, Narasimhan V L. Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment. International Journal of Natural Computing Research, 2021, 10(2):21-41.

[17] Kamal S T, Hosny K M, Elgindy T M, et al. A New Image Encryption Algorithm for Grey and Color Medical Images. IEEE Access, 2021, PP(99):1-1.

[18] Zoss B M, Mateo D, Kuan Y K, et al. Distributed system of autonomous buoys for scalable deployment and monitoring of large waterbodies. Autonomous Robots, 2018(11):1669-1689.