Open Access
ARTICLE
Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map
1 Department of Data Science and Business Systems, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Chennai, 603203, India
2 School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, 600127, India
3 Department of Industrial and Systems Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia
* Corresponding Author: Areej Malibari. Email:
Computers, Materials & Continua 2023, 74(3), 6703-6717. https://doi.org/10.32604/cmc.2023.030648
Received 30 March 2022; Accepted 11 May 2022; Issue published 28 December 2022
Abstract
With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts of data. The major concerns in this domain are security and privacy. Therefore, attaining a reliable level of confidentiality in the fog computing environment is a pivotal task. Among different types of data stored in the fog, the 3D point and mesh fog data are increasingly popular in recent days, due to the growth of 3D modelling and 3D printing technologies. Hence, in this research, we propose a novel scheme for preserving the privacy of 3D point and mesh fog data. Chaotic Cat map-based data encryption is a recently trending research area due to its unique properties like pseudo-randomness, deterministic nature, sensitivity to initial conditions, ergodicity, etc. To boost encryption efficiency significantly, in this work, we propose a novel Chaotic Cat map. The sequence generated by this map is used to transform the coordinates of the fog data. The improved range of the proposed map is depicted using bifurcation analysis. The quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate entropy. We also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical attack. The experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.