Abstract
The exponential growth in security and storage requirements has led to increasing demand for high-performance solutions, particularly in managing large-scale data objects such as big binaries. Virtual Machines (VMs), a prime example of such binaries, are widely employed across desktops and dynamic server environments to deliver isolated execution contexts while minimizing hardware overhead. However, the proliferation of big binaries imposes significant challenges on both storage infrastructure and secure data transmission mechanisms. To address these issues, this paper proposes a novel "Combined Big Binaries Compression and Encryption" (CBBCE) scheme that jointly performs compression and encryption in a unified framework. The proposed approach integrates Lempel–Ziv–Markov chain algorithm (LZMA) for efficient compression with a stream cipher-like encryption mechanism. A chaotic logistic map is employed as a key-controlled pseudorandom bitstream generator due to its high sensitivity to initial conditions, ergodicity, and long-period randomness. The compressed data stream is subsequently encrypted using this pseudorandom sequence to ensure confidentiality. Experimental evaluations demonstrate that the CBBCE approach achieves competitive compression ratios and enhanced security properties when compared to conventional sequential compression-then-encryption schemes. The proposed method is particularly well-suited for secure storage and transmission of large binary files, offering an effective trade-off between performance, security, and storage efficiency.
Keywords
chaos
compression
encryption
secure compression
compression and encryption
big binaries
virtual machines
Data Availability Statement
Data will be made available on request.
Funding
This work was supported without any funding.
Conflicts of Interest
The authors declare no conflicts of interest.
Ethical Approval and Consent to Participate
Not applicable.
Cite This Article
APA Style
Usama, M., & Ahmad, J. (2025). Joint Compression and Encryption of Virtual Machine Images Using LZMA and Chaotic Maps. ICCK Transactions on Information Security and Cryptography, 1(1), 3–12. https://doi.org/10.62762/TISC.2025.148753
Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and Permissions
Institute of Central Computation and Knowledge (ICCK) or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.