1 / 10

Adding Confidentiality to Pull-based Peer-to-Peer Live Streaming

Adding Confidentiality to Pull-based Peer-to-Peer Live Streaming. Authors: Jian-Guang Luo, Jiang Zhang, and Shi-Qiang Yang Source: 5th IEEE Consumer Communications and Networking Conference, pp. 500-504, 2008 Speaker: Shu-Fen Chiou( 邱淑芬 ). Motivation.

Download Presentation

Adding Confidentiality to Pull-based Peer-to-Peer Live Streaming

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Adding Confidentiality to Pull-based Peer-to-PeerLive Streaming Authors: Jian-Guang Luo, Jiang Zhang, and Shi-Qiang Yang Source: 5th IEEE Consumer Communications and Networking Conference, pp. 500-504, 2008 Speaker: Shu-Fen Chiou(邱淑芬)

  2. Motivation • P2P影音串流(P2P live streaming)目前是一種很盛行的服務(PPStream, PPLive),因此延伸出一些安全性的問題。 • 本篇論文就是要將confidentiality加入以維護安全。

  3. Requirements • Hybrid P2P • Key management • Confidentiality • Reliability • Scalability

  4. P2P Environment Group key: GK GC U P2 new client P1 P3 P5 P4 P6

  5. Notataions

  6. Member Join Members in group U GC JOIN request Authentication U Generate IDU EKU-GC(IDU||ESKGC(IDU||PKU)), member_info Generate join flag JF Generate New GKi+1 EKU-GC(SN_change_block||GKi+1 ||SGC(GKi+1)) JF||IDU||ESKGC(IDU||PKU)||PKU <SN_change_block, EGKi(GKi+1||SGC(GKi+1)> • SN_change_block: a sequential number

  7. Member Leave Partner V U GC Generate leaving flag LF LF||IDU||ESKGC(IDU||PKU)||PKU QUIT request Generate New GKi+1 <SN_change_block, EKGC-V(GKi+1||SGC(GKi+1)> Decrypt and get GKi+1

  8. Batch scheme

  9. 優缺點 • 優點: • Key的產生方式簡單,計算複雜度低 • 達到基本的安全 • 缺點: • 每當有一個user要加入或離開時,GC就必須重新計算key,並分布給其他的member.

  10. 可能研究方向 • 本篇的方法已有前提假設user已註冊,因要加入時GC可以認證.因此未來在考量時應從註冊的步驟開始設計. • 利用hash-chain的觀念,並要達到forward 和backward secrecy. • 加入DRM的模式.

More Related