A SURVEY ON REDUNDANT ELIMINATION [RE] PROTOCOL FOR AVOID COLLUSION ATTACK VIDEO DELIVERY

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6

Abstract

Now a days video delivery is the major challenging issue because during the time of video access arises the various issues such as the collusion attack, redundant traffic and security problem. Our proposed framework provides solution for the problem mentioned above by using In-Network Caching systems. Our method provides the secure accessing of video by using of finger print of user. Here the finger print is captured in the form of finger print index. Our frame work provides the security for video chunks by using cryptographic method. In this method we first splits the video into chunks and then the video chunks are encrypted after encryption of video chunks are stored in server. Second, our method gives the redundant free video access by the Redundant Elimination protocol [RE]. This protocol provides the secure identification of encrypted video chunks and requested finger print index. Here we eliminate the collusion attack in network during video delivery by using RE protocol. Finally the performance analyze of secure video delivery and delivery time of different video chunks by the plot between the parameter as video delivery time and number of chunks.

Authors and Affiliations

Sundar C, Balakrishnan L

Keywords

Related Articles

ROLE OF HUMAN RESOURCES DEPARTMENT IN CORPORATE GOVERNANCE/ CORPORATE SOCIAL RESPONSIBILITY

The terms “Corporate governance” is a new buzzword of the 21P st P century. In fact the word “governance” is used for addressing all the issues. Generally the word “governance” is used for governing the country or a stat...

A Survey on IDS for Wireless Networks

Now a days the usage of electronic network is quickly increased thus there has been increase of various network attacks like active attack, passive attacks etc. several data processing techniques are projected for mining...

A Statistical Pattern Recognition Approach for Tracking Left Ventricle Endocardium

The Left Ventricle endocardium has a difficult problem can be determined by a new statistical pattern recognition approach. In this pattern, resampling algorithm along with the current time step is estimated and appearan...

AN INTEGRATED FRAMEWORK FOR PARALLEL TRAINING AND CLASSIFICATION OF ECG SIGNAL

Recently, various techniques are developed to analyze and classify the Electrocardiograph (ECG) signal to know the threaten results. Many real time development tools such as VLSI, DSP, etc., are availabl...

QR Code Authentication Based Goods Delivery System

This application is for, order checking between delivery boy and the customer. If the customer order some goods in a particular company/ industry means, the order information such as customer name, address, amount, numbe...

Download PDF file
  • EP ID EP369917
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Sundar C, Balakrishnan L (2016). A SURVEY ON REDUNDANT ELIMINATION [RE] PROTOCOL FOR AVOID COLLUSION ATTACK VIDEO DELIVERY. Elysium Journal of Engineering Research and Management, 4(6), -. https://europub.co.uk/articles/-A-369917