A SURVEY ON REDUNDANT ELIMINATION [RE] PROTOCOL FOR AVOID COLLUSION ATTACK VIDEO DELIVERY
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6
Abstract
Now a days video delivery is the major challenging issue because during the time of video access arises the various issues such as the collusion attack, redundant traffic and security problem. Our proposed framework provides solution for the problem mentioned above by using In-Network Caching systems. Our method provides the secure accessing of video by using of finger print of user. Here the finger print is captured in the form of finger print index. Our frame work provides the security for video chunks by using cryptographic method. In this method we first splits the video into chunks and then the video chunks are encrypted after encryption of video chunks are stored in server. Second, our method gives the redundant free video access by the Redundant Elimination protocol [RE]. This protocol provides the secure identification of encrypted video chunks and requested finger print index. Here we eliminate the collusion attack in network during video delivery by using RE protocol. Finally the performance analyze of secure video delivery and delivery time of different video chunks by the plot between the parameter as video delivery time and number of chunks.
Authors and Affiliations
Sundar C, Balakrishnan L
LOW LOSS AND WIDE BAND TRAPEZOID BASED MONO- POLE UWB ANTENNA DESIGN
Currently highly directive antennas on the market can be choice from as tiny as fifty greenbacks to hundreds of dollars. The gained of these antennas, ranges between since 8dBi into 20dBi. A...
AN EFFICIENT ACTIVITY TRACKING AND RECOGNITION USING THE NEURAL NETWORK CLASSIFIER
A continuous video contains two important components such as tracks of the person in the video, and localization of the actions that are performed by the actors. The analysis of the activity is used for so...
NFC SIGNALS BASED ON AN EFFECTIVE MOBILE ROBOT LOCALIZATION
A Complete Localization system for an indoor self - ruled vehicle equipped with Near Field Communication (NFC) reader to Interrogate tags located on the environment. Phase Measurement for real t...
A STUDY ON EMPLOYEE EXPECTATION ON JOB RETENTION
Employee retention is an important challenge faced by Indian corporate. Many research studies has shown that there is enormous requirement for trained professionals across global, which has resulted in leaving t...
PERFORMANCE ANALYSIS OF K-MEANS ALGORITHMS IN WEBLOG DATA
Web mining is used to discover interest patterns which can be applied to many real world problems like refining web sites, better understanding the user behavior, product approval etc. Data mining sof...