END TO END SECURITY AND EFFICIENT VIDEO DELIVERY IN ENCRYPTED NETWORK CACHING
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6
Abstract
To scale the delivery of massive volumes of videos, various new network architectures with optimizations for content-intensive applications have been proposed, such as information-centric networking (ICN) and others as surveyed. Among these proposals, one natural trend is to leverage in-network caching, i.e., storing the content in advanced network devices like cache-enabled routers. This paper proposed a novel networked system for efficient encrypted video delivery while preserving the benefits of in-network caching. As video chunks are encrypted before distribution, we first design a compact, efficient, yet encrypted video fingerprint index to empower the network with a fully controlled capability of locating the cached encrypted chunks for given encrypted requests. We then explain how to deploy the encrypted design in our proposed architecture, and present a secure redundancy elimination protocol to enable fast video delivery via leveraging cached encrypted chunks. Meanwhile, the proposed encrypted index and the secure RE protocol can flexibly work for encrypted data with different size granularity.
Authors and Affiliations
Monisha Shambhavi R, Tharcis P
END TO END SECURITY AND EFFICIENT VIDEO DELIVERY IN ENCRYPTED NETWORK CACHING
To scale the delivery of massive volumes of videos, various new network architectures with optimizations for content-intensive applications have been proposed, such as information-centric networkin...
PRIVACY PROTECTION FOR SECURE DATA ENCRYPTION IN ONLINE SOCIAL NETWORKS
Network security is an act of protecting the information from unauthorized access; it controls and monitors the security of the whole network. The threats to network security are alarmingly increasing day by...
A Patch Based Approach for the Segmentation of Pathologies: Application to Glioma Labelling
This paper proposes a novel and generic approach with multi-atlas patch-based voting techniques for addressing the fullyautomatic segmentation of brain tumors. To avoid the local search window assumption, conventional pa...
AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS
The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it ma...
A PROBABILISTIC APPROACH FOR PREDICTING ANOMALIES IN SOCIAL STREAMS
Basic presumption is that a new (emerging) topic is something people feel like discussing, commenting, or forwarding the information further to their friends. The proposed approach, spot the emergence of topics in a soci...