Content Authentication Method for Extended Home Multimedia and Personal Cloud Services

被引:0
|
作者
Kim, DaeYoub [1 ]
Lee, Jihoon [1 ]
Huh, Misuk [1 ]
Kim, Eunah [1 ]
机构
[1] Samsung Elect, SAIT, Hwasung City, South Korea
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For efficient and easy content sharing between consumer devices, various network technologies like Peer-to-Peer (P2P) and DLNA have been applied to content sharing services. Recently, as content-centric networking (CCN) comes into the spotlight as a future Internet architecture, CCN-based content sharing model like a virtual personal community service was newly introduced. One of the main characteristics of both P2P and CCN is to make it possible to retrieve contents host-independently by separating identity from location. Since such a characteristic also makes it possible that a content object can be delivered from unspecified devices/hosts with the replicas of the content object, receivers can't confirm the practical providers of the received content object. Hence, it is always a hot issue how to check the correctness and the integrity of a content object which is sent from the unknown devices/hosts. In this paper, we propose a content authentication method using bit-XOR operation in order that users can authenticate a content objet transmitted through P2P/CCN. The performance analysis shows that the proposed scheme can reduce both computation and communication overheads so that it can be applied to mobile environments as well as home media services.
引用
收藏
页码:51 / 52
页数:2
相关论文
共 50 条
  • [31] Authentication protocols with nonrepudiation services in personal communication systems
    Lin, HY
    Harn, L
    [J]. IEEE COMMUNICATIONS LETTERS, 1999, 3 (08) : 236 - 238
  • [32] Limitations and requirements of content-based multimedia authentication systems
    Wu, CW
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 241 - 252
  • [33] An SLA Evaluator for Multimedia Content Adaptation Services
    Fudzee, Mohd Farhan Md
    Mohamed, Juliana
    Kasim, Shahreen
    Ismail, Mohd Norasri
    Abawajy, Jemal
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,
  • [34] Joint content authentication and error control for wireless multimedia communications
    Yu, HH
    Yin, P
    Yu, XL
    [J]. CCNC 2004: 1ST IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, PROCEEDINGS: CONSUMER NETWORKING: CLOSING THE DIGITAL DIVIDE, 2004, : 412 - 417
  • [35] Compensated signature embedding based multimedia content authentication system
    Ababneh, Sufyan
    Khokhar, Ashfaq
    Ansari, Rashid
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 393 - 396
  • [36] Dual watermarking framework for privacy protection and content authentication of multimedia
    Hurrah, Nasir N.
    Parah, Shabir A.
    Loan, Nazir A.
    Sheikh, Javaid A.
    Elhoseny, Mohammad
    Muhammad, Khan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 654 - 673
  • [37] A system for end-to-end authentication of adaptive multimedia content
    Suzuki, T
    Ramzan, Z
    Fujimoto, H
    Gentry, C
    Nakayama, T
    Jain, R
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 237 - 249
  • [38] Using multimedia content in intelligent mobile services
    Koch, F
    Sonenberg, L
    [J]. WEBMEDIA & LA-WEB 2004, VOL 1, PROCEEDINGS, 2004, : 41 - 43
  • [39] A Novel Graphical Password Authentication Mechanism for Cloud Services
    Rao, M. Kameswara
    Switha, T. Usha
    Naveen, S.
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, INDIA 2016, 2016, 433 : 447 - 453
  • [40] Development of Authentication Process when Accessing Cloud Services
    Oksiiuk, Oleksandr
    Chaikovska, Vladyslava
    [J]. 2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 604 - 607