Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems

被引:0
|
作者
Deng, Robert H. [1 ]
Yang, Yanjiang [1 ]
机构
[1] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia content delivery. However, not much effort has been spent on the security issues in such systems. In this paper, we study data authentication in multimedia content delivery, and in particular, we focus on achieving end-to-end authentication from the multimedia server to end users in the server-proxy-user architecture where intermediary proxies transcode multimedia content dynamically. We present a formal model for the end-to-end authentication problem, and propose a basic construction for generic data modality and prove its security. We further extend and tailor our basic technique to authenticate specific multimedia format, JPEG2000 code-streams.
引用
收藏
页码:284 / +
页数:4
相关论文
共 50 条
  • [31] On achieving weighted service differentiation: An end-to-end perspective
    Hsieh, HY
    Kim, KH
    Sivakumar, R
    [J]. QUALITY OF SERVICE - IWQOS 2003, PROCEEDINGS, 2003, 2707 : 440 - 457
  • [32] A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems
    Genge, Bela
    Haller, Piroska
    Duka, Adrian-Vasile
    Sandor, Hunor
    [J]. AT-AUTOMATISIERUNGSTECHNIK, 2019, 67 (05) : 417 - 428
  • [33] Achieving High End-to-End Availability in VNF Networks
    Rodicio, Enrique
    Pan, Deng
    Liu, Jason
    Tang, Bin
    [J]. 2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [34] Measuring User-perceived End-to-end Delays In Geographically Distributed Multimedia Systems
    Beifuss, Alexander
    Wolfinger, Bernd E.
    [J]. 2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
  • [35] An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
    Nashwan, Shadi
    Nashwan, Imad I. H.
    [J]. SENSORS, 2021, 21 (15)
  • [36] Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP
    Buschsieweke, Marian
    Guenes, Mesut
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [37] Achieving AI-Enabled Robust End-to-End Quality of Experience Over Backhaul Radio Access Networks
    Roy, Dibbendu
    Rao, Aravinda S.
    Alpcan, Tansu
    Das, Goutam
    Palaniswami, Marimuthu
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (03) : 1468 - 1481
  • [38] Comparison of geometrical accuracy of different SRS delivery systems with end-to-end tests
    Stelczer, G.
    Szegedi, D.
    Major, T.
    Polgar, C.
    Pesznyak, C.
    [J]. RADIOTHERAPY AND ONCOLOGY, 2019, 133 : S948 - S949
  • [39] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [40] End-to-End Message Authentication Using CoAP Over IoT
    Singhal, Prateek
    Sharma, Puneet
    Hazela, Bramah
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 279 - 288