Ensuring trust and confidentiality for adaptive video streaming in ICN

With the dissemination of huge amount of video content over the internet, information centric networking (ICN) has emerged as a potential candidate to effectively exploit it and improve the QoS. ICN decouples content from its location by caching, which can later be retrieved by consumers from their nearest locations. Various experimental studies have depicted the performance merits of dynamic adaptive streaming via HTTP (DASH) over ICN for improving QoS. However, there are two challenges that need to be addressed in the context of DASH over an ICN environment. The first one from content consumer domain is that the relevance, integrity, and provenance (RIP) of content should be guaranteed. RIP ensures trust establishment between publisher and consumer of content. The second one that concerns the content publisher is the confidentiality of DASH media, so that any consumer can view the particular quality or resolution of video based on his designated privileged rights. We address these two mentioned issues with the context of DASH over ICN. The performance and security analysis of our scheme depict its effectiveness for enforcing access control of adaptive streaming media in an ICN environment.

[1]  Hermann Hellwagner,et al.  A scalable video coding dataset and toolchain for dynamic adaptive streaming over HTTP , 2015, MMSys.

[2]  Chang Wen Chen,et al.  Attribute-based multi-dimension scalable access control for social media sharing , 2016, 2016 IEEE International Conference on Multimedia and Expo (ICME).

[3]  Joud Khoury,et al.  An Efficient and Expressive Access Control Architecture for Content-Based Networks , 2014, 2014 IEEE Military Communications Conference.

[4]  Cong Wang,et al.  Enabling secure and effective near-duplicate detection over encrypted in-network storage , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[5]  Marina Blanton,et al.  Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.

[6]  Xiaofei Wang,et al.  Cloud-assisted adaptive video streaming and social-aware video prefetching for mobile users , 2013, IEEE Wireless Communications.

[7]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[8]  Bruno Sinopoli,et al.  A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP , 2015, Comput. Commun. Rev..

[9]  Deborah Estrin,et al.  Named Data Networking (NDN) Project , 2010 .

[10]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[11]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[12]  Hui Li,et al.  Owner Specified Excessive Access Control for Attribute Based Encryption , 2016, IEEE Access.

[13]  V. Jacobson,et al.  Securing Network Content , 2009 .

[14]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Jan Camenisch,et al.  A Signature Scheme with Efficient Protocols , 2002, SCN.

[16]  Yaning Liu,et al.  Dynamic adaptive streaming over CCN: A caching and overhead analysis , 2013, 2013 IEEE International Conference on Communications (ICC).

[17]  Jianping Wu,et al.  On adapting HTTP protocol to content centric networking , 2012, CFI.

[18]  Bengt Ahlgren,et al.  Secure Naming for a Network of Information , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[19]  Yonggang Wen,et al.  Towards name-based trust and security for content-centric network , 2011, 2011 19th IEEE International Conference on Network Protocols.

[20]  Robert H. Deng,et al.  Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks , 2013, IEEE Transactions on Multimedia.

[21]  Nikos Fotiou,et al.  A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.

[22]  Hao Yue,et al.  RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[23]  Yong Man Ro,et al.  Scalable Protection and Access Control in Full Scalable Video Coding , 2006, IWDW.

[24]  Christian Timmerer,et al.  Adaptive streaming over Content Centric Networks in mobile networks using multiple links , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[25]  Dijiang Huang,et al.  Attribute-based Access Control for ICN Naming Scheme , 2014, IEEE Transactions on Dependable and Secure Computing.

[26]  Chang Wen Chen,et al.  Secure media sharing in the cloud: Two-dimensional-scalable access control and comprehensive key management , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).

[27]  Christian Timmerer,et al.  An experimental analysis of Dynamic Adaptive Streaming over HTTP in Content Centric Networks , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[28]  Satyajayant Misra,et al.  Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[29]  Cong Wang,et al.  Toward Encrypted Cloud Media Center With Secure Deduplication , 2017, IEEE Transactions on Multimedia.

[30]  Pekka Nikander,et al.  Secure naming in information-centric networks , 2010, ReARCH '10.

[31]  Yiran Wei,et al.  Hop-by-hop adaptive video streaming in content centric network , 2016, 2016 IEEE International Conference on Communications (ICC).