A fully private video on-Demand service

Video on-Demand services and other related applications have gained the utmost attention recently due to the growth of Internet and the development of streaming protocols. However, in these systems, where privacy and confidentiality are sensitive, many security aspects must be addressed. In this paper we propose a fully private video on-demand protocol that allows clients to preserve their privacy while enquiring a video store, and enables service providers to deny access for intruders or unauthorized clients. We evaluate the performance of our new protocol and show that it achieves the set objectives.

[1]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[2]  Khalil El-Khatib,et al.  A Secure Database System using Homomorphic Encryption Schemes , 2011, DBKDA 2011.

[3]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[4]  Sushil Jajodia,et al.  Achieving simultaneous distribution control and privacy protection for Internet media delivery , 2008, TOMCCAP.

[5]  Chuang Lin,et al.  VCNF: A Secure Video Conferencing System Based on P2P Technology , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[6]  Chuang Lin,et al.  TrustStream: a novel secure and scalable media streaming architecture , 2005, MULTIMEDIA '05.

[7]  Jian Zhao,et al.  Audio-visual privacy protection for video conference , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[8]  Lei Chen,et al.  Multi-level secure video streaming over SRTP , 2005, ACM Southeast Regional Conference.

[9]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[10]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[11]  Shiguo Lian,et al.  Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..

[12]  K. Srinathan,et al.  Fast and Secure Real-Time Video Encryption , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.

[13]  Khalil El-Khatib,et al.  Encrypted processes for oblivious data retrieval , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[14]  C. N. Zhang,et al.  A secure video on demand system , 1995, IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing. Proceedings.

[15]  Hartmut König,et al.  A novel encryption algorithm for high resolution video , 2005, NOSSDAV '05.

[16]  Qi Tian,et al.  A Secure and Robust Authentication Scheme for Video Transcoding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Sung Bum Pan,et al.  Privacy Protection Technology in Video Surveillance System , 2009, 2009 Fourth International Conference on Embedded and Multimedia Computing.

[18]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[19]  Elisa Bertino,et al.  An access control model for video database systems , 2000, CIKM '00.

[20]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .