Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure

Massive Internet media distribution demands pro longed continuous consumption of networking and disk band widths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without protection on the Internet, content providers are hesitant to use existing fast distribution techniques. Second, little has been done to protect client privacy during client accesses. Straightforward solutions to address these two issues independently lead to conflicts. For example, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this paper, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms for cooperative proxies where our proposed scheme works practically. Simulation results show that our proposed strategy is efficient

[1]  Songqing Chen,et al.  An Empirical Study of a Segment-Based Streaming Proxy in an Enterprise Environment , 2004, WCW.

[2]  Antonio Ortega,et al.  Scalable proxy caching of video under storage constraints , 2002, IEEE J. Sel. Areas Commun..

[3]  Hermann Hellwagner,et al.  Architecture of a quality based intelligent proxy (QBIX) for MPEG-4 videos , 2003, WWW '03.

[4]  David K. Y. Yau,et al.  A case for a multi-key secure video proxy: theory, design, and implementation , 2002, MULTIMEDIA '02.

[5]  Yuval Ishai,et al.  Protecting data privacy in private information retrieval schemes , 1998, STOC '98.

[6]  Katherine Guo,et al.  Silo, rainbow, and caching token: schemes for scalable, fault tolerant stream caching , 2002, IEEE J. Sel. Areas Commun..

[7]  Dan Boneh,et al.  A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.

[8]  Alan Kai-Hau Yeung,et al.  Partial video sequence caching scheme for VOD systems with heterogeneous clients , 1997, Proceedings 13th International Conference on Data Engineering.

[9]  Bharat K. Bhargava,et al.  A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.

[10]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[11]  Alan Kai-Hau Yeung,et al.  Partial video sequence caching scheme for VOD systems with heterogeneous clients , 1998, IEEE Trans. Ind. Electron..

[12]  Robert H. Deng,et al.  An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods , 2000, ICISC.

[13]  Zhi-Li Zhang,et al.  Video staging: a proxy-server-based approach to end-to-end video delivery over wide-area networks , 2000, TNET.

[14]  Robert H. Deng,et al.  Secure and Private Distribution of Online Video and Some Related Cryptographic Issues , 2001, ACISP.

[15]  Songwu Lu,et al.  Commutative cipher based en-route filtering in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[16]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[17]  Feng Bao,et al.  Collusion attack on a multi-key secure video proxy scheme , 2004, MULTIMEDIA '04.

[18]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[19]  Deborah Estrin,et al.  Multimedia proxy caching mechanism for quality adaptive streaming applications in the Internet , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[20]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[21]  Ralf Steinmetz,et al.  Protecting VoD the easier way , 1998, MULTIMEDIA '98.

[22]  Donald F. Towsley,et al.  Proxy prefix caching for multimedia streams , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[23]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[24]  Jussi Kangasharju,et al.  Distributing layered encoded video through caches , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[25]  Philip S. Yu,et al.  Segment-based proxy caching of multimedia streams , 2001, WWW '01.

[26]  Yiannis Tsiounis,et al.  On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.

[27]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[28]  Jean-Sébastien Coron,et al.  On the Security of RSA Padding , 1999, CRYPTO.

[29]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..