sStream: Peer-to-Peer Live Streaming with Efficient User Authentication and Key Management

Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new momentum to the Internet streaming, which has been shown to be cost effective, scalable and easy to deploy. However, before these applications can be successfully and commercially deployed, it is very significant to achieve efficient access control mechanisms. Based our earlier research of secure streaming architecture of TrustStream, this work continues in-depth study on how to ensure that only the authorized users can access the correct media in p2p live streaming systems by adopting proposed user authentication and key management schemes. The main properties of presented secure systems include: i) the management server issues each authorized user a unique public- key certificate for other participant verifying its legal identity; ii) the lifetime of issued certificate is based upon media content instead of host's system time; iii) one-way hash-chain technique is employed to extend the certificate's lifetime; iv) the media is encrypted by the session key (SK) and then delivered to the communication group members; v) the SK is updated periodically and irrespective of clients' behaviors; vi) the re- keying messages are selectively distributed to legitimate users via the p2p overlay network. Moreover, the analysis shows the efficiency, scalability and robustness of given schemes in p2p live streaming systems, named "sStream".

[1]  Bo Li,et al.  CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Hui Zhang,et al.  A case for end system multicast (keynote address) , 2000, SIGMETRICS '00.

[3]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[4]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[5]  Srinivasan Seshan,et al.  A case for end system multicast , 2002, IEEE J. Sel. Areas Commun..

[6]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[7]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[8]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[9]  Bobby Bhattacharjee,et al.  Scalable application layer multicast , 2002, SIGCOMM '02.

[10]  Chuang Lin,et al.  EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming , 2006, PCM.

[11]  Burton S. Kaliski,et al.  PKCS #1: RSA Encryption Version 1.5 , 1998, RFC.

[12]  Sushil Jajodia,et al.  Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution , 2005, ACNS.

[13]  Chuang Lin,et al.  TrustStream: a novel secure and scalable media streaming architecture , 2005, MULTIMEDIA '05.

[14]  Yunhao Liu,et al.  AnySee: Peer-to-Peer Live Streaming , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[15]  K. J. Ray Liu,et al.  Key management and distribution for secure multimedia multicast , 2003, IEEE Trans. Multim..

[16]  Jonas Åslund Authentication in peer-to-peer systems , 2002 .

[17]  Li Zhao,et al.  Gridmedia: A Multi-Sender Based Peer-to-Peer Multicast System for Video Streaming , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[18]  Bo Li,et al.  Peer-to-peer live video streaming on the internet: issues, existing approaches, and challenges [Peer-to-Peer Multimedia Streaming] , 2007, IEEE Communications Magazine.

[19]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[20]  Mark Handley,et al.  Application-Level Multicast Using Content-Addressable Networks , 2001, Networked Group Communication.