Novel Video Content Encryption approach for In-Network Services

Authors

  • Puviyarasu R  Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Meenambika A  Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Gopalakrishnan H  Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Sruthi M  Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Dineshkumar U  Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India

Keywords:

Novel Video Content Encryption, Network Services, Video Service Provider, H-264, Packet Jitter, Transmission Latency, Communication Reliability, Encryption

Abstract

The modern view of multimedia communications like the video transmission and video streaming allows the people to access the stored media using the network around the world. Video streaming is a type of multimedia that is constantly received and presented to an end-user while being delivered by a video service provider or sender. This existing system is a secure Redundancy Elimination protocol to leverage encrypted in-network caching for video delivery without knowing the underlying video content and fingerprint. In case of large media size, then the video encryption requires large video handling time and video delivery time such as transmission latency and packet transmission Jitter. In a novel video content encryption approach based on video frames, which encrypts the individual frame and attaches the corresponding macro block information by eliminating the redundant frame. It handles the videos frames using H-264 encoding model, the actual videos frame content is divided into I, P and B-frames providing the video information in terms of Intra Coded Pictures, Predicted pictures and Bi-directionally predicted pictures. The process is repeated by processing the complete file into number of video frames. The proposed frame based encryption system achieves the better performances compare to chunk based encryption in terms of Transmission latency, Communication reliability and Packet Jitter.

References

  1. Cisco, "Virtual Networking Index (VNI)," http://www.cisco.com/web/solutions/sp/vni/vni forecast highlights index.html, 2015.
  2. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman,"A survey of information-centric networking," IEEE Communications Magazine, vol. 50, no. 7, pp. 26–36, 2012.
  3. Arianfar, P. Nikander, and J. Ott, "On content-centric router designand implications," in Proc. of the ACM Re-Architecting the Internet Workshop, 2010.
  4. So, A. Narayanan, and D. Oran, "Named data networking on arouter: fast and dos-resistant forwarding with hash tables," in Proc. Of ACM IEEE ANCS, 2013.
  5. Cisco, "Cisco ASR 9000 Series Integrated Service Module,"onlineat:http://www.cisco.com/c/en/us/products/collateral/routers/asr-9000-series-aggregation-services-routers/data sheet c78-663164.pdf, 2012.
  6. Psaras, W. K. Chai, and G. Pavlou, "Probabilistic in-network cachingfor information-centric networks," in Proc. of the second edition of the ACM ICN workshop on Information-centric networking, 2012.
  7. Perino, M. Varvello, and K. P. Puttaswamy, "ICN-RE: redundancy elimination for information-centric networking," in Proc. of the second edition of the ICN workshop on Information-centric networking, 2012.
  8. Chanda and C. Westphal, "Contentflow: Mapping content to flows in software defined networks," in Proc. of IEEE Globecom, 2013.
  9. Sun, S. K. Fayaz, Y. Guo, V. Sekar, Y. Jin, M. A. Kaafar, and S. Uhlig, "Trace-driven analysis of icn caching algorithms on video-on-demand workloads," in Proc. of ACM CoNEXT, 2014.
  10. A. Jagadeesan, R. Pal, K. Nadikuditi, Y. Huang, E. Shi, and M. Yu, "A secure computation framework for sdns," in Proc. of ACM HotSDN,2014.
  11. Wang, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, "Steal this movie: Automatically bypassing drm protection in streaming media services."in Proc. of USENIX Security, 2013.
  12. Misra, R. Tourani, and N. E. Majd, "Secure content delivery in information-centric networks: design, implementation, and analyses," in Proc. of the 3rd ACM SIGCOMM workshop on Information-centric networking, 2013.
  13. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu, "When HTTPS meets CDN: A case of authentication in delegated service," in Proc. Of IEEE S&P, 2014.
  14. Angius, C. Westphal, M. Gerla, and G. Pau, "Drop dead data: What to expect securing data instead of channels," in Proc. of IEEE CCNC,2015.
  15. Dorwin, A. Bateman, and M. Watson, "W3c editor’s draft: Encrypted media extensions," on line at: https://w3c.github.io/encrypted-media/, 2015.
  16. Sherry, C. Lan, A. R. P. Popa, and S. Ratnasamy, "Blindbox: Deep packet inspection for encrypted traffic," in Proc. of ACM SIGCOMM,2015.
  17. ISO/IEC 23009-1:2014, "Information technology – Dynamic adaptive streaming over HTTP (DASH) – Part 1: Media presentation description and segment formats," 2014.
  18. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," Journal of Computer Security, vol. 19, no. 5, pp. 895–934, 2011.
  19. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. of ACM CCS, 2012.
  20. Fan, D. G. Andersen, M. Kaminsky, and M. D. Mitzenmacher, "Cuckoo filter: Practically better than bloom," in Proc. of ACM CoNEXT,2014.
  21. ISO/IEC 23008-1:2014, "Information technology – High efficiency coding and media delivery in heterogeneous environments – Part 1:MPEG media transport (MMT)," 2014.
  22. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM TISSEC, vol. 9, no. 1, pp. 1–30, 2006.
  23. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar, "Making middleboxes someone else’s problem: network processing as a cloud service," ACM SIGCOMM Computer CommunicationReview, vol. 42, no. 4, pp. 13–24, 2012.
  24. Manfredi, F. Oliviero, and S. P. Romano, "A distributed control law for load balancing in content delivery networks," IEEE/ACM TON, vol. 21, no. 1, pp. 55–68, 2013.
  25. Wu, Z. Wei, and R. H. Deng, "Attribute-based access to scalable media in cloud-assisted content sharing networks," IEEE TMM, vol. 15, no. 4, pp. 778–788, 2013.
  26. Zheng, X. Yuan, X. Wang, J. Jiang, C. Wang, and X. Gui, "Enabling encrypted cloud media center with secure deduplication," in Proc. Of AISACCS, 2015.
  27. Lederer, C. M ¨ uller, and C. Timmerer, "Dynamic adaptive streaming over http dataset," in Proc. of the 3rd ACM Multimedia Systems Conference, 2012.
  28. Pagh and F. Rodler, "Cuckoo hashing," J. Algorithms, vol. 51, no. 2, pp. 122–144, 2004.
  29. Zhang, A. Afanasyev, J. Burke, V. Jacobson, P. Crowley, C. Papadopoulos, L. Wang, B. Zhang et al., "Named data networking," ACM SIGCOMM Computer Communication Review, vol. 44, no. 3, pp. 66–73,2014.
  30. Ghodsi, S. Shenker, T. Koponen, A. Singla, B. Raghavan, and J. Wilcox, "Information-centric networking: seeing the forest for the trees," in Proc. of ACM HotNets, 2011.
  31. K. Adhikari, Y. Guo, F. Hao, M. Varvello, V. Hilt, M. Steiner, and Z.-L. Zhang, "Unreeling netflix: Understanding and improving multi-cdn movie delivery," in Proc. of IEEE INFOCOM, 2012.
  32. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, "Dynamic searchable encryption in very large databases: Data structures and implementation," in Proc. of NDSS, 2014.
  33. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of ACM CCS, 2006.
  34. V. Kilroy Hughes, David Singer, "ISO/IEC 23001-7 3nd Edition - Common encryption in ISO base media file format files," on line at: http://mpeg.chiariglione.org/standards/mpeg-b/common-encryption-iso-base-media-file-format-files, 2014.
  35. Matt Burns, "Watch out netflix, amazon instant video reaches 100,000 on-demand titles," online at: http://techcrunch.com/, 2011.
  36. T. Spring and D. Wetherall, "A protocol-independent technique for eliminating redundant network traffic," ACM SIGCOMM Computer Communication Review, vol. 30, no. 4, pp. 87–95, 2000.
  37. Anand, V. Sekar, and A. Akella, "Smartre: an architecture for coordinated network-wide redundancy elimination," in ACM SIGCOMM Computer Communication Review, vol. 39, no. 4, 2009, pp. 87–98.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Puviyarasu R, Meenambika A, Gopalakrishnan H, Sruthi M, Dineshkumar U, " Novel Video Content Encryption approach for In-Network Services, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.671-680, March-April-2017.