An Adaptive Resource Allocation Strategy for Cloud based Video Streaming

Authors

  • Jayashree M. M  PG Student, Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • P. Damodharan  Associate Professor, Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India

Keywords:

Cloud Computing, Video streaming, MultiView, Cloud based Streaming (CBS)

Abstract

This paper is on video streaming using multiple resources. An adaptive scheme is applied to perform the resource allocation in terms of bandwidth and video memory in cloud based video streaming. Advances and commoditization of media generation devices enable capturing and sharing of any special event by multiple attendees. We propose a novel system to collect individual video streams (views) captured for the same event by multiple attendees, and combine them into multi-view videos, where viewers can watch the event from various angles, taking crowdsourced media streaming to a new immersive level. The simulation results demonstrate that this scheme generates an optimal and adaptive solution for resource allocation.

References

  1. R. Wang, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, “Steal this movie: Automatically bypassing drm protection in streaming media services.”in Proc. of USENIX Security, 2013.
  2. S. Misra, R. Tourani, and N. E. Majd, “Secure content delivery in information-centric networks: design, implementation, and analyses,” in Proc. of the 3rd ACM SIGCOMM workshop on Information-centric networking, 2013.
  3. J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu, “When HTTPS meets CDN: A case of authentication in delegated service,” in Proc. Of  IEEE S&P, 2014.
  4. F. Angius, C. Westphal, M. Gerla, and G. Pau, “Drop dead data: What to expect securing data instead of channels,” in Proc. of IEEE CCNC,2015.
  5. D. Dorwin, A. Bateman, and M. Watson, “W3c editor’s draft: Encrypted media extensions,” on line at: https://w3c.github.io/encrypted-media/, 2015.
  6. J. Sherry, C. Lan, A. R. P. Popa, and S. Ratnasamy, “Blindbox: Deep packet inspection for encrypted traffic,” in Proc. of ACM SIGCOMM,2015.
  7. ISO/IEC 23009-1:2014, “Information technology – Dynamic adaptive streaming over HTTP (DASH) – Part 1: Media presentation description and segment formats,” 2014.
  8. R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 895–934, 2011.
  9. Y. Sun, S. K. Fayaz, Y. Guo, V. Sekar, Y. Jin, M. A. Kaafar, and S. Uhlig, “Trace-driven analysis of icn caching algorithms on video-on-demand workloads,” in Proc. of ACM  CoNEXT, 2014.
  10. [10] N. A. Jagadeesan, R. Pal, K. Nadikuditi, Y. Huang, E. Shi, and M. Yu, “A secure computation framework for sdns,” in Proc. of ACM HotSDN,2014.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Jayashree M. M, P. Damodharan, " An Adaptive Resource Allocation Strategy for Cloud based Video Streaming, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.810-813, September-October-2017.