An Adaptive Resource Allocation Strategy for Cloud based Video Streaming

Authors(2) :-Jayashree M. M, P. Damodharan

This paper is on video streaming using multiple resources. An adaptive scheme is applied to perform the resource allocation in terms of bandwidth and video memory in cloud based video streaming. Advances and commoditization of media generation devices enable capturing and sharing of any special event by multiple attendees. We propose a novel system to collect individual video streams (views) captured for the same event by multiple attendees, and combine them into multi-view videos, where viewers can watch the event from various angles, taking crowdsourced media streaming to a new immersive level. The simulation results demonstrate that this scheme generates an optimal and adaptive solution for resource allocation.

Authors and Affiliations

Jayashree M. M
PG Student, Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
P. Damodharan
Associate Professor, Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India

Cloud Computing, Video streaming, MultiView, Cloud based Streaming (CBS)

  1. R. Wang, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, “Steal this movie: Automatically bypassing drm protection in streaming media services.”in Proc. of USENIX Security, 2013.
  2. S. Misra, R. Tourani, and N. E. Majd, “Secure content delivery in information-centric networks: design, implementation, and analyses,” in Proc. of the 3rd ACM SIGCOMM workshop on Information-centric networking, 2013.
  3. J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu, “When HTTPS meets CDN: A case of authentication in delegated service,” in Proc. Of  IEEE S&P, 2014.
  4. F. Angius, C. Westphal, M. Gerla, and G. Pau, “Drop dead data: What to expect securing data instead of channels,” in Proc. of IEEE CCNC,2015.
  5. D. Dorwin, A. Bateman, and M. Watson, “W3c editor’s draft: Encrypted media extensions,” on line at: https://w3c.github.io/encrypted-media/, 2015.
  6. J. Sherry, C. Lan, A. R. P. Popa, and S. Ratnasamy, “Blindbox: Deep packet inspection for encrypted traffic,” in Proc. of ACM SIGCOMM,2015.
  7. ISO/IEC 23009-1:2014, “Information technology – Dynamic adaptive streaming over HTTP (DASH) – Part 1: Media presentation description and segment formats,” 2014.
  8. R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 895–934, 2011.
  9. Y. Sun, S. K. Fayaz, Y. Guo, V. Sekar, Y. Jin, M. A. Kaafar, and S. Uhlig, “Trace-driven analysis of icn caching algorithms on video-on-demand workloads,” in Proc. of ACM  CoNEXT, 2014.
  10. [10] N. A. Jagadeesan, R. Pal, K. Nadikuditi, Y. Huang, E. Shi, and M. Yu, “A secure computation framework for sdns,” in Proc. of ACM HotSDN,2014.

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 810-813
Manuscript Number : CSEIT1725191
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Jayashree M. M, P. Damodharan, "An Adaptive Resource Allocation Strategy for Cloud based Video Streaming", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.810-813, September-October-2017.
Journal URL : http://ijsrcseit.com/CSEIT1725191

Article Preview

Follow Us

Contact Us