An Adaptive Resource Allocation Strategy for Cloud based Video Streaming
Keywords:
Cloud Computing, Video streaming, MultiView, Cloud based Streaming (CBS)Abstract
This paper is on video streaming using multiple resources. An adaptive scheme is applied to perform the resource allocation in terms of bandwidth and video memory in cloud based video streaming. Advances and commoditization of media generation devices enable capturing and sharing of any special event by multiple attendees. We propose a novel system to collect individual video streams (views) captured for the same event by multiple attendees, and combine them into multi-view videos, where viewers can watch the event from various angles, taking crowdsourced media streaming to a new immersive level. The simulation results demonstrate that this scheme generates an optimal and adaptive solution for resource allocation.
References
- R. Wang, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, “Steal this movie: Automatically bypassing drm protection in streaming media services.”in Proc. of USENIX Security, 2013.
- S. Misra, R. Tourani, and N. E. Majd, “Secure content delivery in information-centric networks: design, implementation, and analyses,” in Proc. of the 3rd ACM SIGCOMM workshop on Information-centric networking, 2013.
- J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu, “When HTTPS meets CDN: A case of authentication in delegated service,” in Proc. Of IEEE S&P, 2014.
- F. Angius, C. Westphal, M. Gerla, and G. Pau, “Drop dead data: What to expect securing data instead of channels,” in Proc. of IEEE CCNC,2015.
- D. Dorwin, A. Bateman, and M. Watson, “W3c editor’s draft: Encrypted media extensions,” on line at: https://w3c.github.io/encrypted-media/, 2015.
- J. Sherry, C. Lan, A. R. P. Popa, and S. Ratnasamy, “Blindbox: Deep packet inspection for encrypted traffic,” in Proc. of ACM SIGCOMM,2015.
- ISO/IEC 23009-1:2014, “Information technology – Dynamic adaptive streaming over HTTP (DASH) – Part 1: Media presentation description and segment formats,” 2014.
- R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 895–934, 2011.
- Y. Sun, S. K. Fayaz, Y. Guo, V. Sekar, Y. Jin, M. A. Kaafar, and S. Uhlig, “Trace-driven analysis of icn caching algorithms on video-on-demand workloads,” in Proc. of ACM CoNEXT, 2014.
- [10] N. A. Jagadeesan, R. Pal, K. Nadikuditi, Y. Huang, E. Shi, and M. Yu, “A secure computation framework for sdns,” in Proc. of ACM HotSDN,2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.