浏览全部资源
扫码关注微信
1. 中国科学技术大学中国科学院地理空间信息处理技术和应用系统重点实验室 合肥230027
2. 美国中佛罗里达大学电气工程与计算机科学系 美国佛罗里达州奥兰多32816
[ "周自飞,男,中国科学技术大学信息科学技术学院硕士生,主要研究方向为安全与隐私保护和信息中心网络。" ]
[ "牛玉坤,男,中国科学技术大学信息科学技术学院硕士生,主要研究方向为安全与隐私保护、智能电网和软件定义网络。" ]
[ "谭小彬,男,博士,中国科学技术大学信息科学技术学院副教授、硕士生导师,主要研究方向为信息安全、无线多跳网络和未来网络架构。" ]
[ "邹长春,男,博士,美国中佛罗里达大学电气工程与计算机科学系副教授、博士生导师,主要研究方向为计算和网络安全、计算机网络和网络建模与性能分析。" ]
网络出版日期:2014-09,
纸质出版日期:2014-09-20
移动端阅览
周自飞, 谭小彬, 牛玉坤, 等. 信息中心网络中授权视频访问控制[J]. 电信科学, 2014,30(9):53-60.
Zifei Zhou, Xiaobin Tan, Yukun Niu, et al. Access Control for Autborized Video in Information-Centric Networking[J]. Telecommunications science, 2014, 30(9): 53-60.
周自飞, 谭小彬, 牛玉坤, 等. 信息中心网络中授权视频访问控制[J]. 电信科学, 2014,30(9):53-60. DOI: 10.3969/j.issn.1000-0801.2014.09.008.
Zifei Zhou, Xiaobin Tan, Yukun Niu, et al. Access Control for Autborized Video in Information-Centric Networking[J]. Telecommunications science, 2014, 30(9): 53-60. DOI: 10.3969/j.issn.1000-0801.2014.09.008.
信息中心网络(ICN)能够极大地提高视频内容的传输效率,然而ICN中内网缓存机制也给授权视频的访问控制带来了严峻的挑战。授权视频访问控制的目的是保证只有已授权用户才能观看授权视频,防止授权视频被非法观看和使用。在ICN中,当授权视频被缓存在路由器上后,便不受视频发布者的控制,任何人都能够从路由器上获取授权视频。目前存在的方案不能很好地解决这个问题,提出了一种基于分割和数字水印的访问控制方案,将授权视频分割成PCB(public content block,公开内容块)和CKB(content key block,内容密钥块)两部分,其中PCB一般比较大,对所有用户都是相同的,而CKB一般比较小,并且采用数字水印技术实现不同的用户对应不同的CKB,用户必须收到PCB和CKB之后才能观看视频。通过分析,提出的授权视频访问控制方案在安全性和网络资源优化两个方面具有很好的性能。
Information-centric networking(ICN)can greatly improve the efficiency of video content
however
in-network caching in ICN also brings us a new access control challenge. The purpose of authorized video access control is to ensure that only authorized users can watch them
and to prevent unauthorized accesses to these authorized videos. In ICN
when authorized videos were cached in the routers
anyone can get and watch them without the authorized videos' producers' permission. The existing methods could not solve this problem well
an access control scheme was proposed that based on splitting and digital watermarking. The authorized video was splitted into two parts
public content block(PCB)and content key block(CKB)
respectively. PCB which was generally relatively large
was the same for all users
and CKB which was generally relatively small
was unique for each authorized users using digital watermarking technology. Users must received both PCB and CKB to watch videos. After the analysis
the access control scheme for authorized videos has a good performance in both security and network resource optimization.
CiscoVisualNetworkingIndex: ForecastandMethodology,2012- 2017 . http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html , 2014
Cisco Systems, Inc Cisco Networks, Cisco's Visual Networking Index Global IP Traffic Forecast 2010-2015 . http://www.cisco.com/en/US/netsol/ns827/networking_solutions_subsolution.html http://www.cisco.com/en/US/netsol/ns827/networking_solutions_subsolution.html , 2014
Rhea S , Godfrey B , Karp B , et al . OpenDHT: a public DHT service and its uses . ACM SIGCOMM Computer Communication Review , 2005 , 35 ( 4 ): 73 ~ 84
Liste M . Content Delivery Networks(CDNs)-A Reference Guide . Cisco World, White Papers , 2001
Davison B D . A web caching primer. IEEE Internet Computing . 2001 , 5 ( 4 ): 38 ~ 45
Eugster P T , Felber P A , Guerraoui R , et al . The many faces of publish/subscribe . ACM Computing Surveys(CSUR) , 2003 , 35 ( 2 ): 114 ~ 131
夏春梅 , 徐明伟 . 信息中心网络研究综述 . 计算机科学与探索 2013 , 7 ( 6 ): 481 ~ 493 .
Ahlgren B , Dannewitz C , Imbrenda C , et al . A survey of information-centric networking . IEEE Communications Magazine , 2012 , 50 ( 7 ): 26 ~ 36
Wang S , Bi J , Wu J , et al . Could in-network caching benefit information-centric networking . Proceedings of the 7th Asian Internet Engineering Conference , ACM, Phuket, Thailand , 2011 : 112 ~ 115
Psaras I , Chai W K , Pavlou G . Probabilistic in-network caching for information-centric networks . Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking , ACM, Phuket, Thailand , 2012 : 55 ~ 60
Chung T Y , Hong M S , Oh Y N , et al . Digital watermarking for copyright protection of MPEG2 compressed video . IEEE Transactions on Consumer Electronics , 1998 , 44 ( 3 ): 895 ~ 901
Preda R O , Vizireanu D N . A robust digital watermarking scheme for video copyright protection in the wavelet domain . Measurement , 2010 , 43 ( 10 ): 1720 ~ 1726
Lin E T , Eskicioglu A M , Lagendijk R L , et al . Advances in digital video content protection . Proceedings of the IEEE , 2005 , 93 ( 1 ): 171 ~ 183
Chen C , Ran C . P2P copyright protection: current states and future prospective with particular on China . Proceedings of International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07) , Kyoto, Japan , 2007 : 57 ~ 62
Djekic P , Loebbecke C . Software piracy prevention through digital rights management systems . Proceedings of Seventh IEEE International Conference on E-Commerce Technology(CEC 2005) , München, Germany , 2005 : 504 ~ 507
Fetscherin M , Schmid M . Comparing the usage of digital rights management systems in the music, film, and print industry . Proceedings of the 5th International Conference on Electronic Commerce , Newport Beach, CA, USA , 2003 : 316 ~ 325
Lou X , Hwang K , Zhou R . Integrated copyright protection in peer-to-peer networks . Proceedings of 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07) , Toronto, Canada , 2007
Yang C , Liu J , Zhang Y , et al . The implementation architecture of content protection in P2P network . Proceedings of International Conference on Computational Intelligence and Security Workshops(CISW 2007) , Harbin,China , 2007 : 455 ~ 458
Hamdane B , Msahli M , Serhrouchni A , et al . Data-based access control in named data networking . Proceedings of 9th International Conference on Collaborative Computing:Networking, Applications and Worksharing(Collaboratecom) , Austin, Texas, USA , 2013 : 531 ~ 536
Smetters D , Golle P , Thornton J . CCNx Access Control Specifications . Technical Report, PARC , 2010
Jacobson V , Smetters D K , Thornton J D , et al . Networking named content . Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies , Yangzhou, China , 2009 : 1 ~ 12
0
浏览量
489
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构