Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

来源 :Tsinghua Science and Technology | 被引量 : 0次 | 上传用户:jiaxiaoli00
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Recent development of the peer-to-peer(P2P)live streaming technique has brought unprecedented new momentum to the Internet with the characters of effective,scalable,and low cost.However,before these applications can be successfully deployed as commercial applications,efficient access control mechanisms are needed.This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme.The major features of this system include(1)the management server issues each authorized user a unique public key certificate, (2)the one-way hash chain extends the certificate’s lifetime,(3)the original media is encrypted by the session key and delivered to the communication group,and(4)the session key is periodically updated and distributed with the media.Finally,analyses and test results show that scheme provides a secure,scalable,reliable, and efficient access control solution for P2P live streaming systems. Recent development of the peer-to-peer (P2P) live streaming streaming technology has brought new momentum to the Internet with the characters of effective, scalable, and low cost. Before, these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, ANALYZES how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate, (2) the one-way hash chain extends the certificate’s lifetime, (3) the original media is encrypted by the session key and delivered to the communication group, and (4) the session key is periodically updated and distributed with the media. Finaally, analyzes and test results show that scheme provides a secure, scalable, reliable, and efficient access control solution for P2P live streaming systems.
其他文献
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
去黑山的路,似巨蟒一路伏卧,翻卷的崇山峻岭倔强地突兀着,袒露尖齿利牙,望不到头的盘山路时而扼腕摆尾,时而被迎面陡立的悬崖拦腰一折,是断非断,心,便幽幽地悬在了半空。连窗
几场绵绵细雨随着初夏的脚步滋润着这个古朴、静谧的江北古商城,灰色的青石板呈现出油亮的墨青色,就像在向你诉说着百年的历史沉浮。初夏的古商城,阳光透过青翠欲滴的树叶洒
阐述船舶避难场所制度对海洋环境、周边居民的安全、沿岸国经济和社会利益产生的潜在影响,介绍中国针对该制度在立法和管理框架上的现状,给出一系列针对船舶避难场所制度的建
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
Objective To investigate the risk factors of HIV infection among women in the Dodoma region,Tanzania.Methods The protocol were assessed through a population
期刊
1991年11月29日,本刊邀请在京的一些理论工作者召开了“社会主义与中国未来”的专题座谈会。参加座谈会的有北京大学马列主义研究所徐雅民、阎志民、薛汉伟、施达政、易杰雄
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
网络语言是一个阶段内社会文化在互联网上的投射,是网民交流不可缺少的要素。互联网飞速发展,网络语言随之日新月异,富有想象力的网民创造了“蛮拼的”、“给力”、“点赞”
我站自1990年2月~2000年2月行人工流产1120人次 ,其中双宫腔畸形子宫人流10例 ,占9 7 % ,现将情况报道如下 :1临床资料我站1990年~2000年双宫腔畸形子宫人流10例 ,年龄在23~26岁之间。孕周 :7孕周5例 ,8~9孕周3例 ,10孕周2