Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

来源 :Tsinghua Science and Technology | 被引量 : 0次 | 上传用户:jiaxiaoli00
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Recent development of the peer-to-peer(P2P)live streaming technique has brought unprecedented new momentum to the Internet with the characters of effective,scalable,and low cost.However,before these applications can be successfully deployed as commercial applications,efficient access control mechanisms are needed.This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme.The major features of this system include(1)the management server issues each authorized user a unique public key certificate, (2)the one-way hash chain extends the certificate’s lifetime,(3)the original media is encrypted by the session key and delivered to the communication group,and(4)the session key is periodically updated and distributed with the media.Finally,analyses and test results show that scheme provides a secure,scalable,reliable, and efficient access control solution for P2P live streaming systems. Recent development of the peer-to-peer (P2P) live streaming streaming technology has brought new momentum to the Internet with the characters of effective, scalable, and low cost. Before, these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, ANALYZES how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate, (2) the one-way hash chain extends the certificate’s lifetime, (3) the original media is encrypted by the session key and delivered to the communication group, and (4) the session key is periodically updated and distributed with the media. Finaally, analyzes and test results show that scheme provides a secure, scalable, reliable, and efficient access control solution for P2P live streaming systems.
其他文献