Abstract
Many emerging group oriented and collaborative applications such as audio/video conferences use the peer-to-peer (P2P) paradigm. Confidentiality is an often demanded feature for such applications, e.g. in business meetings, to provide group privacy. How to build a secure P2P video conference system is still an open issue. In this paper several possible solutions are discussed. We present a security architecture used for P2P video conferences that ensures confidential talks in an enterprise environment whose branches might be geographically dispersed.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
ITU-T: Recommendation H.323 v5–Packet based multimedia communication systems (July 2003)
The BRAVIS peer-to-peer video conference system, http://www.bravis.tu-cottbus.de
The DAVIKO system, http://www.daviko.com
Bryan, D.A., Lowekamp, B.B.: Standards-Based P2P Communications Systems. In: Proceedings of the 2005 Virginia Space Grant Consortium Research Conference (April 2005)
ITU-T: Recommendation H.235v3– Security and encryption for H-series (H.323 and other H.245-based) multimedia terminals (May 2003)
Milojicic, D.S., Kalogerali, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., Rollins, S., Xu, Z.C.: Peer-to-Peer Computing. HP white paper HPL-2002-57 (March 2002)
Stocia, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proc. of ACM SIGCOMM 2001, pp. 149–160 (2001)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Popovici, E.C., Mahlo, R., Zuehlke, M., Koenig, H.: Consistency Support for a Decen-tralized Management in Closed Multiparty Conferences Using SIP. In: Proc. of IEEE ICON 2003, pp. 295–300 (2003)
Zuehlke, M., Koenig, H.: A Signaling Protocol for Small Closed Dynamic Multi-peer Groups. In: Mammeri, Z., Lorenz, P. (eds.) HSNMC 2004. LNCS, vol. 3079, pp. 973–984. Springer, Heidelberg (2004)
Chockler, G.V., Keidar, I., Vitenberg, R.: Group communication specifications: A comprehensive study. ACM Computing Suryes 4, 427–469 (2001)
ITU-T manual: Security in Telecommunications and Information Technology (December 2003)
Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W., Zorn, G.: Point-to-Point Tunneling Protocol (PPTP). RFC 2637 (July 1999)
Valencia, A., Kolar, T.: Cisco Layer Two Forwarding (Protocol) L2F, RFC 2341 (May 1998)
Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G., Palter, B.: Layer Two Tunneling Protocol L2TP, RFC 2661 (August 1999)
Perlman, R., Kaufman, C.: Key Exchange in IPsec: Analysis of IKE. IEEE Internet Computing (2000)
Frankel, S., Kent, K., Lewkowski, R., Orebaugh, A.D., Ritchey, R.W., Shama, S.R.: Guide to IPsec VPNs. NIST Special Publication 800-77 (January 2005)
Dierks, T., Allen, C.: The TLS protocol Version 1.0. RFC 2246 (January 1999)
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: ACM CCS 2000, pp. 235–244 (2000)
Rodeh, O., Birman, K.P., Dolev, D.: Optimized Group Rekey for Group Communication Systems. In: Proc. NDSS 2000, pp. 39–48 (2000)
Liu, F., Koenig, H.: An efficient key distribution protocol for small closed peer groups. In: GI/ITG-workshop on peer-to-peer systems and applications. LNI Proceedings, vol. P-61, pp. 163–167 (2005)
Haskell, B.G., Puri, A., Netravali, A.N.: Digital Video: An Introduction to MPEG-2. Kluwer Academic, Dordrecht
Liu, F., Koenig, H.: A Novel Encryption Algorithm for High Resolution Video. In: Proceeding of ACM NOSSDAV 2005, Stephenson, WA, USA (June 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Liu, F., Koenig, H. (2005). A Secure P2P Video Conference System for Enterprise Environments. In: Jin, H., Reed, D., Jiang, W. (eds) Network and Parallel Computing. NPC 2005. Lecture Notes in Computer Science, vol 3779. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11577188_13
Download citation
DOI: https://doi.org/10.1007/11577188_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29810-6
Online ISBN: 978-3-540-32246-7
eBook Packages: Computer ScienceComputer Science (R0)