Abstract
Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.
Chapter PDF
Similar content being viewed by others
Keywords
References
Aciicmez, O., Seifert, J.-P., Zhang, X.: A secure DVB set-top box via trusting computing technologies. In: Consumer Communications and Networking Conference (2009)
Balfe, S., Gallery, E., Mitchel, C., Paterson, K.: Challenges for trusted computing. In: Security & Privacy. IEEE, Los Alamitos (2008)
Balfe, S., Lakhani, A., Paterson, K.: Trusted computing: providing security for peer-to-peer networks. In: Fifth IEEE International Conference on Peer-to-Peer Computing (2005)
Blahut, R.E.: A universal Reed-Solomon decoder. IBM Journal of Research and Development 28(2), 150–158 (1984)
Eskicioglu, A.M.: Multimedia security in group communications: recent progress in key management, authentication, and watermarking. Multimedia Systems 9(3), 239–248 (2003)
Ganesh, A.J., Kermarrec, A.-M., Massoulié, L.: Peer-to-peer membership management for gossip-based protocols. IEEE Transactions on Computers 52(2) (2003)
Huang, Y.-L., Shieh, S., Ho, F.-S., Wang, J.-C.: Efficient key distribution schemes for secure media delivery in pay-tv systems. IEEE Transactions on Multimedia 6(5), 760–769 (2004)
International Teleommunication Union. ITU-R Rec. BT.810. Conditional-Access broadcasting systems (1992)
Jelasity, M., Montresor, A.: Epidemic-style proactive aggregation in large overlay networks. In: ICDCS 2004: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), pp. 102–109. IEEE Computer Society, Los Alamitos (2004)
Kostoulas, D., Psaltoulis, D., Gupta, I., Birman, K., Demers, A.: Decentralized schemes for size estimation in large and dynamic groups. In: NCA 2005: Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications, pp. 41–48. IEEE Computer Society, Los Alamitos (2005)
Le Merrer, E., Kermarrec, A.-M., Massoulie, L.: Peer to peer size estimation in large and dynamic networks: A comparative study, pp. 7–17 (2006)
Lee, W.: Key distribution and management for conditional access system on DBS. In: Proc. of international conference on cryptology and information security, pp. 82–86 (1996)
Liu, B., Zhang, W., Jiang, T.: A scalable key distribution scheme for conditional access system in digital pay-tv system. IEEE Transactions on Consumer Electronics 50(2) (2004)
Liu, X., Yin, H., Lin, C., Deng, Y.: Efficient key management and distribution for peer-to-peer live streaming system, pp. 638–641 (2007)
Liu, Y., Guo, Y., Liang, C.: A survey on peer-to-peer video streaming systems. Peer-to-Peer Networking and Applications 1(1) (2008)
Magharei, N., Rejaie, R., Guo, Y.: Mesh or multiple-tree: A comparative study of live P2P streaming approaches. In: INFOCOM 2007 (2007)
Massoulié, L., Le Merrer, E., Kermarrec, A.-M., Ganesh, A.: Peer counting and sampling in overlay networks: random walk methods. In: PODC 2006: Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, pp. 123–132. ACM, New York (2006)
McEliece, R.J., Sarwate, D.V.: On sharing secrets and Reed-Solomon codes. Communications of the ACM 24(9) (1981)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A., Rivest, R.L.: Handbook of applied cryptography (1997)
Qiu, F., Lin, C., Yin, H.: EKM: An efficient key management scheme for large-scale peer-to-peer media streaming. In: Zhuang, Y.-t., Yang, S.-Q., Rui, Y., He, Q. (eds.) PCM 2006. LNCS, vol. 4261, pp. 395–404. Springer, Heidelberg (2006)
Schneier, B.: Practical Cryptography. Wiley & Sons, Chichester (2003)
Tu, F., Laih, C.S., Tung, H.H.: On key distribution management for conditional access system on pay-tv system. IEEE Transactions on Consumer Electronics 45, 151–158 (1999)
van der Veen, M., Lemma, A.N.: Electronic content delivery and forensic watermarking. Multimedia Systems 11(2), 174–184 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G. (2009). Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks. In: Markowitch, O., Bilas, A., Hoepman, JH., Mitchell, C.J., Quisquater, JJ. (eds) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. WISTP 2009. Lecture Notes in Computer Science, vol 5746. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03944-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-03944-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03943-0
Online ISBN: 978-3-642-03944-7
eBook Packages: Computer ScienceComputer Science (R0)