PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH

Ahmed Reda Kaced, Jean-Claude Moissinac

2006

Abstract

By breaking the end-to-end nature of the communication, proxies render the task of providing end-to-end security much harder or even impossible in some cases. In this paper, we will address the questions of when and how end-to-end security, like confidentiality and authenticity can be preserved, in a multimedia content delivery platform, when having one or more adaptation proxies in the data path. We describe SEMAFOR, a platform for protecting adaptive multimedia content delivery in heterogeneous environments. SEMAFOR aims to deliver an end-to-end authenticity of original content exchanged in a heterogeneous network while allowing content adaptation by intermediary proxies between the content transmitter and the final users. Adaptation and authentication management are done by the intermediary proxies, transparently to connected hosts, which totally make abstraction of these processes. SEMAFOR provides AMCA a new content authentication based on multi-hop signature scheme using a Merkle Hash Tree, and XSST a secured transaction protocol that gives securely exchanges of transactions in SEMAFOR.

References

  1. Bellavista, P., Stefanelli, C., and Tortonesi, M. (2004). The ubiqoS middleware for audio streaming to bluetooth devices. In MobiQuitous. IEEE Computer Society.
  2. Gentry, C., Hevia, A., Jain, R., Kawahara, T., and Ramzan, Z. (2005). End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating.
  3. Johanson, M. (2001). An rtp to http video gateway. pages 499 - 503.
  4. Kaced, A. R. and Moissinac, J. C. (2006a). Multimedia content authentication for proxy-side adaptation. In Proceedings of the IEEE International Conference on Digital Telecommunications, ICDT 06.
  5. Kaced, A. R. and Moissinac, J. C. (2006b). Semafor: a framework for authentication of adaptive multimedia content and delivery for heterogeneous networks. In Proceedings of ICISP 06.
  6. Lapayre, J.-C. and Renard, F. (2005). Appat: A new platform to perform global adaptation. In the 1st IEEE Int. Conf. DFMA'2005, France.
  7. Layaida, O., Attalah, S. B., and Hagimont, D. (2004). Adaptive media streaming using self-reconfigurable proxies. In 7th IEEE International Conference, HSNMC 2004. Springer.
  8. Li, T., Wu, Y., Ma, D., Zhu, H., and Deng, R. H. (2004). Flexible verification of MPEG-4 stream in peer-topeer CDN. In ICICS.
  9. Merkle, R. (1990). A certified digital signature. In CRYPTO: Proceedings of Crypto 1990.
  10. Suzuki, T., Ramzan, Z., Fujimoto, H., Gentry, C., Nakayama, T., and Jain, R. (2004). A system for endto-end authentication of adaptive multimedia content.
Download


Paper Citation


in Harvard Style

Reda Kaced A. and Moissinac J. (2006). PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 87-90. DOI: 10.5220/0002104500870090


in Bibtex Style

@conference{secrypt06,
author={Ahmed Reda Kaced and Jean-Claude Moissinac},
title={PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={87-90},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002104500870090},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH
SN - 978-972-8865-63-4
AU - Reda Kaced A.
AU - Moissinac J.
PY - 2006
SP - 87
EP - 90
DO - 10.5220/0002104500870090