Framework for Secure Routing for Shielding the Multimedia Contents in P2P Network


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


The proposed system discusses about a unique approach for facilitating security towards the multimedia contents in Peer-to-Peer (P2P) network like Gnutella and Kazaa. The last decade has seen a huge range of research interest towards multimedia distribution along with delivery of live streaming of digital media. One of the major concern with the existing system is that there is enough security against the digital contents in P2P network which renders the service provider little hesitant to deploy the service towards its paid client. Till now, there is no such technology or software application which ensures the secure delivery of genuine digital multimedia content toward its client’s end. Another issue in adoption of this technology is the messy organization of overlay network which lead to network overhead thereby indirectly consumes the bandwidth and other network resources unwontedly. The proposed system highlight about a novel approach of implementing a security framework in P2P network which ensures a secure and authenticated delivery of genuine and legitimate contents to its paid clients. Simulation results shows that deployment of our proposed algorithm provides sufficient security to the communication channel and also ensures the proper delivery of the multimedia contents
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Digital Contents; Digital Watermarking; Multimedia Streaming; Peer to Peer

Full Text:

PDF


References


http://www.telegraph.co.uk/scienceandtechnology/3357003/Whowill-pay-for-the-new-web.html.

T.Do, KA. Hua, and M. Tantaoui, “P2VoD: Providing Fault Tolerant Video-on-Demand Streaming in Peer-to-Peer Environment.”, in the Proc. of the IEEE ICC, Paris, France, 20-24 June, 2004.

X. Jiang, Y. Dong, D. Xu, and B. Bhargava, "GnuStream: a P2P Media Streaming System Prototype" IEEE International Conference on Multimedia and Expo Baltimore, MD, July, 2003.

T.A.Duc, H.A. Kien , D.T. Tai, "ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Streaming.", In Proceedings of IEEE INFOCOM 2003, San Francisco, CA, USA, 30 Mars – 03 April, 2003.

R. Rejaie, and A. Ortega, "PALS: Peer-to-Peer Adaptive Layered Streaming". in Proceedings of the International Workshop on Network and Operating Systems Support for Digital Audio and Video, Monterey, California, June, 2003.

M. Hefeeda, A. Habib, B. Botev, D. Xu, and B. Bhargava, "PROMISE: Peer-to-Peer Media Streaming Using CollectCast.", In Proc. of ACM Multimedia 2003, pages 45--54, Berkeley, CA, Novembre, 2003.

F. Pianese, J. Keller, and E. W. Biersack, “PULSE, a Flexible P2P Live Streaming System”, in Proc. of 9th IEEE Global Internet Symposium 2006, Barcelona, Spain, 28 & 29 April, 2006.

S. Traverso, E. Leonardi, M. Mellia, and M. Meo, " Network Awareness in P2P-TV Applications", 15th Open European Summer School and IFIP TC6.6 Workshop on The Internet of the Future, Barcelona, Spain, 7-9 September, 2009.

H. Xie, A. Krishnamurthy, A. Silberschatz, and Y.Richard Yang, "P4P: Explicit Communications for Cooperative Control Between P2P and NetworkProviders", http://www.dcia.info/ documents/P4P_Overview.pdf.

M. Eberhard, L. Celetto, C. Timmerer, E. Quacchio, H. Hellwagner, and F. Rovati, “An Interoperable Streaming Framework for Scalable Video Coding based on MPEG-21”, Proceedings of the 5th IET Visual Information Engineering Conference Conference (VIE’08), Xi’an, China, July, 2008.

http://www.ietf.org/html.charters/alto-charter.html

http://www.rayv.com/cms/index.html

http://www.peerialism.se/

http://www.peeringportal.com/

Y. Liu, X. Hei, C. Liang, and K. W. ROSS. “Insight into pplive: A measurement study of a largescale p2p iptv system” 2006.

T. Silverston and O. Fourmaux, “P2P iptv measurement: A comparison study.”, http://www.arxiv.org/abs/cs.NI/0610133, 2006.

Jiehui JU , Fuwei FAN,, Jiyi WU, “Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information”, Journal of Computational Information Systems 9: 14, 2013.

Rahul J. Vaghela1, Kalpesh Patel,” A Brief Comparison of Security Patterns for Peer to Peer Systems”, IJAIEA, Vol.2, 2013.

Do-sik An, Byong-lae Ha and Gi-hwan Cho, “A Robust Trust Management Scheme against the Malicious Nodes in Distributed P2P Network”, International Journal of Security and Its Applications Vol. 7, No. 3, 2013.

R.Geetha M.E, Nithya B.E, “Analysis of Streaming Services and Security Issues in Peer-to-Peer Network”, IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.4, 2013.

A. Suganya, P. Laura Juliet., “Enhancing Security and Response Time for Secure Search in Unstructured Peer to Peer Network”, International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064.

R.Suneelmanohar, T.V.Sai Krishna ,” IRM: File Replication and Consistency Maintenance in p2p with security Maintenance through Routers”, Research Journal of Computer Systems Engineering – RJCSE, Vol.03,2012.

T. Zied, K. Maher, “Taxonomy of Structured P2P Overlay Networks Security Attacks”, World Academy of Science, Engineering and Technology ,2012.

K.S. Stephen, D. Kamyar, “ Security Review of P2P Applications and Networks”.

S. Benjaminr, Y. Nobukazu, “A Security Pattern for Data Integrity in P2P Systems” Cite Seer.

D. T.T.Anh, R. Mark, “Checking Security Property of P2P Systems Using CSP”.

A. Michele, “A Survey of Peer-to-Peer Overlay Schemes: Effectiveness, Efficiency and Security”, Recent Patents on Computer Science, 2009.

F. Markus, E. Charlott, C. Tomasz, M. Wojciech, K. Zbigniew, “Parameterisation of a reputation system for VoIP in P2P networks for improved communication quality and security, BTH/EuroFGI, 2008.

C. Miguel, D. Peter, G. Ayalvadi, R. Antony, W.S. Dan, “Secure routing for structured peer-to-peer overlay networks”, Citeseer , 2002.

D. Carra, R.C. Lo, E.W. Biersack, “Graph based analysis of mesh overlay streaming systems. IEEE J Sel Areas Commun 25:1667–1677, 2007.

D. Carra, R.C. Lo, E.W. Biersack, “Stochastic graph processes for performance evaluation of content delivery applications in overlay networks”, IEEE Trans Parallel Distrib Syst 19:247–261, 2008.

M. Jelasity, A. Montresor, O. Babaoglu, “T-Man: gossipbased fast overlay topology construction”, Elsevier Comput Networks 53:2321–2339, 2009.

Y. Liu, Y. Guo, C. Liang, “A survey on peer-to-peer video streaming systems”, Peer-to-Peer Networking and Applications,Vol. 1(1),pp.18–28, 2008.

N. Magharei, R. Rejaie, Y. Guo, “Mesh or multiple-tree: a comparative study of live P2P streaming approaches”, In: Proc of the 26th IEEE int conference on computer communications (INFOCOM’07), pp 1424–1432, 2007.

J. Seibert, D. Zage, C. Nita-Rotaru, “ Won’t you be my neighbor? Neighbor selection attacks in meshbased peer-topeer streaming” Technical Report, Purdue University, 2008.

M. Zhou, J. Liu, “Ahybrid overlay network for video-ondemand”, In: Proc of the IEEE int conference on communications (ICC’08), pp 1309–1311, 2005.

T. Silverston, O. Fourmaux, “Source vs data-driven approach for live P2P streaming”, In: Proc of the int conference on networking, int conference on systems and int conference on mobile communications and learning technologies (ICNICONSMCL’06), IEEE Computer Society, Washington, DC, pp.99, 2006.

A-M. Kermarrec, M.S. Van, “Gossiping in distributed systems”, SIGOPS Oper Syst Rev , Vol. 41(5):pp.2–7, 2007.

S. Shetty, P. Galdames, W. Tavanapong, Y. Cai, “Detecting malicious peers in overlay multicast streaming”, In: Proc of the 31st IEEE conference on local computer networks (LCN’06), Florida, 2006.

N. Magharei, R. Rejaie, “PRIME: peer-to-peer receiverdriven mesh-based streaming”, In: Proc of the 26th IEEE int conference on computer communications (INFOCOM’07). IEEE, pp. 1415–1423, 2007.

X. Zhang, J. Liu, B. Li, Y-S. Yum, “CoolStreaming/ DONet: a data-driven overlay network for peer-to-peer live media streaming”, In: Proc of the 24th IEEE int conference on computer communications (INFOCOM’05), vol 3, pp 2102–2111, 2005.

T. Silverston and O. Fourmaux, “P2P iptv measurement: A comparison study.”, http://www.arxiv.org/abs/cs.NI/0610133, 2006.

B. Mathieu, P. Paris, "A Topology-Aware P2P Video Streaming System", GIIS 2009, Hammamet, Tunisia,pp. 23-26, June, 2009.

P. Duhamel, C. Guillemot., "Polynomial Transform Computation of the 2-D DCT", IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Albuquerque, USA, 1990.

V. Chappelier, C. Guillemot and S. Marinkovic, "Turbo trellis coded quantization", in Int. Symp. on Turbo Codes, Brest, France, September 2003.

G. Le Guelvouit. "Trellis-coded quantization for public-key watermarking", IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, USA, 18-23 March 2005.

G. Chen, “Automatic Itinerary Planning for Traveling Services”, IEEE Transactions on Knowledge and Data Engineering, 2013.

Arivazhagu, U.V., Srinivasan, S., Security and peer management of query routing technique for P2P networks, (2013) International Review on Computers and Software (IRECOS), 8 (8), pp. 1744-1750.

Chen, D., Zeng, X., Buyer-seller watermarking protocol: Problems and solutions, (2012) International Review on Computers and Software (IRECOS), 7 (3), pp. 1204-1208.

Altuhafi, A.W., Murugesan, R.K., Ramadas, S., Main types of peer-to-peer live video streaming topologies and their data delivery mechanism, (2013) International Review on Computers and Software (IRECOS), 8 (5), pp. 1135-1140.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize