Access Control for Autborized Video in Information-Centric Networking
Information-centric networking(ICN)can greatly improve the efficiency of video content, however, in-network caching in ICN also brings us a new access control challenge. The purpose of authorized video access control is to ensure that only authorized users can watch them, and to prevent unauthorized...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-09-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.09.008/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529357064994816 |
---|---|
author | Zifei Zhou Xiaobin Tan Yukun Niu CZou Cliff |
author_facet | Zifei Zhou Xiaobin Tan Yukun Niu CZou Cliff |
author_sort | Zifei Zhou |
collection | DOAJ |
description | Information-centric networking(ICN)can greatly improve the efficiency of video content, however, in-network caching in ICN also brings us a new access control challenge. The purpose of authorized video access control is to ensure that only authorized users can watch them, and to prevent unauthorized accesses to these authorized videos. In ICN, when authorized videos were cached in the routers, anyone can get and watch them without the authorized videos' producers' permission. The existing methods could not solve this problem well, an access control scheme was proposed that based on splitting and digital watermarking. The authorized video was splitted into two parts, public content block(PCB)and content key block(CKB), respectively. PCB which was generally relatively large, was the same for all users, and CKB which was generally relatively small, was unique for each authorized users using digital watermarking technology. Users must received both PCB and CKB to watch videos. After the analysis, the access control scheme for authorized videos has a good performance in both security and network resource optimization. |
format | Article |
id | doaj-art-b3e697437b744c449d13aed9142c316b |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2014-09-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-b3e697437b744c449d13aed9142c316b2025-01-15T03:18:55ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-09-0130536059619446Access Control for Autborized Video in Information-Centric NetworkingZifei ZhouXiaobin TanYukun NiuCZou CliffInformation-centric networking(ICN)can greatly improve the efficiency of video content, however, in-network caching in ICN also brings us a new access control challenge. The purpose of authorized video access control is to ensure that only authorized users can watch them, and to prevent unauthorized accesses to these authorized videos. In ICN, when authorized videos were cached in the routers, anyone can get and watch them without the authorized videos' producers' permission. The existing methods could not solve this problem well, an access control scheme was proposed that based on splitting and digital watermarking. The authorized video was splitted into two parts, public content block(PCB)and content key block(CKB), respectively. PCB which was generally relatively large, was the same for all users, and CKB which was generally relatively small, was unique for each authorized users using digital watermarking technology. Users must received both PCB and CKB to watch videos. After the analysis, the access control scheme for authorized videos has a good performance in both security and network resource optimization.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.09.008/information-centric networkingauthorized videoaccess controldigital watermarking |
spellingShingle | Zifei Zhou Xiaobin Tan Yukun Niu CZou Cliff Access Control for Autborized Video in Information-Centric Networking Dianxin kexue information-centric networking authorized video access control digital watermarking |
title | Access Control for Autborized Video in Information-Centric Networking |
title_full | Access Control for Autborized Video in Information-Centric Networking |
title_fullStr | Access Control for Autborized Video in Information-Centric Networking |
title_full_unstemmed | Access Control for Autborized Video in Information-Centric Networking |
title_short | Access Control for Autborized Video in Information-Centric Networking |
title_sort | access control for autborized video in information centric networking |
topic | information-centric networking authorized video access control digital watermarking |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.09.008/ |
work_keys_str_mv | AT zifeizhou accesscontrolforautborizedvideoininformationcentricnetworking AT xiaobintan accesscontrolforautborizedvideoininformationcentricnetworking AT yukunniu accesscontrolforautborizedvideoininformationcentricnetworking AT czoucliff accesscontrolforautborizedvideoininformationcentricnetworking |