Abstract | ||
---|---|---|
Digital streaming Internet applications such as online gaming, multimedia playback, presentations, news feeds, and stock quotes involve end-users with very low tolerance for high latency, low data rates, and playback interruption. To protect such delay-sensitive streams against malicious attacks, security mechanisms need to be designed to efficiently process long sequence of bits. We study the problem of efficient authentication for real-time and delay-sensitive streams commonly seen in content distribution, multicast, and peer-to-peer networks. We propose a novel signature amortization technique based on trapdoor hash functions for authenticating individual data blocks in a stream. Our technique provides: 1) Resilience against transmission losses of intermediate blocks in the stream; 2) Small and constant memory/compute requirements at the sender and receiver; 3) Minimal constant communication overhead needed for transmission of authenticating information. Our proposed technique renders authentication of digital streams practical and efficient. We substantiate this claim by constructing {\tt DL}-{\tt SA}, a discrete-log-based instantiation of the proposed technique. {\tt DL}-{\tt SA} provides adaptive stream verification, where the receiver has control over modulating computation cost versus buffer size. Our performance analysis demonstrates that {\tt DL}-{\tt SA} incurs the least per-block communication and signature generation overheads compared to existing schemes with comparable features. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/TDSC.2012.48 | Dependable and Secure Computing, IEEE Transactions |
Keywords | Field | DocType |
content management,cryptography,delays,digital signatures,media streaming,multicast communication,peer-to-peer computing,performance evaluation,constant memory requirements,content distribution,delay-sensitive stream authentication,delay-sensitive streams,digital stream authentication,digital streaming Internet applications,information authentication,intermediate block transmission losses,least per-block communication,long bit sequence,malicious attacks,minimal constant communication overhead,multicast networks,multimedia playback,news feeds,online gaming,peer-to-peer networks,playback interruption,real-time stream authentication,security mechanisms,signature generation overheads,stock quotes,trapdoor hash-based mechanism,Stream authentication,content distribution,cryptography,digital signatures,signature amortization,trapdoor hash functions. | Authentication,Computer science,Cryptography,Server,Computer network,Digital signature,Hash function,Multicast,Content management,The Internet,Distributed computing | Journal |
Volume | Issue | ISSN |
9 | 5 | 1545-5971 |
Citations | PageRank | References |
6 | 0.45 | 18 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Santosh Chandrasekhar | 1 | 83 | 6.29 |
Saikat Chakrabarti | 2 | 188 | 21.86 |
Mukesh Singhal | 3 | 2602 | 259.07 |