SlideShare a Scribd company logo
1 of 33
A Case for a Multi-Key Secure Video Proxy: Theory, Design and Implementation S.F. Yeung, John C. S. Lui, David K. Y.Yau ACM Multimedia 2002
Multi-Key Secure Video Proxy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Video Proxy ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Client-Server Infrastructure source Client 1 Client 2 Client 3 Client N Server bandwidth (fan-out) is very limited Long haul bottleneck paths Packets get dropped
Why Video Proxy ? ,[object Object],[object Object],[object Object]
Client-Proxy-Server Infrastructure source Client A1 Client A2 Client A3 Client AN Client B1 Client B2 Client B3 Client BN Client P1 Client P2 Client P3 Client PN Proxy A Proxy B Proxy P
Why Secure Video Proxy ? ,[object Object],[object Object],[object Object]
Background ,[object Object],[object Object],[object Object]
Secure Client-Server Infrastructure source Client 1 Client 2 Client 3 Client N Encrypt using client 1’s key Encrypt using client 2’s key Encrypt using client 3’s key Encrypt using client N’s key ,[object Object],[object Object],[object Object]
Proxy Caching with Decrypted Content source Client A1 Client A2 Proxy A Encrypt with Proxy’s key Decrypted Content Encrypt with Client A1’s key Encrypt with Client A2’s key ,[object Object],[object Object]
Proxy Caching with Encrypted Content source Client A1 Client A2 Proxy A Encrypt with Proxy’s key Encrypted Content Decrypt using proxy’s key Encrypt using client i ’s key ,[object Object],[object Object],[object Object]
Related Work ,[object Object],[object Object]
Proxy Caching with Corrupted Content source Client A1 Client A2 Intentionally  Corrupted  Content Part for reconstruction (via secure channel) Proxy ,[object Object],[object Object],[object Object],[object Object]
Proxy Caching with VES Encryption source Client A1 Client A2 Proxy A Encrypt with Proxy’s key Encrypted Content Encrypt using VES encryption ,[object Object],[object Object]
Secure Video Proxy Requirement ,[object Object],[object Object],[object Object]
Definition of Asymmetric Reversible Parametric Sequence ( ARPS ) ,[object Object],[object Object],[object Object],D -1 D 0 D 1 D N f(D -1 , e 0 ) f(D 0 , e 1 ) f(D 1 , e 2 ) f(D N-1 , e N ) f(D N , e N+1 ) D 1 D N f(D 0 , e 1 ) f(D 1 , e 2 ) f(D N-1 , e N ) f(D N , e N+1 ) * * * * * * * * * *
Use ARPS to design proxy with the following properties ,[object Object],[object Object],[object Object]
Use ARPS to design proxy with the following properties (Continue) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ARPS f  sequence for the secure video proxy e 0 e 1 e 2 e N Client 1 Client 2 Client N source D -1 D 0 D 1 D 2 D N Video Proxy
Our Design ,[object Object],[object Object],[object Object]
Implement  ARPS f  using Multi-Key RSA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implement  ARPS f  using Multi-Key RSA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operations between source and proxy request Ack(e 1 , n) D 0 (using e 0 ) request authentication and key generation (e 0 , e 1 , d 1 , n, phi) Data  encryption caching or relaying Server Proxy
Operations between proxy and client request(eCert) Ack(e 1 , [d 1 ], n) D 0 (using e 0 ) Authentication and key generation Data  encryption D 1 (using e 1 ) Server Proxy Client 1 Request request(eCert) Data  encryption Data decryption Ack([d 1 ], n) Retrieve d 1 ,[object Object],[object Object]
Encryption Configuration Parameters Packet 0 (1400 bytes) Packet 1 (1400 bytes) Packet 2 (1400 bytes) Packet 3 (1400 bytes) Encryption block Encryption sub-block S pkt  = 1400 bytes, I = 2,  P = 0.5 and B = 4
Secure Multimedia Library - SML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Multimedia Library - SML ,[object Object],SML_InitSession(); SML_Accept(); SML_SendRps(); SML_SendEncryptRps(); SML_InitSession(); SML_Connect(); SML_ReceiveRps(); StoreData(); Server Proxy SML_InitSession(); SML_ProxyAccept(); SML_SendRps(); ReadData(); SML_SendReEncryptRps(); Proxy SML_InitSession(); SML_ConnectProxy(); SML_ReceiveRps(); SML_ReadDecryptRps(); Client
Secure Multimedia Library - SML ,[object Object],SML_InitSession(&session); SML_NewKeyPair(&session, 512, 65537, CRYPTO_KEY_RSA); SML_SaveKeyPair(&session, &quot;key.rsa&quot;, &quot;passwd&quot;); if (SML_Connect(&session)) { SML_ReceiveRps(&session); for (i=0; i<total_pkt; i++) { SML_ReadDecryptRps(&session, buffer, buf_size); } } SML_DestroySession(&session);
Secure Multimedia Library - SML ,[object Object],SML_InitSession(&session); SML_LoadKeyPair(&session, “key.rsa”, “passwd”,  CRYPTO_KEY_RSA); if (SML_Accept(&session)) { SML_LoadRps(&session, “movie_0.rps”); SML_SendRps(&session); for (i=0; i<total_pkt; i++) { SML_SendEncryptECP(&session, buffer, buf_size); } } SML_DestroySession(&session);
Encryption Configuration Parameters t  = proxy throughput,  M  = Number of concurrent MPEG-1 streams that could support. B = 1 63.04 11.82 62.56 11.73 62.56 11.73 62.40 11.70 57.10 10.7 62.08 11.64 I = 10 62.82 11.78 62.72 11.76 62.08 11.64 61.66 11.56 52.24 10.17 48.32 9.06 I = 5 62.77 11.77 54.19 10.16 40.20 7.54 32.52 5.91 25.81 4.84 21.87 4.10 I = 2 53.90 10.10 30.90 5.8 21.60 4.05 16.60 3.11 13.5 2.53 11.36 2.13 I = 1 M T M t M t M t M t M t P = 0.043 P = 0.086 P = 0.120 P = 0.171 P = 0.214 P = 0.257
MPEG-1 Experiment
QuickTime Experiment
[object Object]

More Related Content

What's hot

Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
Thivya Devaraj
 

What's hot (20)

Fight Against Citadel in Japan  by You Nakatsuru
Fight Against Citadel in Japan  by You NakatsuruFight Against Citadel in Japan  by You Nakatsuru
Fight Against Citadel in Japan  by You Nakatsuru
 
Cryptography for Java Developers: Nakov jProfessionals (Jan 2019)
Cryptography for Java Developers: Nakov jProfessionals (Jan 2019)Cryptography for Java Developers: Nakov jProfessionals (Jan 2019)
Cryptography for Java Developers: Nakov jProfessionals (Jan 2019)
 
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 
D017433134
D017433134D017433134
D017433134
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
 
Applying Security Algorithms Using openSSL crypto library
Applying Security Algorithms Using openSSL crypto libraryApplying Security Algorithms Using openSSL crypto library
Applying Security Algorithms Using openSSL crypto library
 
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)
 
Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Development of anonymous networks based on cryptography
Development of anonymous networks based on cryptographyDevelopment of anonymous networks based on cryptography
Development of anonymous networks based on cryptography
 
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
 
OpenSSL Basic Function Call Flow
OpenSSL Basic Function Call FlowOpenSSL Basic Function Call Flow
OpenSSL Basic Function Call Flow
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
 
Ch7 2ed
Ch7 2edCh7 2ed
Ch7 2ed
 

Similar to Aoevideo

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
Mumbai Academisc
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 

Similar to Aoevideo (20)

IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Kleptography
KleptographyKleptography
Kleptography
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 

More from Pptblog Pptblogcom (20)

Adventure lecture
Adventure lectureAdventure lecture
Adventure lecture
 
Cni3 11-29
Cni3 11-29Cni3 11-29
Cni3 11-29
 
Cni mc donough_preservation
Cni mc donough_preservationCni mc donough_preservation
Cni mc donough_preservation
 
Chapter9
Chapter9Chapter9
Chapter9
 
Cgu demo
Cgu demoCgu demo
Cgu demo
 
Cac sv4
Cac sv4Cac sv4
Cac sv4
 
Broadcasting video
Broadcasting videoBroadcasting video
Broadcasting video
 
Bb feb2005
Bb feb2005Bb feb2005
Bb feb2005
 
Barwick video-trial
Barwick video-trialBarwick video-trial
Barwick video-trial
 
Barcelona keynote web
Barcelona keynote webBarcelona keynote web
Barcelona keynote web
 
Att naruc vrs presentation 2-12
Att naruc vrs presentation   2-12Att naruc vrs presentation   2-12
Att naruc vrs presentation 2-12
 
Atee2006
Atee2006Atee2006
Atee2006
 
111203 filmed hunter
111203 filmed hunter111203 filmed hunter
111203 filmed hunter
 
060320 mmtf presentation
060320 mmtf presentation060320 mmtf presentation
060320 mmtf presentation
 
2005 06-12-vitale-emgsession-videopreservation
2005 06-12-vitale-emgsession-videopreservation2005 06-12-vitale-emgsession-videopreservation
2005 06-12-vitale-emgsession-videopreservation
 
150
150150
150
 
85 videocompress
85 videocompress85 videocompress
85 videocompress
 
11 streaming
11 streaming11 streaming
11 streaming
 
09a video compstream_intro_trd_23-nov-2005v0_2
09a video compstream_intro_trd_23-nov-2005v0_209a video compstream_intro_trd_23-nov-2005v0_2
09a video compstream_intro_trd_23-nov-2005v0_2
 
5.1.seyler
5.1.seyler5.1.seyler
5.1.seyler
 

Recently uploaded

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Aoevideo

  • 1. A Case for a Multi-Key Secure Video Proxy: Theory, Design and Implementation S.F. Yeung, John C. S. Lui, David K. Y.Yau ACM Multimedia 2002
  • 2.
  • 3.
  • 4. Client-Server Infrastructure source Client 1 Client 2 Client 3 Client N Server bandwidth (fan-out) is very limited Long haul bottleneck paths Packets get dropped
  • 5.
  • 6. Client-Proxy-Server Infrastructure source Client A1 Client A2 Client A3 Client AN Client B1 Client B2 Client B3 Client BN Client P1 Client P2 Client P3 Client PN Proxy A Proxy B Proxy P
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. ARPS f sequence for the secure video proxy e 0 e 1 e 2 e N Client 1 Client 2 Client N source D -1 D 0 D 1 D 2 D N Video Proxy
  • 20.
  • 21.
  • 22.
  • 23. Operations between source and proxy request Ack(e 1 , n) D 0 (using e 0 ) request authentication and key generation (e 0 , e 1 , d 1 , n, phi) Data encryption caching or relaying Server Proxy
  • 24.
  • 25. Encryption Configuration Parameters Packet 0 (1400 bytes) Packet 1 (1400 bytes) Packet 2 (1400 bytes) Packet 3 (1400 bytes) Encryption block Encryption sub-block S pkt = 1400 bytes, I = 2, P = 0.5 and B = 4
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. Encryption Configuration Parameters t = proxy throughput, M = Number of concurrent MPEG-1 streams that could support. B = 1 63.04 11.82 62.56 11.73 62.56 11.73 62.40 11.70 57.10 10.7 62.08 11.64 I = 10 62.82 11.78 62.72 11.76 62.08 11.64 61.66 11.56 52.24 10.17 48.32 9.06 I = 5 62.77 11.77 54.19 10.16 40.20 7.54 32.52 5.91 25.81 4.84 21.87 4.10 I = 2 53.90 10.10 30.90 5.8 21.60 4.05 16.60 3.11 13.5 2.53 11.36 2.13 I = 1 M T M t M t M t M t M t P = 0.043 P = 0.086 P = 0.120 P = 0.171 P = 0.214 P = 0.257
  • 33.