| 研究生: |
王昱凱 Wang, Yu-Kai |
|---|---|
| 論文名稱: |
P2P即時串流服務金鑰管理機制 Key Management Scheme in P2P Live Streaming Service |
| 指導教授: |
李忠憲
Li, Jung-Shian |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2010 |
| 畢業學年度: | 98 |
| 語文別: | 英文 |
| 論文頁數: | 43 |
| 中文關鍵詞: | 金鑰管理 、P2P即時影音串流 、安全 |
| 外文關鍵詞: | key management, P2P live streaming, security |
| 相關次數: | 點閱:97 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著網路蓬勃的發展,許多網路的應用服務接應而生,基於P2P架構的即時影音串流(live streaming)便是近年來非常熱門的應用之一,而在P2P live streaming system中,由於使用者的數量龐大,加密金鑰的更新不適合用對Server重新要求的方式,這種集中式的方法將會造成Server的負擔太重,成為系統中的嚴重負擔,取而代之的便是利用分散式的方式來更新加密金鑰,Server只需將加密金鑰的更新訊息散佈給系統中的少數節點,之後便能利用P2P的特性,來更新整個系統的加密金鑰。於是,我們希望提出一個比較完整的金鑰管理機制,確保更新訊息以及系統的安全性,只讓合法的使用者才能正確的更新加密金鑰。
在目前的研究當中,有許多關於Group Key Management的方法,但卻少有針對P2P live streaming system所設計的金鑰管理,我們即是針對這部份來提出一個適合應用在P2P live streaming system的金鑰管理方法,並且給予完善的安全性分析,希望藉此提供一個安全的即時影音串流環境。
With rapid development of the Internet, many applications of network services have been developed for better livings. In recent years, live media streaming based on P2P network structure is a popular application. With numerous users in P2P live streaming system, it is not an affordable way to request from server for the key updating information since the server becomes the bottleneck of the system. Therefore, we propose a novel distributed key management scheme. The server only needs to transmit the key updating information to a limited number of users. Hence, we exploit the characteristic of P2P network structure to distribute the key updating information hop by hop. In this way, it can reduce the task of the server. Furthermore, with the high churn rate of user joining and leaving, we design an efficient key management method that authenticates the security of information updating. In our proposed scheme, only legal users in the P2P live streaming system can update the key correctly. Security analysis shows that our proposed scheme can provide the security measure for the P2P live streaming system even in a high churn rate of users.
[1] PPLive, http://www.pplive.com
[2] PPStream, http://www.ppstream.com
[3] CoolStreaming, http://www.coolstreaming.us
[4] X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, “A Measurement Study of a Large-Scale P2P IPTV System,” IEEE Transactions on Multimedia, vol. 9, no. 8, December 2007.
[5] J. Gu and J. Nah, “Key Management for Overlay-based IPTV Content Delivery,” IJCSNS International Journal of Computer Science and Network Security, vol. 8, no. 12, December 2008.
[6] X. Liu, H. Yin, and C. Lin, “sSream: Peer-to-Peer Live Streaming with Efficient User Authentication and Key Management,” Proceedings of Second International Conference on Communications and Networking in China, pp. 270-274, August 2007.
[7] Y. Liu, Y. Guo, and C. Liang, “A survey on peer-to-peer video streaming systems,” in the Journal of P2P Networking and Applications, Springer, vol. 1, no. 1, pp. 18-28, March 2008.
[8] X. Liao, H. Jin, Y. Liu, L.M. Ni, and D. Deng, “AnySee: Peer-to-Peer Live Streaming,” in Proc. of IEEE INFOCOM, 2006.
[9] S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communication,” ACM Comput. Surv., vol. 35, no. 3, pp. 309-329, September 2003.
[10] S. Mittra, “Iolus: A Framework for Scalable Secure Multicasting,” in Proceedings of the ACM SIGCOMM, vol. 27 pp. 277-288, September 1997.
[11] Y. Kim, A. Perrig, and G. Tsudik, “Tree-Based Group key Agreement,” ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 60-96, February 2004.
[12] R.L. Rivest, A. Shamir, and L.A. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. of the ACM, vol. 21, no. 2, 1978.
[13] D. Eastlake and P. Jones, “US Secure Hash Algorithm 1 (SHA1),” RFC 3174, September 2001.
[14] H. Yin, C. Lin, Q. Zhang, Z. Chen, and D. Wu, “TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 12, December 2008.
[15] X. Liu, H. Yin, C. Lin, and Y. Deng, “Efficient Key Management and Distribution for Peer-to-Peer Live Streaming System” in Proceedings of 2007 International Symposium on Intelligent Signal Processing and Communication Systems, November 28 – December 1, 2007
[16] B. Li and H. Yin, “Peer-to-Peer Live Video Streaming on the Internet: Issues, Existing Approaches and Challenges,” in IEEE Communication Magazine, vol 45, pp. 94-99, June 2007.
[17] C. Boyd “On Key Agreement and Conference Key Agreement,” in Proceedings of the Information Security and Privacy: Australasian Conference, Lecture Notes in Computer Science, vol. 1270, pp. 294-302, 1997.
[18] C. K. Wong, M. Gouda, and S. S. Lam, “Secure Group Communications Using Key Graphs,” IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, February 2000.
[19] D. W. Kwak, S. J. Lee, J. W. Kim, and E. Jung, “An Efficient LKH Tree Balancing Algorithm for Group Key Management,” IEEE Communications Letters, vol. 10, no. 3, March 2006.
[20] D. W. Kwak, and J. W. Kim, “A Decentralized group Key Management Scheme for the Decentralized P2P Environment,” IEEE Communications Letters, vol. 11, no. 6, June 2007.
[21] D. Wallner, E. Harder, and R. Agee, “Key Management for Multicast: Issues and Architectures” RFC 2627, June 1999.
[22] M. Steiner, G. Tsudik, and M. Waidner, “Key Agreement in Dynamic Peer Groups,” IEEE Transactions on Parallel and Distributed Systems, 2000.
[23] R. Molva and A. Pannetrat, “Scalable Multicast Security with Dynamic Recipient Groups,” in Proceedings of the 6th ACM Conference on Computer and Communications Security, 1999.
[24] S. J. Wang, Y. R. Tsai, P. Y. Chen, “An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems,” Eighth International Conference on Intelligent Systems Design and Applications, 2008.
[25] S. P. Shantharajah, Dr. K. Duraiswamy, G. M. Kadhar Nawaz, “Key Management and Distribution for Authenticating Group Communication,'” International Conference on Industrial and Information Systems, August 2006.
[26] S. Zhu, C. Yao, D. Liu, S. Setia, and S. Jajodia, “Efficient Security Mechanisms for Overlay Multicast-based Content Distribution,” in Proc. of ACNS, June 2005.
[27] W. Trappe, J. Song, and K. J. R. Liu, “Key Management and Distribution for Secure Multimedia Multicast,” IEEE Transactions on Multimedia, vol. 5, no. 4, December 2003.
[28] X. Liu, T. Huang, L. Huo, and L. Mou, “A DRM Architecture for Manageable P2P Based IPTV System” In IEEE International Conference on Multimedia and Expo, pp. 899-902, 2007.
[29] X. Zhang, J. Liu, B. Li, and T.-S. P. Yum, “CoolStreaming/DONet: A Data-Driven Overlay Network for Peer-to-Peer Live Media Streaming,” in Proc. of IEEE INFOCOM, March 2005.
[30] Y. L. Huang, S. Shieh, F. S. Ho, J. C. Wang, “Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems,” IEEE Transactions on Multimedia, vol. 6, no. 5, October 2004.
校內:2020-01-01公開