DocumentCode :
1521165
Title :
A Trapdoor Hash-Based Mechanism for Stream Authentication
Author :
Chandrasekhar, Santosh ; Chakrabarti, Saikat ; Singhal, Mukesh
Author_Institution :
Dept. of Comput. Sci., Univ. of Kentucky, Lexington, KY, USA
Volume :
9
Issue :
5
fYear :
2012
Firstpage :
699
Lastpage :
713
Abstract :
Digital streaming Internet applications such as online gaming, multimedia playback, presentations, news feeds, and stock quotes involve end-users with very low tolerance for high latency, low data rates, and playback interruption. To protect such delay-sensitive streams against malicious attacks, security mechanisms need to be designed to efficiently process long sequence of bits. We study the problem of efficient authentication for real-time and delay-sensitive streams commonly seen in content distribution, multicast, and peer-to-peer networks. We propose a novel signature amortization technique based on trapdoor hash functions for authenticating individual data blocks in a stream. Our technique provides: 1) Resilience against transmission losses of intermediate blocks in the stream; 2) Small and constant memory/compute requirements at the sender and receiver; 3) Minimal constant communication overhead needed for transmission of authenticating information. Our proposed technique renders authentication of digital streams practical and efficient. We substantiate this claim by constructing DL-SA, a discrete-log-based instantiation of the proposed technique. DL-SA provides adaptive stream verification, where the receiver has control over modulating computation cost versus buffer size. Our performance analysis demonstrates that DL-SA incurs the least per-block communication and signature generation overheads compared to existing schemes with comparable features.
Keywords :
content management; cryptography; delays; digital signatures; media streaming; multicast communication; peer-to-peer computing; performance evaluation; constant memory requirements; content distribution; delay-sensitive stream authentication; delay-sensitive streams; digital stream authentication; digital streaming Internet applications; information authentication; intermediate block transmission losses; least per-block communication; long bit sequence; malicious attacks; minimal constant communication overhead; multicast networks; multimedia playback; news feeds; online gaming; peer-to-peer networks; playback interruption; real-time stream authentication; security mechanisms; signature generation overheads; stock quotes; trapdoor hash-based mechanism; Authentication; Delay; Media; Real time systems; Receivers; Servers; Stream authentication; content distribution; cryptography; digital signatures; signature amortization; trapdoor hash functions.;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2012.48
Filename :
6203506
Link To Document :
بازگشت