Abstract
The Peer-to-Peer video-on-demand (P2P-VoD) streaming has become widespread in recent years. Unlike the traditional client-server model based video-streaming, the P2P-VoD leverages the peer’s capacity of upload bandwidth for the delivery of video contents in a distributed network. The P2P environment is susceptible to various security threats, in which the pollution attack is one of the potentially destructive threats. Moreover, video streaming is prone to other security challenges, such as authenticity, confidentiality, authorization, and integrity. There have been discussed four possible protection to the pollution attack: blacklisting, hash verification, traffic encryption, and chunk signing. In this paper, we present escrow-free identity-based signcryption (EF-IDSC) scheme for secure data transmission scheme in P2P-VoD streaming with an untrusted service provider. The proposed system enables a peer to establish a session key with other peer using the asymmetric key algorithm. The security analysis shows that the proposed P2P-VoS system prevents pollution attacks under well-known random oracle model and achieves privacy, confidentiality, and subscriber authentication simultaneously. The experimental evaluation shows that the proposed scheme has better computation and communication costs as compared to the related schemes.
Similar content being viewed by others
References
Hammadi A, Talwar R, Singh H (2017) A case study on the architecture, design, implementation and testing of Fiber to the home (FTTH) green network in Kuwait
Li B, Wang Z, Liu J, Zhu W (2013) Two decades of internet video streaming: a retrospective view. ACM Trans Multimed Comput Commun Appl 9(1s):33
Ramzan N, Park H, Izquierdo E (2012) Video streaming over P2P networks: challenges and opportunities. Signal Process Image Commun 27(5):401–411
Juluri P, Tamarapalli V, Medhi D (2016) Measurement of quality of experience of video-on-demand services: a survey. IEEE Commun Surv Tutorials 18(1):401–418
Shen Z, Luo J, Zimmermann R, Vasilakos AV (2011) Peer-to-peer media streaming: insights and new developments. Proc IEEE 99(12):2089–2109
Liu Y, Guo Y, Liang C (2008) A survey on peer-to-peer video streaming systems. Peer-to-peer Netw Appl 1(1):18–28
Do TT, Hua KA, Tantaoui MA (2004) P2VoD: providing fault tolerant video-on-demand streaming in peer-to-peer environment. In: 2004 IEEE international conference on, communications, 2004, vol. 3, pp 1467–1472
Goh CY, Yeo HS, Lim H, Hoong PK, Lim JWY, Tan IKT (2013) A comparative study of tree-based and mesh-based overlay p2p media streaming. J Multimed Ubiquitous Eng 8:97–106
Magharei N, Rejaie R (2009) Prime: peer-to-peer receiver-driven mesh-based streaming. IEEE/ACM Trans Netw 17(4):1052–1065
Picconi F, Massoulié L (2008) Is there a future for mesh-based live video streaming? In: 2008 eighth international conference on peer-to-peer computing, 2008, pp 289–298
Li Z et al (2012) Watching videos from everywhere: a study of the PPTV mobile VoD system. In: Proceedings of the 2012 internet measurement conference, 2012, pp 185–198
Kang X, Wu Y (2014) A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput Netw 72:62–73
Lee S, Kim J, Ko S, Kim H (2016) A security analysis of paid subscription video-on-demand services for online learning. In 2016 International Conference on Software Security and Assurance (ICSSA), 2016, pp 43–48
**ang L, Ng DWK, Schober R, Wong VWS (2018) Cache-enabled physical layer security for video streaming in backhaul-limited cellular networks. IEEE Trans Wirel Commun 17(2):736–751
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753
Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol
Liang J, Naoumov N, Ross KW (2005) Efficient blacklisting and pollution-level estimation in p2p file-sharing systems. In: Asian internet engineering conference, 2005, pp 1–21
Liang J, Kumar R, Ross KW (2006) The FastTrack overlay: a measurement study. Comput Netw 50(6):842–858
Dhungel P, Hei X, Ross KW, Saxena N (2009) Pollution in P2P live video streaming. Int J Comput Networks Commun 1(2):99–110
Medina-López C, Shakirov I, Casado LG, González-Ruiz V (2016) On pollution attacks in fully connected P2P networks using trusted peers. In: International conference on intelligent systems design and applications, 2016, pp 144–153
Dhungel P, Hei X, Ross KW, Saxena N (2007) The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 workshop on peer-to-peer streaming and IP-TV, 2007, pp 323–328
Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption). In: Annual international cryptology conference, 1997, pp 165–179
Abomhara M, Khalifa OO, Zakaria O, Zaidan AA, Zaidan BB, Alanazi HO (2010) Suitability of using symmetric key to secure multimedia data: an overview. J Appl Sci 10(15):1656–1661
Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, 1984, pp 47–53
Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference, 2001, pp 213–229
Malone-Lee J (2002) Identity-based signcryption. IACR Cryptol ePrint Arch 2002:98
Sun D, Mu Y, Susilo W (2008) A generic construction of identity-based online/offline signcryption. In: International symposium on parallel and distributed processing with applications, 2008. ISPA’08, pp 707–712
Sun D, Huang X, Mu Y, Susilo W (2008) Identity-based on-line/off-line signcryption. In: 2008 IFIP international conference on network and parallel computing, 2008, pp 34–41
Selvi SSD, Vivek SS, Rangan CP (2010) Identity based online/offline signcryption scheme. IACR Cryptol ePrint Arch 2010:376
Lai J, Mu Y, Guo F (2017) Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int J Inf Secur 16(3):299–311
Li F, Khan MK, Alghathbar K, Takagi T (2012) Identity-based online/offline signcryption for low power devices. J Netw Comput Appl 35(1):340–347
Liu JK, Baek J, Zhou J (2010) Online/offline identity-based signcryption revisited. In: International conference on information security and cryptology, 2010, pp 36–51
Li J, Zhao J, Zhang Y (2015) Certificateless online/offline signcryption scheme. Secur Commun Netw 8(11):1979–1990
Li F, Han Y, ** C (2017) Certificateless online/offline signcryption for the internet of things. Wirel Netw 23(1):145–158
Luo M, Tu M, Xu J (2014) A security communication model based on certificateless online/offline signcryption for internet of things. Secur Commun Netw 7(10):1560–1569
Shi W, Kumar N, Gong P, Chilamkurti N, Chang H (2015) On the security of a certificateless online/offline signcryption for internet of things. Peer-to-Peer Netw Appl 8(5):881–885
Lu H, Li J, Guizani M (2014) Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans Parallel Distrib Syst 25(3):750–761
Barbosa M, Farshim P (2008) Certificateless signcryption. In: Proceedings of the 2008 ACM symposium on information, computer and communications security, 2008, pp 369–372
Saeed MES, Liu Q, Tian G, Gao B, Li F (2017) HOOSC: heterogeneous online/offline signcryption for the internet of things. Wirel Netw 24:1–20
Kumar M, Chand S (2019) ESKI-IBE: efficient and secure key issuing identity-based encryption with cloud privacy centers. Multimed. Tool Appl 78:19753–19786
Omala AA, Robert N, Li F (2016) A provably-secure transmission scheme for wireless body area networks. J Med Syst 40(11):247
Miller V Use ofelliptic curve in cryptography. Adv Cryptol 85:417–426
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209
Barreto PSLM, Naehrig M (2005) Pairing-friendly elliptic curves of prime order. In: International workshop on selected areas in cryptography, 2005, pp 319–331
Wang H, Chen X, Wang W, Chan MY (2018) Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysis. IET Commun 12(17):2119–2131
Fiandrotti A, Gaeta R, Grangetto M (2015) Simple countermeasures to mitigate the effect of pollution attack in network coding-based peer-to-peer live streaming. IEEE Trans Multimed 17(4):562–573
Lynn B (2010) The pairing-based cryptography (PBC) library
Cao X, Kou W, Du X (2010) A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf Sci (Ny) 180(15):2895–2903
Debiao H, Jianhua C, ** H (2011) An ID-based proxy signature schemes without bilinear pairings. Ann Telecommun des télécommunications 66(11–12):657–662
Barreto PSLM, Lynn B, Scott M (2003) On the selection of pairing-friendly groups. In: International workshop on selected areas in cryptography, 2003, pp 17–25
Chung YF, Huang KH, Lai F, Chen TS (2007) ID-based digital signature scheme on the elliptic curve cryptosystem. Comput Stand Interfaces 29(6):601–604
Kumar M, Katti CP, Saxena PC (2017) An untraceable identity-based blind signature scheme without pairing for E-cash payment system. In: International conference on ubiquitous communication and network computing, 2017
Kumar M, Katti CP, Saxena PC (2017) A secure anonymous E-voting system using identity-based blind signature scheme. In: International conference on information systems security, 2017, pp 29–49
Shim K-A, Lee Y-R, Park C-M (2013) EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw 11(1):182–189
Acknowledgements
This research work has been partially supported by the Council of Scientific and Industrial Research, a research and development organization in India, with sanctioned no. 09/263(1052)/2015 EMR-I and the UPE-II grant received from JNU. Additionally, the author would like to sincere thanks to the anonymous reviewers for their fruitful comments.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumar, M., Chand, S. SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider. Multimed Tools Appl 79, 6163–6190 (2020). https://doi.org/10.1007/s11042-019-08330-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08330-5