[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A secure multicast protocol with copyright protection

Published: 01 April 2002 Publication History

Abstract

We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applications that can benefit from using our secure multicast protocol, e.g., the commercial pay-per-view video multicast, or highly secure military intelligence video conference. Our secure multicast protocol is designed to achieve the following goals. (1) It can run in any open network environment. It does not rely on any security mechanism on intermediate network switches or routers. (2) It can be built on top of any existing multicast architecture. (3) Our key distribution protocol is both secure and robust in the presence of long delay or membership message. (4) It can support dynamic group membership, e.g., JOIN/LEAVE/EXPEL operations, in a network bandwidth efficient manner. (5) It can provide copyright protection for the information provider. (6) It can help to identify insiders in the multicast session who are leaking information to the outside world. We have implemented a prototype system which validates our secure multicast protocol and evaluated it against various performance matrices. The experimental results are very encouraging, but also show where new engineering approaches need to be deployed to conform fully to the design goals.

References

[1]
Msec working group. Available via http://www.securemulticast.org/msec-index.htm.]]
[2]
The secure multicast research group. Available via http://www.securemulticast.org/smug-drafts.htm.]]
[3]
I. Agi and L. Gong. An empirical study of Mpeg video trandmission. In Proceedings of the Internet Society Symposium on Network and Distributed System Security, San Diego, CA, February 1996.]]
[4]
D. Balenson, D. McGrew, and A. Sherman. Key management for large dynamic groups: One-way function trees and amortized initialization. Ietf draft, August 2000.]]
[5]
A. Ballardie. Scalable multicast key distribution. Rfc1949, May 1996.]]
[6]
A. Ballardie. Core based trees (CBT) multicast architecture. Rfc2201, September 1997.]]
[7]
S. Banerjee and B. Bhattacharjee. Scalable secure group communication over ip multicast. In Proceeding of ninth International Conference on Network Protocols, Riverside, CA, November 2001.]]
[8]
M. Barni, F. Bartolini, V. Cappellini, and A. Piva. Robust watermarking of still images for copyright protection. In SPIE Proceedings '99, volume 3657, pages 46-47, January 1999.]]
[9]
C. Becker and U. Wille. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communication Security, San Francisco, CA, November 1998.]]
[10]
G. R. Blakley, C. Meadows, and G. B. Purdy. Fingerprinting long forgiving messages. In Advances in Cryptology, Proceedings of CRYPTO '85, vol. 218 of Lecture Notes in Computer Science, pages 180-189. Springer-Verlag, 1986.]]
[11]
D. Boneh and J. Show. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897-1905, September 1998.]]
[12]
J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. In Proceedings of IEEE INFOCOM'94, volume 3, pages 1278-1287, Toronto, June 1994.]]
[13]
B. Brisco and I. Fairman. Marks: Multicast key management using arbitrarily revealed key sequences. In First International Workshop on Networked Group Communication, November 1999.]]
[14]
I. Brown, C. Perkins, and J. Crowcroft. Watercasting: Distributed Watermarking of Multicast Media. In Proceedings of the First International Workshop on Networked Group Communication, pages 286-300, Pisa, Italy, November 1999.]]
[15]
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naorr, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In Proceedings of INFOCOM99, March 1999.]]
[16]
G. Caronni. Assuring Ownership Rights for Digital Images. In Proceedings of Reliable IT Systems, VIS'95. Vieweg Publishing Company, 1995.]]
[17]
I. Chang, R. Engel, D. Kandlur, and D. Saha. A toolkit for secure internet multicast. Manuscript, 1998.]]
[18]
G. H. Chiou and W. T. Chen. Secure broadcast using the secure lock. IEEE Transactions on Software Engineering, 15(8):929-934, August 1989.]]
[19]
B. A. Chor, A. Fiat, and M. Naor. Tracing traitors. In Advances in Cryptology, Proceedings of CRYPTO '94, vol. 839 of Lecture Notes in Computer Science, pages 257-270. Springer-Verlag, 1994.]]
[20]
H. Chu, L. Qiao, and K. Nahrstedt. A secure multicast prorocol with copyright protection. In Proceedings of IS&T/SPIE's Symposium on Electronic Imaging: Science and Technology, San Jose, CA, January 1999.]]
[21]
Y. Chu, S. Rao, S. Seshan, and H. Zhang. Enabling conferencing applications on the internet using an overlay multicast architecture. In Proceedings of ACM SIGCOMM'01, San Diego, CA, August 2001.]]
[22]
S. Craver, N. Memon, B. Yeo, and M. Yeung. Can invisible watermarks resolve rightful ownerships? In Proceedings of the IS&T/SPIE Conference on Storage and Retrieval for Image and Video Databases V, volume 3022, pages 310-321, San Jose, CA, February 1997.]]
[23]
S. Deering, D. Estrin, D. Farinacci, V. Jacobson, C. Liu, and L. Wei. The PIM Architecture for Wide-Area Multicast Routing. In IEEE/ACM Transactions on Networking, volume 4, April 1996.]]
[24]
T. Hardjono, B. Cain, and N. Doraswamy. A framework for grop key management for multicast security. Ietf internet draft(work in progess), August 2000.]]
[25]
T. Hardjono, B. Patel, and M. Shah. Intra-domain group key management protocol. Ietf internet draft(work in progess), September 2000.]]
[26]
H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture. Rfc2094, July 1997.]]
[27]
H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Specification. Rfc2093, July 1997.]]
[28]
F. Hartung and B. Girod. Digital watermarking of uncompressed and compressed video. Signal Processing(Special Issue on Watermarking), 66:283-302, May 1998.]]
[29]
P. Judge and M. Ammar. Whim: Watermarking multicast video with a hierarchy of intermediaries. In Proceedings of NOSSDAV2000, Chapel Hill, NC, June 2000.]]
[30]
H. Kang, K. Kim, and S. Han. Watermarking techniques using the drawing exchange format(dxf) file. In Proceeding of ACM Multimedia 2001 Workshops, Ottawa, Canada, October 2001.]]
[31]
E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Proc. of 1995 IEEE workshop on Nonlinear Signal and Image Processing, pages 452-455, Neos Marmaras, Greece, June 1995.]]
[32]
Y. Li, Z. Chen, S. Tan, and R. Campbell. Security enhanced mpeg player. In Proceedings of IEEE First International Workshop on Multimedia Software Development(MMSD'96), Berlin, Germany, March 1996.]]
[33]
T. B. Maples and G. A. Spanos. Performance study of a selective encryption scheme for the security of networked, real-time video. In Proceedings of 4th International Conference on Computer Communication and Network, Las Vegas, Navada, September 1995.]]
[34]
J. Meyer and F. Gadegast. Security mechanisms for multimedia data with the example mpeg-1 video. Available on www via http://www.powerweb.de/phade/phade.html.]]
[35]
S. Mittra. Iolus: A Framework for Scalable Secure Multicasting. In Proceedings of ACM SIGCOMM '97, Cannes, France, September 1997.]]
[36]
A. Perrig, D. Song, and J. D. Tygar. Elk, a new protocol for efficient large-group key distribution. In 2001 IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 2001.]]
[37]
L. Qiao and K. Nahrstedt. A New Algorithm for MPEG Video Encryption. In Proceedings of The First International Conference on Imaging Science, Systems, and Technology (CISST'97), pages 21-29, Las Vegas, Nevada, July 1997.]]
[38]
L. Qiao and K. Nahrstedt. Comparison of mpeg encryption algorithms. International Journal on Computers and Graphics(special Issue: Data Security in Image Communication and Network), 22(3), January 1998.]]
[39]
L. Qiao and K. Nahrstedt. Watermarking Method for MPEG Encoded Video: Towards Resolving Rightful Ownership. In IEEE Multimedia Computing and Systems, Austin, Texas, June 1998.]]
[40]
S. Rafaeli. A decentralised architecture for group key management. PhD appraisal, Lancaster University, Lancaster, UK, September 2000.]]
[41]
O. Rodeh, K. Birman, and D. Dolev. Optimized group rekey for group communication systems. Technical report, Hebrew University, 1999.]]
[42]
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, 2nd edition, December 1995.]]
[43]
S. Setia, S. Koussih, and S. Jajodia. Kronos: A scalable group re-keying approach for secure multicast. In 2000 IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.]]
[44]
C. Shi and B. Bhargava. An efficient mpeg video encryption algorithm. In Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems, West Lafayette, Indiana, October 1998.]]
[45]
C. Shi and B. Bhargava. A fast mpeg video encryption algorithm. In Proceedings of the 6th ACM International Multimedia Conference, Bristol, UK, September 1998.]]
[46]
V. Sridhar, X. Li, and M. A. Nascimento. Towards robust hidden watermarking using multiple quasi-circles. In Proceeding of ACM Multimedia 2001 Workshops, Ottawa, Canada, October 2001.]]
[47]
M. Steinbach, J. Dittmann, and C. Vielhauer. Platajanus: An audio annotation watermarking framework. In Proceeding of ACM Multimedia 2001 Workshops, Ottawa, Canada, October 2001.]]
[48]
M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. IEEE Transaction on Parallel and Distributed Systems, 11(8):769-780, August 2000.]]
[49]
M. A. Suhail and M. M. Dawoud. Watermarking security enhancement using filter parameterization in feature domain. In Proceeding of ACM Multimedia 2001 Workshops, Ottawa, Canada, October 2001.]]
[50]
K. Tanaka, Y. Nakamura, and K. Matsui. Embedding Secret Information into a Dithered Multi-level Image. In Proceedings of 1990 IEEE Military Communications Conference, pages 216-220, 1990.]]
[51]
L. Tang. Methods for encrypting and decrypting mpeg video data efficiently. In Proceedings of The Fourth ACM Inernational Multimedia Conference(ACM Multimedia'96), Boston, MA, November 1996.]]
[52]
L. F. Turner. Digital Data Security System. Patent IPN WO 89/08915, 1989.]]
[53]
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A Digital Watermark. In Proceedings of the International Conference on Image Processing, volume 2, pages 86-90, IEEE, 1994.]]
[54]
D. Waitzman, S. Deering, and C. Partridge. Distance Vector Multicast Routing Protocol. Rfc1075, November 1988.]]
[55]
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner. The versakey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications(special Issue on Middleware), 17(9):1614-1631, September 1999.]]
[56]
D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. Rfc2627, June 1999.]]
[57]
W. Zeng and B. Liu. On resolving rightful ownships of digital images by invisible watermarks. In IEEE International Conference on Image Processing, volume 1, pages 552-555, Santa Barbara, CA, October 1997.]]

Cited By

View all
  • (2020)Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast EncryptionSensors10.3390/s2011314020:11(3140)Online publication date: 2-Jun-2020
  • (2020)Group Key Management Scheme for Multicast Communication Fog Computing NetworksProcesses10.3390/pr81013008:10(1300)Online publication date: 16-Oct-2020
  • (2018)Fingerprinting for multimedia content broadcasting systemJournal of Information Security and Applications10.1016/j.jisa.2018.06.00241(52-61)Online publication date: Aug-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 32, Issue 2
April 2002
54 pages
ISSN:0146-4833
DOI:10.1145/568567
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2002
Published in SIGCOMM-CCR Volume 32, Issue 2

Check for updates

Author Tags

  1. copyright protection
  2. key distribution
  3. multicast security
  4. watermark

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)3
Reflects downloads up to 09 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast EncryptionSensors10.3390/s2011314020:11(3140)Online publication date: 2-Jun-2020
  • (2020)Group Key Management Scheme for Multicast Communication Fog Computing NetworksProcesses10.3390/pr81013008:10(1300)Online publication date: 16-Oct-2020
  • (2018)Fingerprinting for multimedia content broadcasting systemJournal of Information Security and Applications10.1016/j.jisa.2018.06.00241(52-61)Online publication date: Aug-2018
  • (2018)Efficient Group Key Management for Non-reliable Link NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4956-y98:2(1955-1973)Online publication date: 1-Jan-2018
  • (2017)Secure data management system with traceability against internal leakage2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)10.1109/APSIPA.2017.8282268(1486-1494)Online publication date: Dec-2017
  • (2015)Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group KeySymmetry10.3390/sym70315677:3(1567-1586)Online publication date: 27-Aug-2015
  • (2015)Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage CostProceedings of the Third International Symposium on Women in Computing and Informatics10.1145/2791405.2791440(564-572)Online publication date: 10-Aug-2015
  • (2015)Scalable end-to-end security for advanced metering infrastructuresInformation Systems10.1016/j.is.2015.01.00453:C(213-223)Online publication date: 1-Oct-2015
  • (2014)Attribute Based Group Key ManagementTransactions on Data Privacy10.5555/2870614.28706197:3(309-336)Online publication date: 1-Dec-2014
  • (2013)Key ManagementIT Policy and Ethics10.4018/978-1-4666-2919-6.ch033(728-753)Online publication date: 2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media