期刊文献+

NDN网络下一种基于I帧加密的在线视频安全访问控制研究 被引量:1

Based I frame encryption online video access control mechanism in NDN
下载PDF
导出
摘要 命名数据网络(NDN)因其路由缓冲和组播特性,在解决高清消费类视频大数据量、突发式集中请求时有着得天独厚的优势。然而,也正是路由缓冲和组播特性为数据的安全性带来了很多新的挑战。基于NDN网络环境,充分研究分析了当前主流的H.264/AVC视频压缩编码标准,制定了以I帧为加密对象,结合祖冲之序列密码算法(ZUC)进行实时乱数流和视频帧流同步的加密,并在Consumer-Producer API基础上研究实现了NDN网络下视频点播的加密流程。在ndn SIM仿真得出,同样的网络模型下通过提出的设计方案,可以保证安全可控的同时,有效地降低网络流量开销,并且可以支持更多的视频请求者同时访问。 Named Data Networking(NDN) routing includes butter and multicast characters. It has huge advantages on big volume video traffic transferring and high burst traffic. However, due to buffer and multicast characters, it brings huge challenge on the security problem. In this paper, we analyze the standard H.264/AVC and make contribution on treating I frame as the object and sequence combined with ZUC algorithm and the key agreement for real-time random stream and stream video frame synchronization of encryption. Then based on Consumer-Producer API, we also develop Live and Prerecorded Video Streaming of the encryption process. The ndnSIM simulation model under the same network through the scheme proposed in this dissertation can ensure safety control while effectively reduce network traffic overhead, and can support more video simultaneously access request.
作者 唐金艺 江玮 杨磊 Tang Jinyi;Jiang Wei;Yang lei(The Chinese People's Liberation Army 91977 Troops,Hydro-Meteorological Center of Navy,Beijing 100084)
机构地区 中国人民解放军
出处 《网络空间安全》 2018年第4期52-58,共7页 Cyberspace Security
关键词 NDN H.264/AVC 视频加密 访问控制 NDN H.264/AVC video encryption access control
  • 相关文献

参考文献3

二级参考文献38

  • 1李子木 吴建平 李星.CERNET高性能网络信息服务体系结构的研究[A]..见:CERNET 2000学术年会论文集[C].上海,2000.841~846.
  • 2李子木 吴建平 李星.Internet高速内容分发网络技术的研究:技术报告[R].清华大学,2000-12..
  • 3吴乐南.数据压缩的原理与应用[M].北京:电子工业出版社,1994..
  • 4王汇源.数字图象通讯原理与技术[M].北京:国防工业出版社,2000..
  • 5Guner Arslan,Magesh Valliappan.Quality Assessment of Compression Techniques for Synthetic Aperture RadarImage[A].ICIP'99 IEEE computer society[C].Japan:kobe,1999,Ⅲ:857-861.
  • 6Saltzer. J.H., Reed. D.P., Clark. D.D. End-To-End Arguments in System Design[J], ACM TOCS, Vol 2, Number 4,November 1984, 277-288.
  • 7David D, Clark. The Design Philosophy of the DARPA Internet Protocols[C]. ACM SIGCOMM 1988.
  • 8A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti and S. Shenker. Naming in Content-Oriented Architectures[C]. In Proc of SIGCOMM Workshop on ICN, 2011.
  • 9CCNx project[EB/OL], https://www.ccnx.org/, 2011-12-12.
  • 10A. Anand, F. Dogar, D. Han, B. Li, H. Lira, M. Machadoy, W. Wu,A. Akella, D. Andersen, J. Byersy, S. Seshan, and P. Steenkiste. XIA:An Architecture for an Evolvable and Trustworthy 'Internet[R]. Technical Report CMU-CS-11-100, CMU, February 2011.

共引文献83

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部