期刊文献+

新一代视频业务安全解决方案

A New Generation of Video Service Security Solutions
下载PDF
导出
摘要 视频业务互联网化给视频系统的存储、传输、内容属性、应用等各环节带来了相应的信息安全风险。分析了传统视频业务安全方案的不足,并提出了新一代视频业务安全解决方案,从根本上提升了视频业务的系统安全性和内容安全性,有效解决了视频业务运营所面临的安全问题。此外,还展望了视频业务安全的未来研究方向。 Internet-based video service brings information security risk to each part in the system, such as storage, transmission, content properties and applications. In this paper, the disadvantages of traditional solutions are analyzed, and a new generation of video service security solutions is proposed. In this way, system safety and content safety are enhanced, and safety problems of video business operation are solved. Moreover, the future research directions of video service security are also pointed out.
作者 华新海 贺镇海 刘志军 HUA Xinhai;HE Zhenhai;LIU Zhijun(ZTE Corporation, Nanjing 210012, China)
出处 《中兴通讯技术》 2017年第2期56-59,共4页 ZTE Technology Journal
关键词 视频业务 安全运维 防篡改 安全云 图像识别 video service security operation tamper proofing security cloud image recognition
  • 相关文献

参考文献3

二级参考文献45

  • 1Arsinte R, Lupu E. Analysis of architectures for audio-video services distribution in hybrid IPTV/DVB-C networks. Proceedings of IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania, 2014.
  • 2Faronk S S, Raju K N. Dynamic based IFFV services through virtual environment in cloud resources. International Journal of hmovative Technology and Research, 2014, 2(5): 1413-1417.
  • 3Yim J, Lee G, le T, et al. Review of IPTV system architectures. Advanced Science and Technology Letters, 2014(46): 83-86.
  • 4ETS1 GS NFV-INF 001 VI.I,1. http://www.etsi.org/technologies- cluste/technologies/nfv, 2015.
  • 5ETSI GS NFV-MAN 001 VI.I.I. http://www.etsi.ortechnologics- clusters/technologienfv, 2014.
  • 6MANADHATA P K.Big Data for Security:Challenges,Opportunities,and Examples[C]//Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security,Raleigh,North Carolina,USA,2012.
  • 7YU S C,WANG C,REN K,et al.Achieving Secure,Scalable,and Fine-grained Data Access Control in Cloud Computing[C]//Proceedings of the INFOCOM'10,the 29th conference on Information communication,Piscataway,USA,2010:534-542.
  • 8BELARE M and ROGAWAY P.Introduction to Modern Cryptography[J].Ucsd Cse,2005:207.
  • 9GENTRY C,HALEVI S,SMART N P.Homomorphic Evaluation of The AES Circuit[M].Germany:Springer Berlin Heidelberg,2012.
  • 10CATALANO D.Paillier's Cryptosystem Revisited[C]//in Proceedings of the 8th ACM conference on Computer and Communications Security,PA,USA,2001:206-214.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部