Skip to main content

Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

  • 2196 Accesses

Abstract

Video streaming service is popular in recent years and it provides numerous information to users all over the region. Since it needs to provide low latency and high quality-of-services (QoS) service to end users, the processing of video flows should be fast and can be finished real-time. As more and more people concern about their privacy in daily life, it is desirable to present privacy-preserving protocols in video streaming service. An authenticating and billing scheme is described in this paper to enable privacy-preserving sequential video streaming services. Two kinds of anonymous certificates are used. When connecting to the network, a pseudonym certificate as the proxy ticket is used to fetch proxy service for user’s node so as to request for proxy-based Internet access. Another pseudonym certificate as video subscribing ticket is shown when each user starts a pay-per-video session, and then only a hash value is needed for each sequential video. Pseudonym certificates can hide each user’s identity and easily-verifiable hash values enable quick sequential authentications. A temporary random key is selected to protect video streaming data so that the scheme can resist active man-in-middle attacks in many scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adhikari, V.K., Guo, Y., Hao, F., Varvello, M., Hilt, V., Steiner, M., Zhang, Z.: Unreeling netflix: Understanding and improving multi-cdn movie delivery. In: Greenberg, A.G., Sohraby, K. (eds.) Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, 25–30 March 2012, pp. 1620–1628. IEEE (2012)

    Google Scholar 

  2. Wikipedia: Personally identifiable information, February 2017. https://en.wikipedia.org/wiki/Personally_identifiable_information

  3. Zhu, X., Pan, R., Prabhu, M.S., Dukkipati, N., Subramanian, V., Bonomi, F.: Layered internet video adaptation (LIVA): network-assisted bandwidth sharing and transient loss protection for video streaming. IEEE Trans. Multimedia 13(4), 720–732 (2011)

    Article  Google Scholar 

  4. Zhu, X., Zhu, J., Pan, R., Prabhu, M.S., Bonomi, F.: Cloud-assisted streaming for low-latency applications. In: International Conference on Computing, Networking and Communications, ICNC 2012, Maui, HI, USA, 30 January–2 February 2012, pp. 949–953. IEEE Computer Society (2012)

    Google Scholar 

  5. Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurrency Comput. Pract. Exp. 28(10), 2991–3005 (2016)

    Article  Google Scholar 

  6. Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May 2000, pp. 56–73. IEEE Computer Society (2000)

    Google Scholar 

  7. Zhang, Z., Sun, Q., Apostolopoulos, J.G., Wong, W.: Rate-distortion-authentication optimized streaming with generalized butterfly graph authentication. In: Proceedings of the International Conference on Image Processing, ICIP 2008, San Diego, California, USA, 12–15 October 2008, pp. 3096–3099. IEEE (2008)

    Google Scholar 

  8. Li, Z., Sun, Q., Lian, Y., Chen, C.W.: Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks. IEEE Trans. Multimedia 9(4), 837–850 (2007)

    Article  Google Scholar 

  9. Zhu, X., Chen, C.W.: A joint layered scheme for reliable and secure mobile JPEG-2000 streaming. TOMCCAP 8(3), 30 (2012)

    Article  Google Scholar 

  10. Zhu, X., Chen, C.W.: A joint source-channel adaptive scheme for wireless H.264/AVC video authentication. IEEE Trans. Inf. Forensics Secur. 11(1), 141–153 (2016)

    Article  Google Scholar 

  11. Rivest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 69–87. Springer, Heidelberg (1997). doi:10.1007/3-540-62494-5_6

    Chapter  Google Scholar 

  12. Au, M.H., Liu, J.K., Fang, J., Jiang, Z.L., Susilo, W., Zhou, J.: A new payment system for enhancing location privacy of electric vehicles. IEEE Trans. Veh. Technol. 63(1), 3–18 (2014)

    Article  Google Scholar 

  13. Hussain, R., Kim, D., Nogueira, M., Son, J., Tokuta, A.O., Oh, H.: PBF: a new privacy-aware billing framework for online electric vehicles with bidirectional auditability. CoRR abs/1504.05276 (2015)

    Google Scholar 

  14. Zhao, T., Wei, L., Zhang, C.: A secure and privacy-preserving billing scheme for online electric vehicles. In: IEEE 83rd Vehicular Technology Conference, VTC Spring 2016, Nanjing, China, 15–18 May 2016, pp. 1–5. IEEE (2016)

    Google Scholar 

  15. Rezaeifar, Z., Hussain, R., Kim, S., Oh, H.: A new privacy aware payment scheme for wireless charging of electric vehicles. Wireless Pers. Commun, 1–18 (2016)

    Google Scholar 

  16. Wang, D., Wang, P.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73, 41–57 (2014)

    Article  Google Scholar 

  17. Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2014, Istanbul, Turkey, 6–9 April 2014, pp. 3136–3141. IEEE (2014)

    Google Scholar 

  18. Odelu, V., Banerjee, S., Das, A.K., Chattopadhyay, S., Kumari, S., Li, X., Goswami, A.: A secure anonymity preserving authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun., May 2017

    Google Scholar 

  19. Neuman, B.C., Medvinsky, G.: Requirements for network payment: The netcheque perspective. In: COMPCON, pp. 32–36 (1995)

    Google Scholar 

  20. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_2

    Chapter  Google Scholar 

  21. Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., Vercauteren, F. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman and Hall/CRC (2005)

    Google Scholar 

  22. Fips, N.: Announcing the advanced encryption standard (aes). Nat. Inst. Stand. Technol. (NIST) 29(8), 2200–2203 (2001). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  23. Lai, X., Massey, J.L.: A proposal for a new block encryption standard. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 389–404. Springer, Heidelberg (1991). doi:10.1007/3-540-46877-3_35

    Chapter  Google Scholar 

  24. Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wireless Commun. 8(4), 1974–1983 (2009)

    Article  Google Scholar 

  25. Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for vanets with batch verification. Wireless Netw. 21(5), 1733–1743 (2015)

    Article  Google Scholar 

  26. Hussain, R., Kim, D., Nogueira, M., Son, J., Tokuta, A.O., Oh, H.: A new privacy-aware mutual authentication mechanism for charging-on-the-move in online electric vehicles. In: 11th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2015, Shenzhen, China, 16–18 December 2015, pp. 108–115. IEEE Computer Society (2015)

    Google Scholar 

  27. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgment

This work is supported by National Natural Science Foundation of China, Grant (no. 61672411 and U1401251), National Key Research and Development Program of China Grant (no. 2017YFB0802201), Natural Science Basic Research Plan in Shaanxi Province of China, Grant (no. 2016JM6007), Major Basic Research Program of Shaanxi Province Natural Science Foundation Research Project (No. 2016ZDJC-04), China 111 Program (No. B16037) and the Research Fund for the Doctoral Program of Higher Education of China (No. 20130203120003). The authors gratefully acknowledge the anonymous reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingwen Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhao, X., Li, H. (2017). Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics