Skip to main content
Log in

Secure peer-to-peer 3D streaming

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, interactive virtual environments such as Second Life, and virtual globe applications such as Google Earth, have become very popular. However, delivering massive amounts of interactive content to millions of potential users brings enormous challenges to content providers. Distributed peer-to-peer (P2P) approaches have thus been proposed to increase the system scalability in affordable ways. Building content delivery systems based on P2P approaches nevertheless creates security concerns for commercial vendors. This paper presents a generic system model for subscription-based service providers to adopt P2P-based, non-linear streaming for interactive content. We also propose solutions to the issue of content authentication, such that paying customers can be sure of the authenticity of the content retrieved from other users. Other practical security issues in an extended system model are also identified to allow further investigations in this problem space.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. http://www.informationweek.com/news/showArticle.jhtml?articleID=197800179

  2. http://www.cryptopp.com/benchmarks.html

References

  1. Bergadano F, Cavagnino D, Crispo B (2000) Chained stream authentication. In: Proceedings of the 7th annual international workshop on selected areas in cryptography. Lecture notes in computer science, vol 2012. Springer, Berlin Heidelberg New York, pp 144–157

    Chapter  Google Scholar 

  2. Bharambe A, Pang J, Seshan S (2006) Colyseus: a distributed architecture for online multiplayer games. In: Proceedings of the 3rd conference on 3rd symposium on networked systems design & implementation, vol 3, San Jose, pp 12–12

  3. Bharambe A et al (2008) Donnybrook: enabling large-scale, high-speed, peer-to-peer games. In: Proceedings of SIGCOMM

  4. Botev J et al (2008) The hyperverse—concepts for a federated and torrent-based “3d web”. In: Proceedings of MMVE

  5. Burton DM (2005) Elementary number theory, 6th edn. ACM, New York

    MATH  Google Scholar 

  6. Cheng W, Ooi WT (2008) Receiver-driven view-dependent streaming of progressive mesh. In: Proceedings of NOSSDAV

  7. Cheng W, Ooi WT, Mondet S, Grigoras R, Morin G (2007) An analytical model for progressive mesh streaming. In: Proceedings of the 15th international conference on multimedia, pp 737–746

  8. Frey D et al (2008) Solipsis: a decentralized architecture for virtual environments. In: Proceedings of MMVE

  9. Gennaro R, Rohatgi P (1997) How to sign digital streams. In: Proceedings of the 17th annual international cryptology conference on advances in cryptology. Lecture notes in computer science, vol 1294. pp 180–197

  10. Hoppe H (1996) Progressive meshes. In: Proceedings of SIGGRAPH

  11. Hu S, Chen J, Chen T (2006) VON: a scalable peer-to-peer network for virtual environments. IEEE Netw 20(4):22–31

    Article  Google Scholar 

  12. Hu SY (2006) A case for 3d streaming on peer-to-peer networks. In: Proceedings of the eleventh international conference on 3D web technology, pp 57–63

  13. Hu SY, Chang SC, Jiang JR (2008) Voronoi state management for peer-to-peer massively multiplayer online games. In: Proceedings of NIME

  14. Hu SY et al (2008) Flod: A framework for peer-to-peer 3D streaming. In: Proceedings of IEEE INFOCOM

  15. Huang GY, Hu SY, Jiang JR (2008) Scalable reputation management for p2p mmogs. In: Proceedings of MMVE

  16. Josephson WK, Sirer EG, Schneider FB (2004) Peer-to-peer authentication with a distributed single sign-on service. In: Proceedings of the international workshop on peer-to-peer systems

  17. Knutsson B, Lu H, Xu W, Hopkins B (2004) Peer-to-peer support for massively multiplayer games. In: Proceedings of IEEE INFOCOM

  18. Li Z-T, Wang W-D, Zhang Y-J, Li W-M (2006) Source authentication of media streaming based on chains of Iso-hash clusters. In: Proceedings of the third international conference on autonomic and trusted computing, pp 398–407

  19. Lin N-S, Huang T-H, Chen B-Y (2007) 3d model streaming based on jpeg 2000. IEEE Trans Consum Electron 53(1)

  20. Lo V, Zhou D, Liu Y, GauthierDickey C, Li J (2005) Scalable supernode selection in peer-to-peer overlay networks. In: Proceedings of HOT-P2P

  21. O’Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. In: Proceedings of the IEEE, vol 91, pp 2012–2040

  22. Pathak V, Iftode L (2006) Byzantine fault tolerant public key authentication in peer-to-peer systems. Comput Networks 50(4):579–596

    Article  MATH  Google Scholar 

  23. Pauly M, Gross M, Kobbelt LP (2002) Efficient simplification of point-sampled surfaces. In: Proceedings of IEEE visualization, pp 163–170

  24. Pointcheval D, Stern J (1996) Security proofs for signature schemes. Advances in cryptology—EUROCRYPT ’96 1070/1996:387–398

  25. Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. MIT/LCS/TR-212, MIT Laboratory for Computer Science

  26. Rey C, Dugelay J (2002) A survey of watermarking algorithms for image authentication. EURASIP J Appl Signal Process 2002(6):613–621

    Article  MATH  Google Scholar 

  27. Rosedale P, Ondrejka C (2003) Enabling player-created online worlds with grid computing and streaming. Gamasutra Resource Guide

  28. Royan J, Gioia P, Cavagna R, Bouville C (2007) Network-based visualization of 3D landscapes and city models. IEEE CG&A 27(6):70–79

    Google Scholar 

  29. Schiele G et al (2008) Consistency management for peer-to-peer-based massively multiuser virtual environments. In: Proc IEEE virtual reality (IEEE VR) workshop massively multiuser virtual environment (MMVE)

  30. Schneier B (1996) Applied cryptography, 2nd edn, chap 7. Wiley, New York

    Google Scholar 

  31. Singhal S, Zyda M (1999) Networked virtual environments: design and implementation. ACM, New York

  32. Smit G, Havinga P, Helme A (1996) Survey of electronic payment methods and systems. In: Proceedings of Euromedia

  33. Soriano E, Ballesteros FJ, Guardiola G (2007) Shad: a human-centered security architecture for the plan b operating system. In: Fifth annual ieee international conference on pervasive computing and communications, pp 272–282

  34. Steiner JG, Neuman BC, Schiller JI (1988) An authentication service for open network system. Proceedings of the Winter 1988 Usenix Conference, pp 191–202

  35. Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of SIGCOMM, pp 149–160

  36. Sung WL, Hu SY, Jiang JR (2008) Selection strategies for peer-to-peer 3d streaming. In: Proceedings of NOSSDAV

  37. Teler E, Lischinski D (2001) Streaming of complex 3d scenes for remote walkthroughs. CGF (EG 2001) 20(3)

  38. The MIT Kerberos Team (1980) The network authentication protocol. http://web.mit.edu/Kerberos/

  39. Wong P.-W. (1998) A public key watermark for image verification and authentication. In: Proceedings of International conference on image processing (ICIP 98), pp 455–459

  40. Wu H, Cheung Y (2006) Public authentication of 3d mesh models. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on web intelligence, pp 940–948

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jehn-Ruey Jiang.

Additional information

This research was supported in part by the National Science Council of the Republic of China (Taiwan) under the grant NSC95-2221-E-008-048-MY3 and the grant NSC97-2221-E-008-060.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chan, MC., Hu, SY. & Jiang, JR. Secure peer-to-peer 3D streaming. Multimed Tools Appl 45, 369–384 (2009). https://doi.org/10.1007/s11042-009-0294-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-009-0294-8

Keywords

Navigation