Abstract
In recent years, interactive virtual environments such as Second Life, and virtual globe applications such as Google Earth, have become very popular. However, delivering massive amounts of interactive content to millions of potential users brings enormous challenges to content providers. Distributed peer-to-peer (P2P) approaches have thus been proposed to increase the system scalability in affordable ways. Building content delivery systems based on P2P approaches nevertheless creates security concerns for commercial vendors. This paper presents a generic system model for subscription-based service providers to adopt P2P-based, non-linear streaming for interactive content. We also propose solutions to the issue of content authentication, such that paying customers can be sure of the authenticity of the content retrieved from other users. Other practical security issues in an extended system model are also identified to allow further investigations in this problem space.
Similar content being viewed by others
References
Bergadano F, Cavagnino D, Crispo B (2000) Chained stream authentication. In: Proceedings of the 7th annual international workshop on selected areas in cryptography. Lecture notes in computer science, vol 2012. Springer, Berlin Heidelberg New York, pp 144–157
Bharambe A, Pang J, Seshan S (2006) Colyseus: a distributed architecture for online multiplayer games. In: Proceedings of the 3rd conference on 3rd symposium on networked systems design & implementation, vol 3, San Jose, pp 12–12
Bharambe A et al (2008) Donnybrook: enabling large-scale, high-speed, peer-to-peer games. In: Proceedings of SIGCOMM
Botev J et al (2008) The hyperverse—concepts for a federated and torrent-based “3d web”. In: Proceedings of MMVE
Burton DM (2005) Elementary number theory, 6th edn. ACM, New York
Cheng W, Ooi WT (2008) Receiver-driven view-dependent streaming of progressive mesh. In: Proceedings of NOSSDAV
Cheng W, Ooi WT, Mondet S, Grigoras R, Morin G (2007) An analytical model for progressive mesh streaming. In: Proceedings of the 15th international conference on multimedia, pp 737–746
Frey D et al (2008) Solipsis: a decentralized architecture for virtual environments. In: Proceedings of MMVE
Gennaro R, Rohatgi P (1997) How to sign digital streams. In: Proceedings of the 17th annual international cryptology conference on advances in cryptology. Lecture notes in computer science, vol 1294. pp 180–197
Hoppe H (1996) Progressive meshes. In: Proceedings of SIGGRAPH
Hu S, Chen J, Chen T (2006) VON: a scalable peer-to-peer network for virtual environments. IEEE Netw 20(4):22–31
Hu SY (2006) A case for 3d streaming on peer-to-peer networks. In: Proceedings of the eleventh international conference on 3D web technology, pp 57–63
Hu SY, Chang SC, Jiang JR (2008) Voronoi state management for peer-to-peer massively multiplayer online games. In: Proceedings of NIME
Hu SY et al (2008) Flod: A framework for peer-to-peer 3D streaming. In: Proceedings of IEEE INFOCOM
Huang GY, Hu SY, Jiang JR (2008) Scalable reputation management for p2p mmogs. In: Proceedings of MMVE
Josephson WK, Sirer EG, Schneider FB (2004) Peer-to-peer authentication with a distributed single sign-on service. In: Proceedings of the international workshop on peer-to-peer systems
Knutsson B, Lu H, Xu W, Hopkins B (2004) Peer-to-peer support for massively multiplayer games. In: Proceedings of IEEE INFOCOM
Li Z-T, Wang W-D, Zhang Y-J, Li W-M (2006) Source authentication of media streaming based on chains of Iso-hash clusters. In: Proceedings of the third international conference on autonomic and trusted computing, pp 398–407
Lin N-S, Huang T-H, Chen B-Y (2007) 3d model streaming based on jpeg 2000. IEEE Trans Consum Electron 53(1)
Lo V, Zhou D, Liu Y, GauthierDickey C, Li J (2005) Scalable supernode selection in peer-to-peer overlay networks. In: Proceedings of HOT-P2P
O’Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. In: Proceedings of the IEEE, vol 91, pp 2012–2040
Pathak V, Iftode L (2006) Byzantine fault tolerant public key authentication in peer-to-peer systems. Comput Networks 50(4):579–596
Pauly M, Gross M, Kobbelt LP (2002) Efficient simplification of point-sampled surfaces. In: Proceedings of IEEE visualization, pp 163–170
Pointcheval D, Stern J (1996) Security proofs for signature schemes. Advances in cryptology—EUROCRYPT ’96 1070/1996:387–398
Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. MIT/LCS/TR-212, MIT Laboratory for Computer Science
Rey C, Dugelay J (2002) A survey of watermarking algorithms for image authentication. EURASIP J Appl Signal Process 2002(6):613–621
Rosedale P, Ondrejka C (2003) Enabling player-created online worlds with grid computing and streaming. Gamasutra Resource Guide
Royan J, Gioia P, Cavagna R, Bouville C (2007) Network-based visualization of 3D landscapes and city models. IEEE CG&A 27(6):70–79
Schiele G et al (2008) Consistency management for peer-to-peer-based massively multiuser virtual environments. In: Proc IEEE virtual reality (IEEE VR) workshop massively multiuser virtual environment (MMVE)
Schneier B (1996) Applied cryptography, 2nd edn, chap 7. Wiley, New York
Singhal S, Zyda M (1999) Networked virtual environments: design and implementation. ACM, New York
Smit G, Havinga P, Helme A (1996) Survey of electronic payment methods and systems. In: Proceedings of Euromedia
Soriano E, Ballesteros FJ, Guardiola G (2007) Shad: a human-centered security architecture for the plan b operating system. In: Fifth annual ieee international conference on pervasive computing and communications, pp 272–282
Steiner JG, Neuman BC, Schiller JI (1988) An authentication service for open network system. Proceedings of the Winter 1988 Usenix Conference, pp 191–202
Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of SIGCOMM, pp 149–160
Sung WL, Hu SY, Jiang JR (2008) Selection strategies for peer-to-peer 3d streaming. In: Proceedings of NOSSDAV
Teler E, Lischinski D (2001) Streaming of complex 3d scenes for remote walkthroughs. CGF (EG 2001) 20(3)
The MIT Kerberos Team (1980) The network authentication protocol. http://web.mit.edu/Kerberos/
Wong P.-W. (1998) A public key watermark for image verification and authentication. In: Proceedings of International conference on image processing (ICIP 98), pp 455–459
Wu H, Cheung Y (2006) Public authentication of 3d mesh models. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on web intelligence, pp 940–948
Author information
Authors and Affiliations
Corresponding author
Additional information
This research was supported in part by the National Science Council of the Republic of China (Taiwan) under the grant NSC95-2221-E-008-048-MY3 and the grant NSC97-2221-E-008-060.
Rights and permissions
About this article
Cite this article
Chan, MC., Hu, SY. & Jiang, JR. Secure peer-to-peer 3D streaming. Multimed Tools Appl 45, 369–384 (2009). https://doi.org/10.1007/s11042-009-0294-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-009-0294-8