Skip to main content
Log in

SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Peer-to-Peer video-on-demand (P2P-VoD) streaming has become widespread in recent years. Unlike the traditional client-server model based video-streaming, the P2P-VoD leverages the peer’s capacity of upload bandwidth for the delivery of video contents in a distributed network. The P2P environment is susceptible to various security threats, in which the pollution attack is one of the potentially destructive threats. Moreover, video streaming is prone to other security challenges, such as authenticity, confidentiality, authorization, and integrity. There have been discussed four possible protection to the pollution attack: blacklisting, hash verification, traffic encryption, and chunk signing. In this paper, we present escrow-free identity-based signcryption (EF-IDSC) scheme for secure data transmission scheme in P2P-VoD streaming with an untrusted service provider. The proposed system enables a peer to establish a session key with other peer using the asymmetric key algorithm. The security analysis shows that the proposed P2P-VoS system prevents pollution attacks under well-known random oracle model and achieves privacy, confidentiality, and subscriber authentication simultaneously. The experimental evaluation shows that the proposed scheme has better computation and communication costs as compared to the related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Hammadi A, Talwar R, Singh H (2017) A case study on the architecture, design, implementation and testing of Fiber to the home (FTTH) green network in Kuwait

  2. Li B, Wang Z, Liu J, Zhu W (2013) Two decades of internet video streaming: a retrospective view. ACM Trans Multimed Comput Commun Appl 9(1s):33

    Article  Google Scholar 

  3. Ramzan N, Park H, Izquierdo E (2012) Video streaming over P2P networks: challenges and opportunities. Signal Process Image Commun 27(5):401–411

    Article  Google Scholar 

  4. Juluri P, Tamarapalli V, Medhi D (2016) Measurement of quality of experience of video-on-demand services: a survey. IEEE Commun Surv Tutorials 18(1):401–418

    Article  Google Scholar 

  5. Shen Z, Luo J, Zimmermann R, Vasilakos AV (2011) Peer-to-peer media streaming: insights and new developments. Proc IEEE 99(12):2089–2109

    Article  Google Scholar 

  6. Liu Y, Guo Y, Liang C (2008) A survey on peer-to-peer video streaming systems. Peer-to-peer Netw Appl 1(1):18–28

    Article  Google Scholar 

  7. Do TT, Hua KA, Tantaoui MA (2004) P2VoD: providing fault tolerant video-on-demand streaming in peer-to-peer environment. In: 2004 IEEE international conference on, communications, 2004, vol. 3, pp 1467–1472

  8. Goh CY, Yeo HS, Lim H, Hoong PK, Lim JWY, Tan IKT (2013) A comparative study of tree-based and mesh-based overlay p2p media streaming. J Multimed Ubiquitous Eng 8:97–106

    Article  Google Scholar 

  9. Magharei N, Rejaie R (2009) Prime: peer-to-peer receiver-driven mesh-based streaming. IEEE/ACM Trans Netw 17(4):1052–1065

    Article  Google Scholar 

  10. Picconi F, Massoulié L (2008) Is there a future for mesh-based live video streaming? In: 2008 eighth international conference on peer-to-peer computing, 2008, pp 289–298

  11. Li Z et al (2012) Watching videos from everywhere: a study of the PPTV mobile VoD system. In: Proceedings of the 2012 internet measurement conference, 2012, pp 185–198

  12. Kang X, Wu Y (2014) A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput Netw 72:62–73

    Article  Google Scholar 

  13. Lee S, Kim J, Ko S, Kim H (2016) A security analysis of paid subscription video-on-demand services for online learning. In 2016 International Conference on Software Security and Assurance (ICSSA), 2016, pp 43–48

  14. Xiang L, Ng DWK, Schober R, Wong VWS (2018) Cache-enabled physical layer security for video streaming in backhaul-limited cellular networks. IEEE Trans Wirel Commun 17(2):736–751

    Article  Google Scholar 

  15. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753

    Article  Google Scholar 

  16. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol

  17. Liang J, Naoumov N, Ross KW (2005) Efficient blacklisting and pollution-level estimation in p2p file-sharing systems. In: Asian internet engineering conference, 2005, pp 1–21

  18. Liang J, Kumar R, Ross KW (2006) The FastTrack overlay: a measurement study. Comput Netw 50(6):842–858

    Article  Google Scholar 

  19. Dhungel P, Hei X, Ross KW, Saxena N (2009) Pollution in P2P live video streaming. Int J Comput Networks Commun 1(2):99–110

    Google Scholar 

  20. Medina-López C, Shakirov I, Casado LG, González-Ruiz V (2016) On pollution attacks in fully connected P2P networks using trusted peers. In: International conference on intelligent systems design and applications, 2016, pp 144–153

  21. Dhungel P, Hei X, Ross KW, Saxena N (2007) The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 workshop on peer-to-peer streaming and IP-TV, 2007, pp 323–328

  22. Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption). In: Annual international cryptology conference, 1997, pp 165–179

  23. Abomhara M, Khalifa OO, Zakaria O, Zaidan AA, Zaidan BB, Alanazi HO (2010) Suitability of using symmetric key to secure multimedia data: an overview. J Appl Sci 10(15):1656–1661

    Article  Google Scholar 

  24. Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779

    Article  Google Scholar 

  25. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, 1984, pp 47–53

  26. Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference, 2001, pp 213–229

  27. Malone-Lee J (2002) Identity-based signcryption. IACR Cryptol ePrint Arch 2002:98

    Google Scholar 

  28. Sun D, Mu Y, Susilo W (2008) A generic construction of identity-based online/offline signcryption. In: International symposium on parallel and distributed processing with applications, 2008. ISPA’08, pp 707–712

  29. Sun D, Huang X, Mu Y, Susilo W (2008) Identity-based on-line/off-line signcryption. In: 2008 IFIP international conference on network and parallel computing, 2008, pp 34–41

  30. Selvi SSD, Vivek SS, Rangan CP (2010) Identity based online/offline signcryption scheme. IACR Cryptol ePrint Arch 2010:376

    Google Scholar 

  31. Lai J, Mu Y, Guo F (2017) Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int J Inf Secur 16(3):299–311

    Article  Google Scholar 

  32. Li F, Khan MK, Alghathbar K, Takagi T (2012) Identity-based online/offline signcryption for low power devices. J Netw Comput Appl 35(1):340–347

    Article  Google Scholar 

  33. Liu JK, Baek J, Zhou J (2010) Online/offline identity-based signcryption revisited. In: International conference on information security and cryptology, 2010, pp 36–51

  34. Li J, Zhao J, Zhang Y (2015) Certificateless online/offline signcryption scheme. Secur Commun Netw 8(11):1979–1990

    Article  Google Scholar 

  35. Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the internet of things. Wirel Netw 23(1):145–158

    Article  Google Scholar 

  36. Luo M, Tu M, Xu J (2014) A security communication model based on certificateless online/offline signcryption for internet of things. Secur Commun Netw 7(10):1560–1569

    Google Scholar 

  37. Shi W, Kumar N, Gong P, Chilamkurti N, Chang H (2015) On the security of a certificateless online/offline signcryption for internet of things. Peer-to-Peer Netw Appl 8(5):881–885

    Article  Google Scholar 

  38. Lu H, Li J, Guizani M (2014) Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans Parallel Distrib Syst 25(3):750–761

    Article  Google Scholar 

  39. Barbosa M, Farshim P (2008) Certificateless signcryption. In: Proceedings of the 2008 ACM symposium on information, computer and communications security, 2008, pp 369–372

  40. Saeed MES, Liu Q, Tian G, Gao B, Li F (2017) HOOSC: heterogeneous online/offline signcryption for the internet of things. Wirel Netw 24:1–20

    Article  Google Scholar 

  41. Kumar M, Chand S (2019) ESKI-IBE: efficient and secure key issuing identity-based encryption with cloud privacy centers. Multimed. Tool Appl 78:19753–19786

    Article  Google Scholar 

  42. Omala AA, Robert N, Li F (2016) A provably-secure transmission scheme for wireless body area networks. J Med Syst 40(11):247

    Article  Google Scholar 

  43. Miller V Use ofelliptic curve in cryptography. Adv Cryptol 85:417–426

  44. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    Article  MathSciNet  Google Scholar 

  45. Barreto PSLM, Naehrig M (2005) Pairing-friendly elliptic curves of prime order. In: International workshop on selected areas in cryptography, 2005, pp 319–331

  46. Wang H, Chen X, Wang W, Chan MY (2018) Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysis. IET Commun 12(17):2119–2131

    Article  Google Scholar 

  47. Fiandrotti A, Gaeta R, Grangetto M (2015) Simple countermeasures to mitigate the effect of pollution attack in network coding-based peer-to-peer live streaming. IEEE Trans Multimed 17(4):562–573

    Article  Google Scholar 

  48. Lynn B (2010) The pairing-based cryptography (PBC) library

  49. Cao X, Kou W, Du X (2010) A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf Sci (Ny) 180(15):2895–2903

    Article  MathSciNet  Google Scholar 

  50. Debiao H, Jianhua C, Jin H (2011) An ID-based proxy signature schemes without bilinear pairings. Ann Telecommun des télécommunications 66(11–12):657–662

    Article  Google Scholar 

  51. Barreto PSLM, Lynn B, Scott M (2003) On the selection of pairing-friendly groups. In: International workshop on selected areas in cryptography, 2003, pp 17–25

  52. Chung YF, Huang KH, Lai F, Chen TS (2007) ID-based digital signature scheme on the elliptic curve cryptosystem. Comput Stand Interfaces 29(6):601–604

    Article  Google Scholar 

  53. Kumar M, Katti CP, Saxena PC (2017) An untraceable identity-based blind signature scheme without pairing for E-cash payment system. In: International conference on ubiquitous communication and network computing, 2017

  54. Kumar M, Katti CP, Saxena PC (2017) A secure anonymous E-voting system using identity-based blind signature scheme. In: International conference on information systems security, 2017, pp 29–49

  55. Shim K-A, Lee Y-R, Park C-M (2013) EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw 11(1):182–189

    Article  Google Scholar 

Download references

Acknowledgements

This research work has been partially supported by the Council of Scientific and Industrial Research, a research and development organization in India, with sanctioned no. 09/263(1052)/2015 EMR-I and the UPE-II grant received from JNU. Additionally, the author would like to sincere thanks to the anonymous reviewers for their fruitful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahender Kumar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, M., Chand, S. SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider. Multimed Tools Appl 79, 6163–6190 (2020). https://doi.org/10.1007/s11042-019-08330-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08330-5

Keywords

Navigation