Skip to main content
Log in

Data security over wireless transmission for enterprise multimedia security with fountain codes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

With the explosive growth of multimedia data, Enterprise Multimedia Security (EMS) is a serious matter to maintain enterprise information security. As the rise of social media applications triggers higher bandwidth demand and shorter end-to-end delay requirements, edge computing has emerged as a promising technique to reduce delay. Edge servers are often deployed around mobile devices via a one-hop wireless network connection. However, migrating multimedia data over wireless networks to edge servers for edge computing is vulnerable to eavesdroppers. Ensuring the security of enterprise multimedia data in the edge computing is a top priority. To cater for the data security over wireless transmisson for edge computing, window-based fountain codes, is treated as a feasible technology to compensate this gap. Based on the characteristics of the fountain codes, data security over wireless transmisson is implemented only when the target receiver accumulates enough coding packets in advance of the eavesdropper. In the general wireless transmission, the eavesdropper receives data packets or not depends on whether the wireless channel lose packets. To ensure data security, we introduce the constellation-rotation technique and interfering noise into wireless signal which can disturb the eavesdropper’s signal quality and increase the packet loss in the eavesdropper. Specifically, we study how to partition the video streaming into windows, which takes the end-to-end delay into consideration while guaranteeing lower intercept probability which indicates the probability video data is leaked to the eavesdropper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ahmad S, Hamzaoui R, Al-Akaidi MM (2011) Unequal error protection using fountain codes with applications to video communication. IEEE Trans Multimed 13 (1):92–101

    Article  Google Scholar 

  2. Bogino MC, Cataldi P, Grangetto M, Magli E, Olmo G (2007) Sliding-window digital fountain codes for streaming of multimedia contents. In: 2007 IEEE International symposium on circuits and systems, pp 3467–3470

  3. Bohli JM, Hessler A, Ugus O, Westhoff D (2009) Security enhanced multi-hop over the air reprogramming with fountain codes. In: 2009 IEEE 34th Conference on local computer networks, pp 850–857

  4. Byers JW, Luby M, Mitzenmacher M (2002) A digital fountain approach to asynchronous reliable multicast. IEEE J Selected Areas Commun 20(8):1528–1540

    Article  Google Scholar 

  5. Cataldi P, Grangetto M, Tillo T, Magli E, Olmo G (2010) Sliding-window raptor codes for efficient scalable wireless video broadcasting with unequal loss protection. IEEE Trans Image Process 19(6):1491–1503

    Article  MathSciNet  Google Scholar 

  6. Chen S, Pande A, Zeng K, Mohapatra P (2015) Live video forensics: source identification in lossy wireless networks. IEEE Trans Inform Forens Secur 10(1):28–39

    Article  Google Scholar 

  7. Diao Z (2017) Cloud-based support for massively multiplayer online role-playing games. Ph.D. thesis, University of Magdeburg, Germany. http://nbn-resolving.de/urn:nbn:de:gbv:ma9:1-9429

  8. Dong B, Chen Z, Wang HW, Tang LA, Zhang K, Lin Y, Li Z, Chen H (2017) Efficient discovery of abnormal event sequences in enterprise security systems. In: Proceedings of the 2017 ACM on conference on information and knowledge management, CIKM ’17. https://doi.org/http://doi.acm.org/10.1145/3132847.3132854. ACM, New York, pp 707–715, DOI https://doi.org/10.1145/3132847.3132854, (to appear in print)

  9. Du Q, Li W, Song H (2017) Security enhancement via dynamic fountain code for wireless multicast. In: International conference on wireless algorithms, systems, and applications, pp 509–521

  10. Du Q, Xu Y, Li W, Song H (2018) Security enhancement for multicast over internet of things by dynamically constructed fountain codes. Wirel Commun Mob Comput 2018:1–11

    Article  Google Scholar 

  11. Gong W, Qi L, Xu Y (2018) Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel Commun Mob Comput 2018:1–8

    Google Scholar 

  12. Hallman RA, Li S, Chang V (2018) 2nd international workshop on multimedia privacy and security. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security - CCS ’18, pp 2173–2174

  13. Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2017) Cloud-assisted secure video transmission and sharing framework for smart cities. Futur Gener Comput Syst 83:596–606

    Article  Google Scholar 

  14. Huang W, Xia Y, Ding L, Xu Y, Yang F, He D, Zhang W (2015) Hierarchical qoe model for wireless video streaming with fountain codes. In: 2015 IEEE international symposium on broadband multimedia systems and broadcasting, pp 1–6

  15. Huang T, Yi B, Yao W, Li W (2017) Unequal error protection scheme for image transmission based on regularized variable-node and expanding window fountain codes. Multimed Tools Appl 76(11):13,383–13,400

    Article  Google Scholar 

  16. Lee WC (1982) Mobile communications engineering. McGraw-Hill Professional

  17. Li W, Du Q, Sun L, Ren P, Wang Y (2016) Security enhanced via dynamic fountain code design for wireless delivery. In: 2016 IEEE Wireless communications and networking conference, pp 1–6

  18. Li T, Song T, Liang Y (2018) Wireless communications under hostile jamming: security and efficiency. Springer, Singapore

    Book  Google Scholar 

  19. Liva G, Paolini E, Chiani M (2010) Performance versus overhead for fountain codes over f q. IEEE Commun Lett 14(2):178–180

    Article  Google Scholar 

  20. López PG, Montresor A, Epema DHJ, Datta A, Higashino T, Iamnitchi A, Barcellos MP, Felber P, Rivierè E (2015) Edge-centric computing: vision and challenges. ACM Special Interest Group on Data Communication 45(5):37–42

    Google Scholar 

  21. Luby M (2002) Lt codes. In: The 43rd Annual IEEE symposium on foundations of computer science, 2002. Proceedings, p 271

  22. Massey JL (1988) An introduction to contemporary cryptology. Proc IEEE 76 (5):533–549

    Article  Google Scholar 

  23. Niu H, Iwai M, Sezaki K, Sun L, Du Q (2014) Exploiting fountain codes for secure wireless delivery. IEEE Commun Lett 18(5):777–780

    Article  Google Scholar 

  24. Qi L, Dou W, Wang W, Li G, Yu H, Wan S (2018) Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6:46,926–46,937

    Article  Google Scholar 

  25. Qi L, Zhang X, Dou W, Hu C, Yang C, Chen J (2018) A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Futur Gener Comput Syst 88:636–643

    Article  Google Scholar 

  26. Seba A, Nouali-Taboudjemat N, Badache N, Seba H (2019) A review on security challenges of wireless communications in disaster emergency response and crisis management situations. J Netw Comput Appl 126:150–161

    Article  Google Scholar 

  27. Sejdinovic D, Vukobratovic D, Doufexi A, Senk V, Piechocki RJ (2009) Expanding window fountain codes for unequal error protection. IEEE Trans Commun 57(9):2510–2516

    Article  Google Scholar 

  28. Shokrollahi A (2006) Raptor codes. IEEE Trans Inform Theory 14(6):2551–2567

    Article  MathSciNet  Google Scholar 

  29. Sorokin R, Rougier JL (2018) Video conference in the fog: an economical approach based on enterprise desktop grid. Annales Des munications 73:305–316

    Google Scholar 

  30. Stecklina O, Kornemann S, Grehl F, Jung R, Kranz T, Leander G, Schweer D, Mollus K, Westhoff D (2015) Custom-fit security for efficient and pollution-resistant multicast ota-programming with fountain codes. In: 2015 15th international conference on innovations for community services (I4CS), pp 1–8

  31. Sun K, Wu D (2016) Mpc-based delay-aware fountain codes for live video streaming. In: 2016 IEEE international conference on communications (ICC), pp 1–6

  32. Sun K, Zhang H, Wu D (2016) Delay-aware fountain codes for video streaming with optimal sampling strategy. arXiv:https://arxiv.org/abs/1605.03236

  33. Sun L, Ren P, Du Q, Wang Y (2016) Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans Indust Inform 12(1):291–300

    Article  Google Scholar 

  34. Sun K, Zhang H, Wu DO, Zhuang H (2018) Mpc-based delay-aware fountain codes for real-time video communication. IEEE Internet Things J 5(1):415–424

    Article  Google Scholar 

  35. Vukobratovic D, Stankovic V, Sejdinovic D, Stankovic L, Xiong Z (2009) Scalable video multicast using expanding window fountain codes. IEEE Trans Multimed 11(6):1094–1104

    Article  Google Scholar 

  36. Wagner J, Chakareski J, Frossard P (2006) Streaming of scalable video from multiple servers using rateless codes. In: 2006 IEEE international conference on multimedia and expo, pp 1501–1504

  37. Wang X, Chen W, Cao Z (2011) Sparc: superposition-aided rateless coding in wireless relay systems. IEEE Trans Veh Technol 60(9):4427–4438. https://doi.org/10.1109/TVT.2011.2171773

    Article  Google Scholar 

  38. Xu X, Fu S, Qi L, Zhang X, Liu Q, He Q, Li S (2018) An iot-oriented data placement method with privacy preservation in cloud environment. J Netw Comput Appl 124:148–157

    Article  Google Scholar 

  39. Xu X, Li Y, Huang T, Xue Y, Peng K, Qi L, Dou W (2019) An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J Netw Comput Appl 133:75–85

    Article  Google Scholar 

  40. Xu X, Liu Q, Luo Y, Peng K, Zhang X, Meng S, Qi L (2019) A computation offloading method over big data for iot-enabled cloud-edge computing. Futur Gener Comput Syst 95:522–533

    Article  Google Scholar 

  41. Xu X, Xue Y, Qi L, Yuan Y, Zhang X, Umer T, Wan S (2019) An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Futur Gener Comput Syst 96:89–100

    Article  Google Scholar 

  42. Yu H, Wang Y, Liu Y (2016) Cooperative video coding scheme with fountain code on the concentration on data size. In: 2016 IEEE international conference on network infrastructure and digital content (IC-NIDC), pp 337–341

  43. Zhang X, Du Q (2006) Adaptive low-complexity erasure-correcting code-based protocols for qos-driven mobile multicast services over wireless networks. IEEE Trans Veh Technol 55(5):1633–1647. https://doi.org/10.1109/TVT.2006.874547

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Key Research and Development Program of China (no. 2017YFB1001801), the National Science Foundation of China under Grant no. 61672276, and the Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wanchun Dou.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nie, H., Jiang, X., Tang, W. et al. Data security over wireless transmission for enterprise multimedia security with fountain codes. Multimed Tools Appl 79, 10781–10803 (2020). https://doi.org/10.1007/s11042-019-08479-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08479-z

Keywords

Navigation