skip to main content
10.1145/1461469.1461473acmotherconferencesArticle/Chapter ViewAbstractPublication PagessosocConference Proceedingsconference-collections
research-article

A key management solution for overlay-live-streaming

Published: 22 September 2008 Publication History

Abstract

Confidential communication of live-generated multimedia data distributed via application level multicast (ALM) still remains a mostly unaddressed subject even though some important usage scenarios, e.g. paid subscription services or personal video-streaming, are anticipated to gain more widespread use as the Internet continues to evolve into the common transport platform for all kinds of services. In this article, we examine the specific requirements for key management schemes to be used in ALM-based distribution systems and analyze existing key management approaches with respect to these requirements [1, 2, 3]. Based on the results of this analysis, we design a new key management scheme that combines ideas of the Logical Key Hierarchy (LKH) protocol [4, 5] and the Iolus approach [6]. We compare the resulting scheme to a simple approach that is based on pairwise keys between neighboring nodes without further key-hierarchy based optimization and that serves as a benchmark. Our results of a comparative simulation study clearly indicate the suitability of our scheme for ALM-based livestreaming.

References

[1]
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Comput. Surv., vol. 35, no. 3, pp. 309--329, 2003.
[2]
Y. Challal and H. Seba, "Group key management protocols: A novel taxonomy." {Online}. Available: http://citeseer.ist.psu.edu/challal05group.html
[3]
X. Zou, B. Ramamurthy, and S. S. Magliveras, Secure Group Communications Over Data Networks. Santa Clara, CA, USA: Springer-Verlag TELOS, 2004.
[4]
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8(1):16--30, 2000.
[5]
D. Wallner, E. Harder, and R. Agee, "Key management for multicast: Issues and architecture," 1999, rFC 2627.
[6]
S. Mittra, "Iolus: a framework for scalable secure multicasting," SIGCOMM Comput. Commun. Rev., vol. 27, no. 4, pp. 277--288, 1997.
[7]
P. Rodriguez, E. W. Biersack, and K. W. Ross, "Improving the Latency in the Web: Caching or Multicast?" in 3rd International WWW Caching Workshop, 1998.
[8]
Y. H. Chu, S. G. Rao, S. Seshan, and H. Zhang, "A Case for End System Multicast," IEEE Journal on Selected Areas in Communications, vol. 20, no. 8, pp. 1456--1471, Oct 2002.
[9]
M. Castro, P. Druschel, A. Kermarrec, A. Nandi, A. Rowstron, and A. Singh, "SplitStream: High-bandwidth multicast in cooperative environments," in 19th ACM Symposium on Operating Systems Principles, 2003, pp. 298--313.
[10]
T. Strufe, "A peer-to-peer-based approach for the transmission of live multimedia streams (German: Ein Peer-to-Peer-basierter Ansatz für die Live-Übertragung multimedialer Daten)," Ph.D. dissertation, TU Ilmenau, 2007.
[11]
S. Birrer and F. Bustamante, "Magellan: Performance-based, Cooperative Multicast," in International Workshop on Web Content Caching and Distribution, 2005, pp. 133--143.
[12]
E. Veloso, V. Almeida, W. Meira, A. Bestavros, and S. Jin, "A Hierarchical Characterization of a Live Streaming Media Workload," in ACM Internet Measurement Workshop, 2002, pp. 117--130.
[13]
S. Banerjee, B. Bhattacharjee, and C. Kommareddy, "Scalable application layer multicast," in ACM Computer Communication Review (SIGCOMM), 2002, pp. 205--217.
[14]
K. Sripanidkulchai, B. Maggs, and H. Zhang, "An analysis of live streaming workloads on the internet," Carnegie Mellon University, Oct. 2004.
[15]
Y. Challal and H. Seba, "Group key management protocols: A novel taxonomy," International Journal of Information Technology, vol. 2, no. 1, Dec. 2005.
[16]
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and efficient constructions," IETF, 1999.
[17]
D. Inoue and M. Kuroda, "FDLKH: fully decentralized key management scheme on logical key hierarchy," Lecture Notes in Computer Science, vol. 3089/2004, pp. 339--354, 2004.
[18]
C. Abad, W. Yurcik, and R. Campbell, "A survey and comparison of end-system overlay multicast solutions suitable for network-centric warfare," International Society for Optical Engineering proceedings series, vol. 5441, pp. 215--226, 2004.
[19]
H. Harney and C. Muckenhirn, "Group key management protocol (gkmp) specification," RFC 2093 (Experimental), July 1997. {Online}. Available: http://www.ietf.org/rfc/rfc2093.txt
[20]
H. Harney and C. Muckenhirn, "Group key management protocol (gkmp) architecture," RFC 2094 (Experimental), July 1997. {Online}. Available: http://www.ietf.org/rfc/rfc2094.txt
[21]
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in INFOCOMM'99, 1999. {Online}. Available: citeseer.ist.psu.edu/canetti99multicast.html
[22]
A. Perrig, D. Song, and D. Tygar, "Elk, a new protocol for efficient large-group key distribution," 2001. {Online}. Available: citeseer.ist.psu.edu/perrig01elk.html
[23]
B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang, "Secure group communications for wireless networks," Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, vol. 1, pp. 113--117 vol. 1, 2001.
[24]
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement," University of California, Irvine, 2002.
[25]
Y. Kim, A. Perrig, and Gene Tsudik, "Communication-efficient group key agreement." {Online}. Available: citeseer.ist.psu.edu/kim01communicationefficient.html
[26]
T. Strufe, J. Wildhagen, and G. Schäfer, "Towards the construction of Attack Resistant and Efficient Overlay Streaming Topologies," in 2nd International Workshop on Security and Trust Management, 2006, pp. 108--118.
[27]
W. Dai, Crypto++ v5.2.1, Aug. 2006.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SOSOC '08: Proceedings of the workshop on Security in Opportunistic and SOCial networks
September 2008
28 pages
ISBN:9781450378789
DOI:10.1145/1461469
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Create-Net
  • INRIA: Institut Natl de Recherche en Info et en Automatique

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DH
  2. Iolus
  3. LKH
  4. application-layer multicast
  5. content distribution
  6. key management
  7. peer-to-peer

Qualifiers

  • Research-article

Conference

Securecomm08
Sponsor:
  • INRIA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 104
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media