SlideShare a Scribd company logo
1 of 22
Download to read offline
Framework for Preserving Security
and Privacy in Peer-to-Peer
Content Distribution Systems
Amna Qureshi, David Megías and Helena Rifà-Pous
KISON-IN3
1
11th February, 2015UOC Research Showcase
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
• Introduction
• State-of-the-Art
• Secure and Privacy-Preserving Content Distribution Framework
• Experimental and Simulation Results
• Conclusions and Future Work
Outline
2
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
• Multimedia producers
o Protection of copyright
3
Introduction
Content Protection
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
• End users
o Protection of user-related information
Privacy Protection
Introduction
4
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Copyright Infringement in P2P Content Distribution Systems
• Conflict between content providers and end users:
o Reconciliation of user privacy with content protection.
• Trade-off between watermarking properies:
o Robustness, transparency and capacity.
• Harmonization between accountability and anonymity:
o Revocable privacy for an end user.
• Merging collusion-resistant fingerprinting and secure embedding scheme.
• Computational and distribution efficiency:
o Low computational and communicational burdens for the content providers and the end
users.
5
Introduction
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Research Challenges
6
State-of-the-Art
Security Properties for Content Providers
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Copyright
protection
Data
privacy
Traceablity
Data
integrity
Copy
prevention
Resistance
against
attacks
User privacy
Protection of real
identity
Unlinkability
Resistance
against de-
anonymization
attacks
Data privacy
Available to
authorized users
only
Protection
against
malicious
attacks
Privacy Properties for End users
7
State-of-the-Art
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
P2P
Systems
Content
Protection
Privacy
Protection
Revocable
PrivacyCopyright
Protection
Traceability User Data
Megías
(2014)
Yes Yes Yes Yes Yes
Megías & Domingo-Ferrer
(2014)
Yes Yes Yes Yes Yes
Domingo-Ferrer & Megías
(2013)
Yes Yes Yes Yes Yes
P2P
Systems
Robustness and Security against Attacks
Signal
Processing
Attacks
Collusion Attacks
Communication
AttacksContent Protection
Systems
Privacy
Protection
Systems
Megías
(2014)
Yes Yes Yes Yes
Megías & Domingo-Ferrer
(2014)
Yes Yes Yes Yes
Comparative Analysis of Secure and Privacy-Preserving P2P Content Distribution Systems
8
Security and Privacy-Preserving Content
Distribution Framework
Overview of the Framework
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
P2P
network
Trust
infrastructures
Building
blocks
Hybrid P2P Public key support Embedding domain
Trusted third
parties with limited
services
Embedding algorithm
Collusion-resistant
fingerprinting codes
Public key
cryptosystem
PseudoTrust model
9
Security and Privacy-Preserving Content
Distribution Framework
Overview of the Framework
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Parties
involved
Merchant
General
assumptions
Security
assumptions
Assumptions
Design
requirements
Threat
model
Buyer
Super peer
Monitor
Judge
Certification
authority
Security
requirements
Privacy
requirements
Watermarking
attacks
Collusion attacks
Framing attacks
Communication
attacks
10
Protocols of the Framework
File Partitioning Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Merchant Multimedia
content
DWT
Transform
Approximation coefficients
Detail coefficients
Monitor
Fingerprint
generation
Embed fingerprint into
approximation coefficients
Base file
Supplementary file
11
Protocols of the Framework
Base File Distribution Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
9. Buyer decrypts
EK*pBi(BF) using
secret key
Merchant
Monitor
Buyer
4. fi Generation
5. fi Encryption with K*pBi
7. Embedding EK*pBi (f)
into EK*pBi (X)
EK*pBi (X)
EKpB(X)EKpB(f) => EK*pBi(BF)
EK*pBi (f)
10. Fingerprinted BF
12
Protocols of the Framework
Supplementary File Distribution Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Merchant
Certification
Authority
P2P Network
Pseudonyms
and
signed
certificate
acquisation
13
Protocols of the Framework
Traitor-Tracing and Dispute Resolution Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Merchant
Monitor
Judge
Certification
Authority
Multimedia
content
Collusion
attack
Set of
colluders
14
Security and Privacy-Preserving Content
Distribution Framework
Security Analysis of BF Distribution Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
• Buyer frameproofness
• Non-repudiation
• Revocable privacy
• Anonymity
• Traceability
• Collusion resistance
• Unlinkability
Security Analysis of SF Distribution Protocol
• Impersonation
• Man-in-the-middle attack
• Replay attack
• Leakage of a secret number
used in pseudo-idenity
generation
15
Security and Privacy-Preserving Content
Distribution Framework
Security against Collusion Attacks
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
No. of
Colluders
No. of Colluders Detected for Attacks in the
Framework for a Video File
U Average Minimum Maximum Median
2 2 2 2 2
3 3 3 3 3
4 4 4 4 4
5 5 4 4 5
16
Experimental and Simulation Results
Details of Audio Files
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Loopy
Music
Huge
wav
Aasan
Nai
Yahan
Duration
(min:secs)
00:10 00:17 03:34
Original Size
(MB)
0.89 2.97 36.01
Base File
Size (MB)
0.52 0.88 9.80
Supplement-
ary File Size
(MB)
1.79 5.94 72.16
ODG Value -0.48 -0.98 -1.20
Details of Video Files
Traffic Dragon Breaking
Bad
Duration
(min:secs)
00:10 23:00 50:00
Original Size
(MB)
0.19 51.10 305.00
Base File
Size (MB)
0.08 9.21 11.80
Supplement-
ary File Size
(MB)
0.18 69.40 216.00
PSNR Value
(dB)
44.00 42.00 41.00
17
Experimental and Simulation Results
Robusntess of an Audio File
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Robustness of a Video File
Attacks Parameters BER NC
Re-
quantization
16-8-16
bits
0.07 0.951
Re-sampling
44.1-22.05-
44.1 KHz
0.11 0.902
MP3
Compression
256 kbps 0.09 0.912
AWGN 18 dB 0.13 0.882
Attacks Parameters BER NC
Median
filter
[3 x 3] 0.09 0.912
Re-sizing
320-640-320
pixels
0.06 0.972
H.264
Compression
768 kbps 0.09 0.912
AWGN 20 dB 0.14 0.856
18
Experimental and Simulation Results
Computational Time of Audio Files
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Computational Time of Video Files
CPU Time in secs
Process Loopy
Music
Huge
Wav
Aasan
Nai
Yahan
Fingerprint
generation
6.01 6.01 6.01
Base file
generation
14.08 31.15 181.39
Supplementary
file
generation
0.03 0.18 1.19
Total time 20.13 37.34 188.60
CPU Time in secs
Process Traffic Dragon Breaking
Bad
Fingerprint
generation
6.01 6.01 6.01
Base file
generation
14.08 31.15 181.39
Supplementary
file
generation
0.03 0.18 1.19
Total time 20.13 37.34 188.60
19
Experimental and Simulation Results
CommunicationTime of an Audio File
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Communication Time of a Video File
Communication time in secs
File
name
BF
delivery
SF
delivery
File
Recon-
struction
Total
time
Loopy
Music
8.01 10.00 3.89 21.90
Communication time in secs
File
name
BF
delivery
SF
delivery
File
Recon-
struction
Total
time
Break-
ing Bad
184.00 657.29 595.05 1436.34
Cryptographic Algorithms
CPU time in
secs
Public-key cryptography 5.73
Anonymous key exchange 9.62
AES encryption/decryption 1.89
Total 17.24
Cryptographic Costs of an Audio File Cryptographic Costs of a Video File
Cryptographic Algorithms
CPU time in
secs
Public-key cryptography 8.80
Anonymous key exchange 9.62
AES encryption/decryption 0.11
Total 18.53
20
Conclusions and Future Work
Conclusions
Future Work
• A P2P content distribution system which allows efficient distribution of large-sized
content while preserving the security and privacy of content providers and end
users.
• The security and performance analysis demonstrates the security and efficiency
of the proposed framework.
• The framework is able to resolve the problems of piracy tracing, buyer
frameproofness, collusion resistance, accountability, dispute resolution and
buyer’s privacy.
• Reduce the size of the base file through losless compression techniques.
• Develop a prototype of the proposed framework and test it in a real-world scenario.
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
21
Thank you!
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Framework for preserving security and privacy in peer-to-peer content distribution systems

More Related Content

Viewers also liked

Inria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentationInria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentationFrançois Charoy
 
An efficient and trustworthy resource sharing platform for collaborative clou...
An efficient and trustworthy resource sharing platform for collaborative clou...An efficient and trustworthy resource sharing platform for collaborative clou...
An efficient and trustworthy resource sharing platform for collaborative clou...ieeepondy
 
Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...Shakas Technologies
 
PFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNPFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNmanuay
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksIffat Anjum
 
Integrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksIntegrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksDaniele Gianni
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMyo Naung Lwin
 
Privacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2PPrivacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2Pwww.pixelsolutionbd.com
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 

Viewers also liked (12)

Inria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentationInria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentation
 
An efficient and trustworthy resource sharing platform for collaborative clou...
An efficient and trustworthy resource sharing platform for collaborative clou...An efficient and trustworthy resource sharing platform for collaborative clou...
An efficient and trustworthy resource sharing platform for collaborative clou...
 
Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...
 
PFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNPFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSN
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networks
 
Ecg
EcgEcg
Ecg
 
Integrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksIntegrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networks
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor Network
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 
Privacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2PPrivacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2P
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 

Similar to Framework for preserving security and privacy in peer-to-peer content distribution systems

traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...swathi78
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
 
Video Streaming across wide area networks
Video Streaming across wide area networksVideo Streaming across wide area networks
Video Streaming across wide area networksVideoguy
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Videoguy
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Videoguy
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7Antony Law
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Azure mediaservices
Azure mediaservicesAzure mediaservices
Azure mediaservicessharan gowde
 
Build end-to-end video experiences with Azure Media Services
Build end-to-end video experiences with Azure Media ServicesBuild end-to-end video experiences with Azure Media Services
Build end-to-end video experiences with Azure Media ServicesKen Cenerelli
 
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKSECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKIJNSA Journal
 
Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Paolo Nesi
 
Video Conferencing and Security
Video Conferencing and SecurityVideo Conferencing and Security
Video Conferencing and SecurityVideoguy
 
Copyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkCopyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkIJERA Editor
 
BUILD 2014 - Building end-to-end video experience with Azure Media Services
BUILD 2014 - Building end-to-end video experience with Azure Media ServicesBUILD 2014 - Building end-to-end video experience with Azure Media Services
BUILD 2014 - Building end-to-end video experience with Azure Media ServicesMingfei Yan
 
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...chennaijp
 
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...Shakas Technologies
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformNexgen Technology
 

Similar to Framework for preserving security and privacy in peer-to-peer content distribution systems (20)

traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
fightingdci
fightingdcifightingdci
fightingdci
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
Video Streaming across wide area networks
Video Streaming across wide area networksVideo Streaming across wide area networks
Video Streaming across wide area networks
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Azure mediaservices
Azure mediaservicesAzure mediaservices
Azure mediaservices
 
Build end-to-end video experiences with Azure Media Services
Build end-to-end video experiences with Azure Media ServicesBuild end-to-end video experiences with Azure Media Services
Build end-to-end video experiences with Azure Media Services
 
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKSECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
 
Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2
 
Completepresentation
CompletepresentationCompletepresentation
Completepresentation
 
Video Conferencing and Security
Video Conferencing and SecurityVideo Conferencing and Security
Video Conferencing and Security
 
Copyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkCopyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer Network
 
BUILD 2014 - Building end-to-end video experience with Azure Media Services
BUILD 2014 - Building end-to-end video experience with Azure Media ServicesBUILD 2014 - Building end-to-end video experience with Azure Media Services
BUILD 2014 - Building end-to-end video experience with Azure Media Services
 
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
 
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 

More from UOC Universitat Oberta de Catalunya

“Global Trends and Patterns of Violent Extremism: Finding New Responses”
“Global Trends and Patterns of Violent  Extremism: Finding New Responses”“Global Trends and Patterns of Violent  Extremism: Finding New Responses”
“Global Trends and Patterns of Violent Extremism: Finding New Responses”UOC Universitat Oberta de Catalunya
 
Mobile ensembles: The uses of mobile phones for social protest by Spain’s ind...
Mobile ensembles: The uses of mobile phones for social protest by Spain’s ind...Mobile ensembles: The uses of mobile phones for social protest by Spain’s ind...
Mobile ensembles: The uses of mobile phones for social protest by Spain’s ind...UOC Universitat Oberta de Catalunya
 
El principio de integridad en la contratación pública. Mecanismos para la pre...
El principio de integridad en la contratación pública. Mecanismos para la pre...El principio de integridad en la contratación pública. Mecanismos para la pre...
El principio de integridad en la contratación pública. Mecanismos para la pre...UOC Universitat Oberta de Catalunya
 
Smart contradictions: The politics of making Barcelona a Self-sufficient city
Smart contradictions: The politics of making Barcelona a Self-sufficient citySmart contradictions: The politics of making Barcelona a Self-sufficient city
Smart contradictions: The politics of making Barcelona a Self-sufficient cityUOC Universitat Oberta de Catalunya
 
Gender Stereotypes and Attitudes Towards Information and Communication Techno...
Gender Stereotypes and Attitudes Towards Information and Communication Techno...Gender Stereotypes and Attitudes Towards Information and Communication Techno...
Gender Stereotypes and Attitudes Towards Information and Communication Techno...UOC Universitat Oberta de Catalunya
 
Co-creation and Participation as a Means of Innovation in New Media: An Analy...
Co-creation and Participation as a Means of Innovation in New Media: An Analy...Co-creation and Participation as a Means of Innovation in New Media: An Analy...
Co-creation and Participation as a Means of Innovation in New Media: An Analy...UOC Universitat Oberta de Catalunya
 
The end of scarcity? Water desalination as the new cornucopia for Mediterrane...
The end of scarcity? Water desalination as the new cornucopia for Mediterrane...The end of scarcity? Water desalination as the new cornucopia for Mediterrane...
The end of scarcity? Water desalination as the new cornucopia for Mediterrane...UOC Universitat Oberta de Catalunya
 
Urban Ecology Under Fire: Water Supply in Madrid During the Spanish Civil War...
Urban Ecology Under Fire: Water Supply in Madrid During the Spanish Civil War...Urban Ecology Under Fire: Water Supply in Madrid During the Spanish Civil War...
Urban Ecology Under Fire: Water Supply in Madrid During the Spanish Civil War...UOC Universitat Oberta de Catalunya
 
Little arrangements that matter. Rethinking autonomy-enabling innovations for...
Little arrangements that matter. Rethinking autonomy-enabling innovations for...Little arrangements that matter. Rethinking autonomy-enabling innovations for...
Little arrangements that matter. Rethinking autonomy-enabling innovations for...UOC Universitat Oberta de Catalunya
 
La construcción colaborativa de proyectos como metodología para adquirir comp...
La construcción colaborativa de proyectos como metodología para adquirir comp...La construcción colaborativa de proyectos como metodología para adquirir comp...
La construcción colaborativa de proyectos como metodología para adquirir comp...UOC Universitat Oberta de Catalunya
 
What leads people to keep on e-learning? An empirical analysis of users’ expe...
What leads people to keep on e-learning? An empirical analysis of users’ expe...What leads people to keep on e-learning? An empirical analysis of users’ expe...
What leads people to keep on e-learning? An empirical analysis of users’ expe...UOC Universitat Oberta de Catalunya
 
Rethinking dropout in online higher education: The case of the Universitat Ob...
Rethinking dropout in online higher education: The case of the Universitat Ob...Rethinking dropout in online higher education: The case of the Universitat Ob...
Rethinking dropout in online higher education: The case of the Universitat Ob...UOC Universitat Oberta de Catalunya
 
Routing Fleets with Multiple Driving Ranges: is it possible to use greener fl...
Routing Fleets with Multiple Driving Ranges: is it possible to use greener fl...Routing Fleets with Multiple Driving Ranges: is it possible to use greener fl...
Routing Fleets with Multiple Driving Ranges: is it possible to use greener fl...UOC Universitat Oberta de Catalunya
 
Another look at ‘being there’ experiences in digital media: exploring connect...
Another look at ‘being there’ experiences in digital media: exploring connect...Another look at ‘being there’ experiences in digital media: exploring connect...
Another look at ‘being there’ experiences in digital media: exploring connect...UOC Universitat Oberta de Catalunya
 
RSS and Sensor Fusion Algorithms for Indoor Location Systems on Smartphones
RSS and Sensor Fusion Algorithms for Indoor Location Systems on SmartphonesRSS and Sensor Fusion Algorithms for Indoor Location Systems on Smartphones
RSS and Sensor Fusion Algorithms for Indoor Location Systems on SmartphonesUOC Universitat Oberta de Catalunya
 
On the verification of UML/OCL class diagrams using constraint programming
On the verification of UML/OCL class diagrams using constraint programmingOn the verification of UML/OCL class diagrams using constraint programming
On the verification of UML/OCL class diagrams using constraint programmingUOC Universitat Oberta de Catalunya
 

More from UOC Universitat Oberta de Catalunya (20)

“Global Trends and Patterns of Violent Extremism: Finding New Responses”
“Global Trends and Patterns of Violent  Extremism: Finding New Responses”“Global Trends and Patterns of Violent  Extremism: Finding New Responses”
“Global Trends and Patterns of Violent Extremism: Finding New Responses”
 
Irrupción de la FP en línea
Irrupción de la FP en líneaIrrupción de la FP en línea
Irrupción de la FP en línea
 
Irrupció de la FP en línia
Irrupció de la FP en líniaIrrupció de la FP en línia
Irrupció de la FP en línia
 
Mobile ensembles: The uses of mobile phones for social protest by Spain’s ind...
Mobile ensembles: The uses of mobile phones for social protest by Spain’s ind...Mobile ensembles: The uses of mobile phones for social protest by Spain’s ind...
Mobile ensembles: The uses of mobile phones for social protest by Spain’s ind...
 
El principio de integridad en la contratación pública. Mecanismos para la pre...
El principio de integridad en la contratación pública. Mecanismos para la pre...El principio de integridad en la contratación pública. Mecanismos para la pre...
El principio de integridad en la contratación pública. Mecanismos para la pre...
 
Smart contradictions: The politics of making Barcelona a Self-sufficient city
Smart contradictions: The politics of making Barcelona a Self-sufficient citySmart contradictions: The politics of making Barcelona a Self-sufficient city
Smart contradictions: The politics of making Barcelona a Self-sufficient city
 
Gender Stereotypes and Attitudes Towards Information and Communication Techno...
Gender Stereotypes and Attitudes Towards Information and Communication Techno...Gender Stereotypes and Attitudes Towards Information and Communication Techno...
Gender Stereotypes and Attitudes Towards Information and Communication Techno...
 
Co-creation and Participation as a Means of Innovation in New Media: An Analy...
Co-creation and Participation as a Means of Innovation in New Media: An Analy...Co-creation and Participation as a Means of Innovation in New Media: An Analy...
Co-creation and Participation as a Means of Innovation in New Media: An Analy...
 
The end of scarcity? Water desalination as the new cornucopia for Mediterrane...
The end of scarcity? Water desalination as the new cornucopia for Mediterrane...The end of scarcity? Water desalination as the new cornucopia for Mediterrane...
The end of scarcity? Water desalination as the new cornucopia for Mediterrane...
 
Urban Ecology Under Fire: Water Supply in Madrid During the Spanish Civil War...
Urban Ecology Under Fire: Water Supply in Madrid During the Spanish Civil War...Urban Ecology Under Fire: Water Supply in Madrid During the Spanish Civil War...
Urban Ecology Under Fire: Water Supply in Madrid During the Spanish Civil War...
 
Little arrangements that matter. Rethinking autonomy-enabling innovations for...
Little arrangements that matter. Rethinking autonomy-enabling innovations for...Little arrangements that matter. Rethinking autonomy-enabling innovations for...
Little arrangements that matter. Rethinking autonomy-enabling innovations for...
 
La construcción colaborativa de proyectos como metodología para adquirir comp...
La construcción colaborativa de proyectos como metodología para adquirir comp...La construcción colaborativa de proyectos como metodología para adquirir comp...
La construcción colaborativa de proyectos como metodología para adquirir comp...
 
What leads people to keep on e-learning? An empirical analysis of users’ expe...
What leads people to keep on e-learning? An empirical analysis of users’ expe...What leads people to keep on e-learning? An empirical analysis of users’ expe...
What leads people to keep on e-learning? An empirical analysis of users’ expe...
 
Rethinking dropout in online higher education: The case of the Universitat Ob...
Rethinking dropout in online higher education: The case of the Universitat Ob...Rethinking dropout in online higher education: The case of the Universitat Ob...
Rethinking dropout in online higher education: The case of the Universitat Ob...
 
Automated Prediction of Preferences Using Facial Expressions
Automated Prediction of Preferences Using Facial ExpressionsAutomated Prediction of Preferences Using Facial Expressions
Automated Prediction of Preferences Using Facial Expressions
 
Routing Fleets with Multiple Driving Ranges: is it possible to use greener fl...
Routing Fleets with Multiple Driving Ranges: is it possible to use greener fl...Routing Fleets with Multiple Driving Ranges: is it possible to use greener fl...
Routing Fleets with Multiple Driving Ranges: is it possible to use greener fl...
 
Another look at ‘being there’ experiences in digital media: exploring connect...
Another look at ‘being there’ experiences in digital media: exploring connect...Another look at ‘being there’ experiences in digital media: exploring connect...
Another look at ‘being there’ experiences in digital media: exploring connect...
 
RSS and Sensor Fusion Algorithms for Indoor Location Systems on Smartphones
RSS and Sensor Fusion Algorithms for Indoor Location Systems on SmartphonesRSS and Sensor Fusion Algorithms for Indoor Location Systems on Smartphones
RSS and Sensor Fusion Algorithms for Indoor Location Systems on Smartphones
 
Anonymizing Graphs: Measuring Quality for Clustering
Anonymizing Graphs: Measuring Quality for ClusteringAnonymizing Graphs: Measuring Quality for Clustering
Anonymizing Graphs: Measuring Quality for Clustering
 
On the verification of UML/OCL class diagrams using constraint programming
On the verification of UML/OCL class diagrams using constraint programmingOn the verification of UML/OCL class diagrams using constraint programming
On the verification of UML/OCL class diagrams using constraint programming
 

Recently uploaded

Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 

Recently uploaded (20)

Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 

Framework for preserving security and privacy in peer-to-peer content distribution systems

  • 1. Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Amna Qureshi, David Megías and Helena Rifà-Pous KISON-IN3 1 11th February, 2015UOC Research Showcase Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems
  • 2. • Introduction • State-of-the-Art • Secure and Privacy-Preserving Content Distribution Framework • Experimental and Simulation Results • Conclusions and Future Work Outline 2 Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems
  • 3. • Multimedia producers o Protection of copyright 3 Introduction Content Protection Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems • End users o Protection of user-related information Privacy Protection
  • 4. Introduction 4 Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Copyright Infringement in P2P Content Distribution Systems
  • 5. • Conflict between content providers and end users: o Reconciliation of user privacy with content protection. • Trade-off between watermarking properies: o Robustness, transparency and capacity. • Harmonization between accountability and anonymity: o Revocable privacy for an end user. • Merging collusion-resistant fingerprinting and secure embedding scheme. • Computational and distribution efficiency: o Low computational and communicational burdens for the content providers and the end users. 5 Introduction Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Research Challenges
  • 6. 6 State-of-the-Art Security Properties for Content Providers Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Copyright protection Data privacy Traceablity Data integrity Copy prevention Resistance against attacks User privacy Protection of real identity Unlinkability Resistance against de- anonymization attacks Data privacy Available to authorized users only Protection against malicious attacks Privacy Properties for End users
  • 7. 7 State-of-the-Art Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems P2P Systems Content Protection Privacy Protection Revocable PrivacyCopyright Protection Traceability User Data Megías (2014) Yes Yes Yes Yes Yes Megías & Domingo-Ferrer (2014) Yes Yes Yes Yes Yes Domingo-Ferrer & Megías (2013) Yes Yes Yes Yes Yes P2P Systems Robustness and Security against Attacks Signal Processing Attacks Collusion Attacks Communication AttacksContent Protection Systems Privacy Protection Systems Megías (2014) Yes Yes Yes Yes Megías & Domingo-Ferrer (2014) Yes Yes Yes Yes Comparative Analysis of Secure and Privacy-Preserving P2P Content Distribution Systems
  • 8. 8 Security and Privacy-Preserving Content Distribution Framework Overview of the Framework Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems P2P network Trust infrastructures Building blocks Hybrid P2P Public key support Embedding domain Trusted third parties with limited services Embedding algorithm Collusion-resistant fingerprinting codes Public key cryptosystem PseudoTrust model
  • 9. 9 Security and Privacy-Preserving Content Distribution Framework Overview of the Framework Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Parties involved Merchant General assumptions Security assumptions Assumptions Design requirements Threat model Buyer Super peer Monitor Judge Certification authority Security requirements Privacy requirements Watermarking attacks Collusion attacks Framing attacks Communication attacks
  • 10. 10 Protocols of the Framework File Partitioning Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Merchant Multimedia content DWT Transform Approximation coefficients Detail coefficients Monitor Fingerprint generation Embed fingerprint into approximation coefficients Base file Supplementary file
  • 11. 11 Protocols of the Framework Base File Distribution Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems 9. Buyer decrypts EK*pBi(BF) using secret key Merchant Monitor Buyer 4. fi Generation 5. fi Encryption with K*pBi 7. Embedding EK*pBi (f) into EK*pBi (X) EK*pBi (X) EKpB(X)EKpB(f) => EK*pBi(BF) EK*pBi (f) 10. Fingerprinted BF
  • 12. 12 Protocols of the Framework Supplementary File Distribution Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Merchant Certification Authority P2P Network Pseudonyms and signed certificate acquisation
  • 13. 13 Protocols of the Framework Traitor-Tracing and Dispute Resolution Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Merchant Monitor Judge Certification Authority Multimedia content Collusion attack Set of colluders
  • 14. 14 Security and Privacy-Preserving Content Distribution Framework Security Analysis of BF Distribution Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems • Buyer frameproofness • Non-repudiation • Revocable privacy • Anonymity • Traceability • Collusion resistance • Unlinkability Security Analysis of SF Distribution Protocol • Impersonation • Man-in-the-middle attack • Replay attack • Leakage of a secret number used in pseudo-idenity generation
  • 15. 15 Security and Privacy-Preserving Content Distribution Framework Security against Collusion Attacks Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems No. of Colluders No. of Colluders Detected for Attacks in the Framework for a Video File U Average Minimum Maximum Median 2 2 2 2 2 3 3 3 3 3 4 4 4 4 4 5 5 4 4 5
  • 16. 16 Experimental and Simulation Results Details of Audio Files Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Loopy Music Huge wav Aasan Nai Yahan Duration (min:secs) 00:10 00:17 03:34 Original Size (MB) 0.89 2.97 36.01 Base File Size (MB) 0.52 0.88 9.80 Supplement- ary File Size (MB) 1.79 5.94 72.16 ODG Value -0.48 -0.98 -1.20 Details of Video Files Traffic Dragon Breaking Bad Duration (min:secs) 00:10 23:00 50:00 Original Size (MB) 0.19 51.10 305.00 Base File Size (MB) 0.08 9.21 11.80 Supplement- ary File Size (MB) 0.18 69.40 216.00 PSNR Value (dB) 44.00 42.00 41.00
  • 17. 17 Experimental and Simulation Results Robusntess of an Audio File Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Robustness of a Video File Attacks Parameters BER NC Re- quantization 16-8-16 bits 0.07 0.951 Re-sampling 44.1-22.05- 44.1 KHz 0.11 0.902 MP3 Compression 256 kbps 0.09 0.912 AWGN 18 dB 0.13 0.882 Attacks Parameters BER NC Median filter [3 x 3] 0.09 0.912 Re-sizing 320-640-320 pixels 0.06 0.972 H.264 Compression 768 kbps 0.09 0.912 AWGN 20 dB 0.14 0.856
  • 18. 18 Experimental and Simulation Results Computational Time of Audio Files Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Computational Time of Video Files CPU Time in secs Process Loopy Music Huge Wav Aasan Nai Yahan Fingerprint generation 6.01 6.01 6.01 Base file generation 14.08 31.15 181.39 Supplementary file generation 0.03 0.18 1.19 Total time 20.13 37.34 188.60 CPU Time in secs Process Traffic Dragon Breaking Bad Fingerprint generation 6.01 6.01 6.01 Base file generation 14.08 31.15 181.39 Supplementary file generation 0.03 0.18 1.19 Total time 20.13 37.34 188.60
  • 19. 19 Experimental and Simulation Results CommunicationTime of an Audio File Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Communication Time of a Video File Communication time in secs File name BF delivery SF delivery File Recon- struction Total time Loopy Music 8.01 10.00 3.89 21.90 Communication time in secs File name BF delivery SF delivery File Recon- struction Total time Break- ing Bad 184.00 657.29 595.05 1436.34 Cryptographic Algorithms CPU time in secs Public-key cryptography 5.73 Anonymous key exchange 9.62 AES encryption/decryption 1.89 Total 17.24 Cryptographic Costs of an Audio File Cryptographic Costs of a Video File Cryptographic Algorithms CPU time in secs Public-key cryptography 8.80 Anonymous key exchange 9.62 AES encryption/decryption 0.11 Total 18.53
  • 20. 20 Conclusions and Future Work Conclusions Future Work • A P2P content distribution system which allows efficient distribution of large-sized content while preserving the security and privacy of content providers and end users. • The security and performance analysis demonstrates the security and efficiency of the proposed framework. • The framework is able to resolve the problems of piracy tracing, buyer frameproofness, collusion resistance, accountability, dispute resolution and buyer’s privacy. • Reduce the size of the base file through losless compression techniques. • Develop a prototype of the proposed framework and test it in a real-world scenario. Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems
  • 21. 21 Thank you! Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems