The Codex of Business Writing Software for Real-World Solutions 2.pptx
Aoevideo
1. A Case for a Multi-Key Secure Video Proxy: Theory, Design and Implementation S.F. Yeung, John C. S. Lui, David K. Y.Yau ACM Multimedia 2002
2.
3.
4. Client-Server Infrastructure source Client 1 Client 2 Client 3 Client N Server bandwidth (fan-out) is very limited Long haul bottleneck paths Packets get dropped
5.
6. Client-Proxy-Server Infrastructure source Client A1 Client A2 Client A3 Client AN Client B1 Client B2 Client B3 Client BN Client P1 Client P2 Client P3 Client PN Proxy A Proxy B Proxy P
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19. ARPS f sequence for the secure video proxy e 0 e 1 e 2 e N Client 1 Client 2 Client N source D -1 D 0 D 1 D 2 D N Video Proxy
20.
21.
22.
23. Operations between source and proxy request Ack(e 1 , n) D 0 (using e 0 ) request authentication and key generation (e 0 , e 1 , d 1 , n, phi) Data encryption caching or relaying Server Proxy
24.
25. Encryption Configuration Parameters Packet 0 (1400 bytes) Packet 1 (1400 bytes) Packet 2 (1400 bytes) Packet 3 (1400 bytes) Encryption block Encryption sub-block S pkt = 1400 bytes, I = 2, P = 0.5 and B = 4
26.
27.
28.
29.
30. Encryption Configuration Parameters t = proxy throughput, M = Number of concurrent MPEG-1 streams that could support. B = 1 63.04 11.82 62.56 11.73 62.56 11.73 62.40 11.70 57.10 10.7 62.08 11.64 I = 10 62.82 11.78 62.72 11.76 62.08 11.64 61.66 11.56 52.24 10.17 48.32 9.06 I = 5 62.77 11.77 54.19 10.16 40.20 7.54 32.52 5.91 25.81 4.84 21.87 4.10 I = 2 53.90 10.10 30.90 5.8 21.60 4.05 16.60 3.11 13.5 2.53 11.36 2.13 I = 1 M T M t M t M t M t M t P = 0.043 P = 0.086 P = 0.120 P = 0.171 P = 0.214 P = 0.257