NANO SCIENTIFIC RESEARCH CENTRE
PVT.LTD., AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926
JAVA PROJECTS LIST--2013
JAVA 2013 IEEE PAPERS
A Trapdoor Hash-Based Mechanism for Stream
Authentication
Abstract:
Digital
streaming Internet applications such as online gaming, multimedia playback,
presentations, news feeds, and stock quotes involve end-users with very low
tolerance for high latency, low data rates, and playback interruption. To
protect such delay sensitive streams against malicious attacks, security
mechanisms need to be designed to efficiently process long sequence of bits. We
study the problem of efficient authentication for real-time and delay-sensitive
streams commonly seen in content distribution, multicast, and peer-to-peer
networks. We propose a novel signature amortization technique based on trapdoor
hash functions for authenticating individual data blocks in a stream. Our technique
provides: 1) Resilience against transmission losses of intermediate blocks in
the stream; 2) Small and constant memory/compute requirements at the sender and
receiver; 3) Minimal constant communication overhead needed for transmission of
authenticating information. Our proposed technique renders authentication of
digital streams practical and efficient. We substantiate this claim by
constructing DL-SA, a discrete-log-based instantiation of the proposed
technique. DL-SA provides adaptive stream verification, where the receiver has
control over modulating computation cost versus buffer size. Our performance
analysis demonstrates that DL-SA incurs the least per-block communication and
signature generation overheads compared to existing schemes with comparable
features.
Existing System:
Although CDNs like Akamai employ mechanisms for providing physical
security, host system security, access control, software reliability and
integrity, and 24 X 7 monitoring and response, these mechanisms are primarily designed
for providing security of the CDN’s service network infrastructure and ensuring
proper functioning of its distributed network of servers, rather than
protecting content distributed through the CDN. The task of protecting content
is the responsibility of content providers. Popular content providers often
provide highly personalized user experience by inserting targeted
advertisements and dynamically generated content.
Proposed System:
The proposed technique represents the first known attempt in the literature
to use trapdoor hash functions for building a signature amortization scheme. We
develop the technique for signature amortization using concepts derived from
application of trapdoor hash functions in building online/offline signature
schemes. Trapdoor hash functions provide the unique capability to find
collisions between hashes of different messages using a secret trapdoor key. We
use this capability to design a signature amortization technique where we
compute a signature on the trapdoor hash of a block and amortize it over
multiple blocks by finding trapdoor collisions with the hash of the signed
block. The receiver verifies the authenticity of a block by computing its
trapdoor hash value and comparing it with the hash value of any other block in
the stream.
Software
and Hardware Requirements
Hardware Required:
System : Pentium IV
Hard Disk : 80
GB
RAM : 512 MB
Software Required:
Operating
System : Windows
XP
Language : JAVA
Modules:
·
Client
·
Router
·
Server
·
Hash Calculation
Trapdoor Hash Verification
No comments:
Post a Comment