Wednesday, 16 January 2013

A Trapdoor Hash-Based Mechanism for Stream Authentication


NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD.,  AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926



  
JAVA PROJECTS LIST--2013
JAVA 2013 IEEE PAPERS



A Trapdoor Hash-Based Mechanism for Stream Authentication

Abstract:
            Digital streaming Internet applications such as online gaming, multimedia playback, presentations, news feeds, and stock quotes involve end-users with very low tolerance for high latency, low data rates, and playback interruption. To protect such delay sensitive streams against malicious attacks, security mechanisms need to be designed to efficiently process long sequence of bits. We study the problem of efficient authentication for real-time and delay-sensitive streams commonly seen in content distribution, multicast, and peer-to-peer networks. We propose a novel signature amortization technique based on trapdoor hash functions for authenticating individual data blocks in a stream. Our technique provides: 1) Resilience against transmission losses of intermediate blocks in the stream; 2) Small and constant memory/compute requirements at the sender and receiver; 3) Minimal constant communication overhead needed for transmission of authenticating information. Our proposed technique renders authentication of digital streams practical and efficient. We substantiate this claim by constructing DL-SA, a discrete-log-based instantiation of the proposed technique. DL-SA provides adaptive stream verification, where the receiver has control over modulating computation cost versus buffer size. Our performance analysis demonstrates that DL-SA incurs the least per-block communication and signature generation overheads compared to existing schemes with comparable features.
Existing System:
            Although CDNs like Akamai employ mechanisms for providing physical security, host system security, access control, software reliability and integrity, and 24 X 7 monitoring and response, these mechanisms are primarily designed for providing security of the CDN’s service network infrastructure and ensuring proper functioning of its distributed network of servers, rather than protecting content distributed through the CDN. The task of protecting content is the responsibility of content providers. Popular content providers often provide highly personalized user experience by inserting targeted advertisements and dynamically generated content.
Proposed System:
            The proposed technique represents the first known attempt in the literature to use trapdoor hash functions for building a signature amortization scheme. We develop the technique for signature amortization using concepts derived from application of trapdoor hash functions in building online/offline signature schemes. Trapdoor hash functions provide the unique capability to find collisions between hashes of different messages using a secret trapdoor key. We use this capability to design a signature amortization technique where we compute a signature on the trapdoor hash of a block and amortize it over multiple blocks by finding trapdoor collisions with the hash of the signed block. The receiver verifies the authenticity of a block by computing its trapdoor hash value and comparing it with the hash value of any other block in the stream.           
Software and Hardware Requirements
Hardware Required:                            
System                                    :           Pentium IV
Hard Disk                   :           80 GB
RAM                           :           512 MB
Software Required:
Operating System       :           Windows XP
Language                    :           JAVA

Modules:
·         Client
·         Router
·         Server
·         Hash Calculation
Trapdoor Hash Verification

No comments:

Post a Comment