电信科学 ›› 2014, Vol. 30 ›› Issue (9): 53-60.doi: 10.3969/j.issn.1000-0801.2014.09.008

• 专题:信息中心网络(ICN) • 上一篇    下一篇

信息中心网络中授权视频访问控制

周自飞1,谭小彬1,牛玉坤1,邹长春2   

  1. 1 中国科学技术大学中国科学院地理空间信息处理技术和应用系统重点实验室 合肥230027
    2 美国中佛罗里达大学电气工程与计算机科学系 美国佛罗里达州奥兰多32816
  • 出版日期:2014-09-20 发布日期:2017-07-05

Access Control for Autborized Video in Information-Centric Networking

Zifei Zhou1,Xiaobin Tan1,Yukun Niu1,CZou Cliff2   

  1. 1 CAS Key Laboratory of Technology in Geo-Spatial Information Processing and Application System, University of Science and Technology of China, Hefei 230027, China
    2 School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida 32816, USA
  • Online:2014-09-20 Published:2017-07-05

摘要:

信息中心网络(ICN)能够极大地提高视频内容的传输效率,然而ICN中内网缓存机制也给授权视频的访问控制带来了严峻的挑战。授权视频访问控制的目的是保证只有已授权用户才能观看授权视频,防止授权视频被非法观看和使用。在ICN中,当授权视频被缓存在路由器上后,便不受视频发布者的控制,任何人都能够从路由器上获取授权视频。目前存在的方案不能很好地解决这个问题,提出了一种基于分割和数字水印的访问控制方案,将授权视频分割成PCB(public content block,公开内容块)和CKB(content key block,内容密钥块)两部分,其中PCB一般比较大,对所有用户都是相同的,而CKB一般比较小,并且采用数字水印技术实现不同的用户对应不同的CKB,用户必须收到PCB和CKB之后才能观看视频。通过分析,提出的授权视频访问控制方案在安全性和网络资源优化两个方面具有很好的性能。

关键词: 信息中心网络, 授权视频, 访问控制, 数字水印

Abstract:

Information-centric networking(ICN)can greatly improve the efficiency of video content, however, in-network caching in ICN also brings us a new access control challenge. The purpose of authorized video access control is to ensure that only authorized users can watch them, and to prevent unauthorized accesses to these authorized videos. In ICN, when authorized videos were cached in the routers, anyone can get and watch them without the authorized videos' producers' permission. The existing methods could not solve this problem well, an access control scheme was proposed that based on splitting and digital watermarking. The authorized video was splitted into two parts, public content block(PCB)and content key block(CKB), respectively. PCB which was generally relatively large, was the same for all users, and CKB which was generally relatively small, was unique for each authorized users using digital watermarking technology. Users must received both PCB and CKB to watch videos. After the analysis, the access control scheme for authorized videos has a good performance in both security and network resource optimization.

Key words: information-centric networking, authorized video, access control, digital watermarking

No Suggested Reading articles found!