Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Computationally private information retrieval (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Protecting data privacy in private information retrieval schemes
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Anonymous Web transactions with Crowds
Communications of the ACM
Video staging: a proxy-server-based approach to end-to-end video delivery over wide-area networks
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 7th ACM conference on Computer and communications security
Segment-based proxy caching of multimedia streams
Proceedings of the 10th international conference on World Wide Web
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
A case for a multi-key secure video proxy: theory, design, and implementation
Proceedings of the tenth ACM international conference on Multimedia
Protecting sensitive attributes in automated trust negotiation
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Partial Video Sequence Caching Scheme for VOD Systems with Heterogeneous Clients
ICDE '97 Proceedings of the Thirteenth International Conference on Data Engineering
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Architecture of a quality based intelligent proxy (QBIX) for MPEG-4 videos
WWW '03 Proceedings of the 12th international conference on World Wide Web
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Collusion attack on a multi-key secure video proxy scheme
Proceedings of the 12th annual ACM international conference on Multimedia
Proceedings of the 11th ACM conference on Computer and communications security
Proceedings of the 11th ACM conference on Computer and communications security
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
IEEE Transactions on Multimedia
Scalable proxy caching of video under storage constraints
IEEE Journal on Selected Areas in Communications
Silo, rainbow, and caching token: schemes for scalable, fault tolerant stream caching
IEEE Journal on Selected Areas in Communications
A format-compliant configurable encryption framework for access control of video
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Massive Internet media distribution demands prolonged continuous consumption of networking and disk bandwidths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability and performance issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without copyright protection, content providers are hesitant to use proxy-based fast distribution techniques. Second, little has been done to protect client privacy during content accesses on the Internet. Straightforward solutions to address these two issues independently lead to conflicts. For example, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this article, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms in a cooperative proxy environment where our proposed scheme works efficiently and practically. Simulation-based experiments are conducted to extensively evaluate the proposed system. Preliminary results demonstrate the effectiveness of our proposed strategy.