150 likes | 279 Views
Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems. Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua Science and Technology, vol. 14, no. 2, pp. 234-241, 2009 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Introduction. P2P Live streaming. a.wmv. A.
E N D
Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua Science and Technology, vol. 14, no. 2, pp. 234-241, 2009 Speaker: Shu-Fen Chiou (邱淑芬)
Introduction • P2P Live streaming a.wmv A Frame 1 Frame 2 Frame 3 … Frame N Frame 2 Frame 1 B Live to watch a.wmv
Challenges in streaming systems • High bit rates • End-to-end delay • Packet losses • Network congestion • Service guarantees • Security
Motivation • For P2P live media streaming, authors proposed a secure scheme using user authentication and key managements.
Requirements • Confidentiality • Data integrity • Scalability • Efficient
User authentication Notation AS Authorization server PriKAS, PubKAS Private and corresponding public keys from the AS n Total number of users Ui, Uj i-th and j-th users PriKi , PubKi Private and corresponding public keys of Ui CTi Certificate of Ui Hm(x) Hm(x)=H(Hm-1(x)), m>1, H() is a one-way hash Ts, Te certificate lifetime RSi Private number for Ui only known by AS
User authentication • Certificate generation New user Ui AS Generate PriKi , PubKi Generate random value Ri, and calculate Hm(Ri) Login request Verify Ui Generate CTi CTi={IDi|Ts|Te|T|IPi|PubKi| Hm(Ri)|Hm(RSi)|SigNi} CTi
User authentication • Certificate update user Ui AS Between frames <Te+(t-1)T, Te+t T>, 0<t<m {IDi|t|Hm-t(Ri)} Check whether H(Hm-t(Ri))=Hm-(t-1)(Ri) {IDi|Hm-t(RSi)}
User authentication • Certificate verification (Uk verify Ui) user Ui user Uk CTi={IDi|Ts|Te|T|IPi|PubKi| Hm(Ri)|Hm(RSi)|SigNi} CTi Verify CTi Select random value Mi Encrypt Miby PriKi Decrypt E(Mi)by PubKi Get Mi’ Check whether Mi’=Mi Select random value Mk as symmetric secret key Encrypt Mk by PubKi {Mi|E(Mi)} {E(Mk} Decrypt E(Mk)by PriKi to get Mk
Key management • Every user has a logic key tree Key of secure channel Logic key tree of j before i joins
Key management • User i joins to j 1. j sends {Pubki(K8), K8(K’78), K’78(K’58), K’58(KEK’)} to i 2. j sends other key materials to its old neighbors. e.g. j sends {K7(K’78), K’78(K’58), K’58(KEK’)} to U7 Logic key tree of j after i joins
Key management When i leaves, j changes some of the key values and send to its neighbors • User i leaves j Logic key tree of j before i leaves Logic key tree of j after i leaves e.g. j sends {K4(K’34), K’34(K’14), K’14(KEK’)} to U4
此篇paper之優缺點 • 優點: • 延伸authentication及key management應用在P2P live streaming protocol • 缺點: • Certificate verification無相互驗證
可能研究方向 • Certificate verification相互驗證 • 加入付費機制