Multimedia Tools and Applications

, Volume 45, Issue 1–3, pp 369–384 | Cite as

Secure peer-to-peer 3D streaming

  • Mo-Che Chan
  • Shun-Yun Hu
  • Jehn-Ruey JiangEmail author


In recent years, interactive virtual environments such as Second Life, and virtual globe applications such as Google Earth, have become very popular. However, delivering massive amounts of interactive content to millions of potential users brings enormous challenges to content providers. Distributed peer-to-peer (P2P) approaches have thus been proposed to increase the system scalability in affordable ways. Building content delivery systems based on P2P approaches nevertheless creates security concerns for commercial vendors. This paper presents a generic system model for subscription-based service providers to adopt P2P-based, non-linear streaming for interactive content. We also propose solutions to the issue of content authentication, such that paying customers can be sure of the authenticity of the content retrieved from other users. Other practical security issues in an extended system model are also identified to allow further investigations in this problem space.


Peer-to-peer Virtual environments Nonlinear media 3D streaming Security Online games 


  1. 1.
    Bergadano F, Cavagnino D, Crispo B (2000) Chained stream authentication. In: Proceedings of the 7th annual international workshop on selected areas in cryptography. Lecture notes in computer science, vol 2012. Springer, Berlin Heidelberg New York, pp 144–157CrossRefGoogle Scholar
  2. 2.
    Bharambe A, Pang J, Seshan S (2006) Colyseus: a distributed architecture for online multiplayer games. In: Proceedings of the 3rd conference on 3rd symposium on networked systems design & implementation, vol 3, San Jose, pp 12–12Google Scholar
  3. 3.
    Bharambe A et al (2008) Donnybrook: enabling large-scale, high-speed, peer-to-peer games. In: Proceedings of SIGCOMMGoogle Scholar
  4. 4.
    Botev J et al (2008) The hyperverse—concepts for a federated and torrent-based “3d web”. In: Proceedings of MMVEGoogle Scholar
  5. 5.
    Burton DM (2005) Elementary number theory, 6th edn. ACM, New YorkzbMATHGoogle Scholar
  6. 6.
    Cheng W, Ooi WT (2008) Receiver-driven view-dependent streaming of progressive mesh. In: Proceedings of NOSSDAVGoogle Scholar
  7. 7.
    Cheng W, Ooi WT, Mondet S, Grigoras R, Morin G (2007) An analytical model for progressive mesh streaming. In: Proceedings of the 15th international conference on multimedia, pp 737–746Google Scholar
  8. 8.
    Frey D et al (2008) Solipsis: a decentralized architecture for virtual environments. In: Proceedings of MMVEGoogle Scholar
  9. 9.
    Gennaro R, Rohatgi P (1997) How to sign digital streams. In: Proceedings of the 17th annual international cryptology conference on advances in cryptology. Lecture notes in computer science, vol 1294. pp 180–197Google Scholar
  10. 10.
    Hoppe H (1996) Progressive meshes. In: Proceedings of SIGGRAPHGoogle Scholar
  11. 11.
    Hu S, Chen J, Chen T (2006) VON: a scalable peer-to-peer network for virtual environments. IEEE Netw 20(4):22–31CrossRefGoogle Scholar
  12. 12.
    Hu SY (2006) A case for 3d streaming on peer-to-peer networks. In: Proceedings of the eleventh international conference on 3D web technology, pp 57–63Google Scholar
  13. 13.
    Hu SY, Chang SC, Jiang JR (2008) Voronoi state management for peer-to-peer massively multiplayer online games. In: Proceedings of NIMEGoogle Scholar
  14. 14.
    Hu SY et al (2008) Flod: A framework for peer-to-peer 3D streaming. In: Proceedings of IEEE INFOCOMGoogle Scholar
  15. 15.
    Huang GY, Hu SY, Jiang JR (2008) Scalable reputation management for p2p mmogs. In: Proceedings of MMVEGoogle Scholar
  16. 16.
    Josephson WK, Sirer EG, Schneider FB (2004) Peer-to-peer authentication with a distributed single sign-on service. In: Proceedings of the international workshop on peer-to-peer systemsGoogle Scholar
  17. 17.
    Knutsson B, Lu H, Xu W, Hopkins B (2004) Peer-to-peer support for massively multiplayer games. In: Proceedings of IEEE INFOCOMGoogle Scholar
  18. 18.
    Li Z-T, Wang W-D, Zhang Y-J, Li W-M (2006) Source authentication of media streaming based on chains of Iso-hash clusters. In: Proceedings of the third international conference on autonomic and trusted computing, pp 398–407Google Scholar
  19. 19.
    Lin N-S, Huang T-H, Chen B-Y (2007) 3d model streaming based on jpeg 2000. IEEE Trans Consum Electron 53(1)Google Scholar
  20. 20.
    Lo V, Zhou D, Liu Y, GauthierDickey C, Li J (2005) Scalable supernode selection in peer-to-peer overlay networks. In: Proceedings of HOT-P2PGoogle Scholar
  21. 21.
    O’Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. In: Proceedings of the IEEE, vol 91, pp 2012–2040Google Scholar
  22. 22.
    Pathak V, Iftode L (2006) Byzantine fault tolerant public key authentication in peer-to-peer systems. Comput Networks 50(4):579–596zbMATHCrossRefGoogle Scholar
  23. 23.
    Pauly M, Gross M, Kobbelt LP (2002) Efficient simplification of point-sampled surfaces. In: Proceedings of IEEE visualization, pp 163–170Google Scholar
  24. 24.
    Pointcheval D, Stern J (1996) Security proofs for signature schemes. Advances in cryptology—EUROCRYPT ’96 1070/1996:387–398Google Scholar
  25. 25.
    Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. MIT/LCS/TR-212, MIT Laboratory for Computer ScienceGoogle Scholar
  26. 26.
    Rey C, Dugelay J (2002) A survey of watermarking algorithms for image authentication. EURASIP J Appl Signal Process 2002(6):613–621zbMATHCrossRefGoogle Scholar
  27. 27.
    Rosedale P, Ondrejka C (2003) Enabling player-created online worlds with grid computing and streaming. Gamasutra Resource GuideGoogle Scholar
  28. 28.
    Royan J, Gioia P, Cavagna R, Bouville C (2007) Network-based visualization of 3D landscapes and city models. IEEE CG&A 27(6):70–79Google Scholar
  29. 29.
    Schiele G et al (2008) Consistency management for peer-to-peer-based massively multiuser virtual environments. In: Proc IEEE virtual reality (IEEE VR) workshop massively multiuser virtual environment (MMVE)Google Scholar
  30. 30.
    Schneier B (1996) Applied cryptography, 2nd edn, chap 7. Wiley, New YorkGoogle Scholar
  31. 31.
    Singhal S, Zyda M (1999) Networked virtual environments: design and implementation. ACM, New YorkGoogle Scholar
  32. 32.
    Smit G, Havinga P, Helme A (1996) Survey of electronic payment methods and systems. In: Proceedings of EuromediaGoogle Scholar
  33. 33.
    Soriano E, Ballesteros FJ, Guardiola G (2007) Shad: a human-centered security architecture for the plan b operating system. In: Fifth annual ieee international conference on pervasive computing and communications, pp 272–282Google Scholar
  34. 34.
    Steiner JG, Neuman BC, Schiller JI (1988) An authentication service for open network system. Proceedings of the Winter 1988 Usenix Conference, pp 191–202Google Scholar
  35. 35.
    Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of SIGCOMM, pp 149–160Google Scholar
  36. 36.
    Sung WL, Hu SY, Jiang JR (2008) Selection strategies for peer-to-peer 3d streaming. In: Proceedings of NOSSDAVGoogle Scholar
  37. 37.
    Teler E, Lischinski D (2001) Streaming of complex 3d scenes for remote walkthroughs. CGF (EG 2001) 20(3)Google Scholar
  38. 38.
    The MIT Kerberos Team (1980) The network authentication protocol.
  39. 39.
    Wong P.-W. (1998) A public key watermark for image verification and authentication. In: Proceedings of International conference on image processing (ICIP 98), pp 455–459Google Scholar
  40. 40.
    Wu H, Cheung Y (2006) Public authentication of 3d mesh models. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on web intelligence, pp 940–948Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Central UniversityJhongliRepublic of China

Personalised recommendations