Skip to main content

EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming

  • Conference paper
Advances in Multimedia Information Processing - PCM 2006 (PCM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4261))

Included in the following conference series:

Abstract

Recently media streaming applications via Peer-to-Peer (P2P) overlay networks are getting more and more significant. However, before these applications can be successfully deployed, it is very important to develop efficient access control mechanisms to ensure that only legitimate members can access the media content. Existing schemes of key management and distribution often fail in facing a large-scale group accessing. In this paper, we propose an efficient key management scheme (EKM) for large-scale P2P media streaming applications. It employs the Distributed Hash Table (DHT) technique to build a key distribution overlay network and incorporates a periodical global rekeying mechanism, which is highly scalable and efficient, and is robust against frequently joining/leaving of members. EKM can cut down the overhead of storage and communication on the server side, which can eliminate potential bottleneck of the server. We demonstrate its scalability, efficiency and robustness properties through simulation. Its performance can be examined under real environments by combining EKM with the existing P2P media streaming protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A Survey and Comparison of Peer-to-Peer Overlay Network Schemes. In: IEEE Communications Surveys & Tutorials, pp. 72–93. Second Quarter (2005)

    Google Scholar 

  2. Theotokis, S.A., Spinellis, D.: A Survey of Peer-to-Peer Content Distribution Technologies. ACM Computing Surveys 36(4), 335–371 (2004)

    Article  Google Scholar 

  3. Chu, Y.-H., Rao, S.G., Zhang, H.: A Case for End Systems Multicast. In: ACM SIGMETRICS, pp. 1–12 (2000)

    Google Scholar 

  4. Banerjee, S., Bhattacharjee, B., Kommeareddy, C.: Scalable application layer multicast. In: Proceedings of ACM Sigcomm (August 2002)

    Google Scholar 

  5. Tran, D., Hua, K., Do., T.: ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Streaming. In: Proceedings of IEEE INFOCOM 2003, San Francisco, CA, USA (April 2003)

    Google Scholar 

  6. Judge, P., Ammar, M.: Security issues and solutions in multicast content distribution: a survey. Network 17(1), 30–36 (2003)

    Google Scholar 

  7. Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys (CSUR) 35(3), 309–329 (2003)

    Article  Google Scholar 

  8. Wong, C., Gouda, M., Lam, S.: Secure group communication using key graphs. IEEE/ACM Transaction on Networking 8, 16–30 (2000)

    Article  Google Scholar 

  9. Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures. RFC 2627 (June 1999)

    Google Scholar 

  10. Mitta, S.: Iolus: A framework for the scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997, pp. 277–288 (September 1997)

    Google Scholar 

  11. Perrig, A., Song, D., Tygar, J.D.: A New Protocol for Efficient Large-Group Key Distribution. In: Proceedings of IEEE Symposium on Security and Privacy, Los Alamitos, USA (2001)

    Google Scholar 

  12. Canetti, R., Garay, J., Itkis, G., et al.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Proceedings of IEEE INFOCOM, pp. 708–716 (1999)

    Google Scholar 

  13. Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1599, pp. 459–474. Springer, Heidelberg (1999)

    Google Scholar 

  14. Banerjee, S., Bhattacharjee, B.: Scalable Secure Group Communication over IP Multicast. IEEE Journal on Selected Areas in Communications 20(8), 1511–1527 (2002)

    Article  Google Scholar 

  15. Zhao, B., Kubiatowicz, J., Joseph, A.: Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. Technical Report, UCB/CSD-01-1141 (2000)

    Google Scholar 

  16. Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: Proc. of SIGCOMM 2001, pp. 149–160 (August 2001)

    Google Scholar 

  17. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content- Addressable Network. In: Proceedings of SIGCOMM 2001, pp. 161–172 (August 2001)

    Google Scholar 

  18. Rivest, R.L.: The MD5 Message-Digest Algorithm. RFC 1321 (April 1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qiu, F., Lin, C., Yin, H. (2006). EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming. In: Zhuang, Y., Yang, SQ., Rui, Y., He, Q. (eds) Advances in Multimedia Information Processing - PCM 2006. PCM 2006. Lecture Notes in Computer Science, vol 4261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922162_46

Download citation

  • DOI: https://doi.org/10.1007/11922162_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48766-1

  • Online ISBN: 978-3-540-48769-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics