DocumentCode :
3410405
Title :
Threat methodology for securing scalable video in the Cloud
Author :
Khan, Anwar Ulla ; Oriol, Manuel ; Kiran, M.
Author_Institution :
Dept. of Comput. Sci., Univ. of York, York, UK
fYear :
2013
fDate :
9-12 Dec. 2013
Firstpage :
428
Lastpage :
436
Abstract :
Scalable video using Cloud Computing is a potential solution for the distribution of media content to a large number of users. This may occur over a heterogeneous network connected to devices with different capabilities and diverse set of users. Although some of the problems are well known and understood in information and network security, there is still a need to improve the existing solutions to produce a solution that is both adequately secure and efficient in highly distributed and scalable environments. In this paper, we describe such improvements using a cloud computing scenario where video content is made available through a cloud platform. When put on an Infrastructure as a Service (IaaS) cloud video content should then be viewable by different consumers using different levels of bandwidth and security requirements depending on their identity. This requires a mechanism through which a cloud service could be authenticated and encrypted by end users. This paper describes the novel solution of securing scalable video in the cloud discussing the various threats for video distribution and how these can be made more secure in terms of confidentiality, availability and integrity, particularly threw source authentication and encryption.
Keywords :
cloud computing; cryptography; data integrity; multimedia systems; IaaS; cloud computing; cloud service; cloud video content; infrastructure as a service; scalable video security; security requirements; source authentication; source encryption; threat methodology; video availability; video confidentiality; video content distribution; video integrity; Broadcasting; Cryptography; Indexes; Servers; Authentication; Cloud Computing; Encryption; Security; Threat Assessment;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
Conference_Location :
London
Type :
conf
DOI :
10.1109/ICITST.2013.6750237
Filename :
6750237
Link To Document :
بازگشت