Traffic Pattern-Based Content Leakage Detection for Trusted
Content Delivery Networks
ABSTRACT:
Due to the
increasing popularity of multimedia streaming applications and services in
recent years, the issue of trusted video delivery to prevent undesirable
content-leakage has, indeed, become critical. While preserving user privacy,
conventional systems have addressed this issue by proposing methods based on
the observation of streamed traffic throughout the network. These conventional
systems maintain a high detection accuracy while coping with some of the
traffic variation in the network (e.g., network delay and packet loss),
however, their detection performance substantially degrades owing to the
significant variation of video lengths.In this paper, we focus on overcoming
this issue by proposing a novel content-leakage detection scheme that is robust
to the variation of the video length. By comparing videos of different lengths,
we determine a relation between the length of videos to be compared and the similarity
between the compared videos. Therefore, we enhance the detection performance of
the proposed scheme even in an environment subjected to variation in length of
video. Through a testbed experiment, the effectiveness of our proposed scheme
is evaluated in terms of variation of video length, delay variation, and packet
loss.
EXISTING SYSTEM:
A crucial
concern in video streaming services is the protection of the bit stream from
unauthorized use, duplica-tion and distribution. One of the most popular approaches
to prevent undesirable contents distribution to unauthorized users and/or to
protect authors’ copyrights is the digital rights management (DRM) technology.
Most DRM techni-ques employ cryptographic or digital watermark
techniques.However, this kind of approaches have no significant effect on
redistribution of contents, decrypted or restored at the user-side by
authorized yet malicious users.
DISADVANTAGES
OF EXISTING SYSTEM:
Moreover,
redistribution is technically no longer difficult by using peer-to-peer (P2P)
streaming software . Hence,streaming traffic may be leaked to P2P networks.
PROPOSED SYSTEM:
In this paper,
we focus on the illegal redistribution of streaming content by an authorized
user to external networks.The existing proposals monitor information obtained
at different nodes in the middle of the streaming path. The retrieved
information are used to generate traffic patterns which appear as unique
waveform per content, just like a fingerprint.
ADVANTAGES
OF PROPOSED SYSTEM:
ü These technologies enhance the distribution of any
type of information over the Internet .
ü The traffic pattern generation process performed in
conventional methods.
SYSTEM
REQUIREMENTS:
HARDWARE REQUIREMENTS:
Ø
System : Pentium IV 2.4 GHz.
Ø
Hard Disk :
40 GB.
Ø
Floppy Drive : 1.44
Mb.
Ø
Monitor : 15
VGA Colour.
Ø
Mouse :
Logitech.
Ø Ram : 512 Mb.
SOFTWARE
REQUIREMENTS:
Ø Operating system : Windows
XP/7.
Ø Coding Language : JAVA/J2EE
Ø IDE : Netbeans 7.4
Ø Database : MYSQL
REFERENCE:
Hiroki
Nishiyama, Desmond Fomo, Zubair Md. Fadlullah, and Nei Kato “Traffic
Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks” IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS,VOL. 25,NO. 2,FEBRUARY 2014.
No comments:
Post a Comment