This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
July 2005 (vol. 17 no. 7)
pp. 1010-1014
We design a Tree-based Forward Digest Protocol (TFDP) to verify data integrity in distributed media streaming for content distribution. Several challenges arise, including the timing constraint of streaming sessions, the involvement of multiple senders, and the untrustworthiness of these senders. A comprehensive comparison is presented on the performance of existing protocols and TFDP, with respect to communication and computation overhead. Both simulation and Internet-based experimental results are presented to demonstrate the effectiveness of TFDP.

[1] D. Boneh, G. Durfee, and M. Franklin, “Lower Bounds for Multicast Message Authentication,” Proc. Eurocrypt Conf., pp. 437-452, 2001.
[2] R. Gennaro and P. Rohatgi, “How to Sign Digital Streams,” technical report, IBM T.J. Watson Research Center, 1997.
[3] M. Hefeeda, A. Habib, B. Botev, D. Xu, and B. Bhargava, “PROMISE: Peer-to-Peer Media Streaming Using CollectCast,” Proc. ACM Multimedia Conf., Nov. 2003.
[4] M.N. Krohn, M.J. Freedman, and D. Mazieres, “On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution,” Proc. IEEE Symp. Security and Privacy, May 2004.
[5] L. Lamport, “Constructing Digital Signatures from a One-Way Function,” Technical Report SRI-CSL-98, SRI Int'l Computer Science Laboratory, Oct. 1979.
[6] D.A. McGrew and A.T. Sherman, “Key Establishment in Large Dynamic Groups Using One-Way Function Trees,” IEEE Trans. Software Eng., vol. 29, pp. 444-458, May 2003.
[7] R.C. Merkle, “A Certified Digital Signature,” Proc. Conf. Advances in Cryptology, pp. 218-238, 1989.
[8] J.M. Park, E. Chong, and H. Siegel, “Efficient Multicast Packet Authentication Using Signature Amortization,” Proc. IEEE Symp. Security and Privacy, May 2002.
[9] A. Perrig, “The BiBa One-Time Signature and Broadcast Authentication Protocol,” Proc. ACM Conf. Computer and Comm. Security, pp. 28-37, Nov. 2001.
[10] A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and Secure Source Authentication for Multicast,” Proc. Network and Distributed System Security Symp., Feb. 2001.
[11] A. Perrig, R. Canetti, J.D. Tygar, and D.X. Song, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” Proc. IEEE Symp. Security and Privacy, pp. 56-73, Nov. 2000.
[12] S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Survey, vol. 35, no. 3, pp. 309-329, 2003.
[13] L. Reyzin and N. Reyzin, “Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying,” Proc. Seventh Australian Conf. Security and Information Privacy, Sept. 2002.
[14] R.L. Rivest, A. Shamir, and L.M. Adleman, “A Method for Obtaining Digital Signature and Public Key Cryptosystems,” Comm. ACM, pp. 120-126, Feb. 1978.
[15] P. Rohatgi, “A Compact and Fast Hybrid Signature Scheme for Multicast Packet,” Proc. ACM Conf. Computer and Comm. Security, pp. 93-100, Nov. 1999.
[16] C. Wong and S. Lam, “Digital Signatures for Flows and Multicasts,” IEEE/ACM Trans. Networking, vol. 7, no. 4, pp. 502-513, Aug. 1999.

Index Terms:
Index Terms- Data integrity, message digest, and media streaming.
Citation:
Ahsan Habib, Dongyan Xu, Mikhail Atallah, Bharat Bhargava, John Chuang, "A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 7, pp. 1010-1014, July 2005, doi:10.1109/TKDE.2005.102
Usage of this product signifies your acceptance of the Terms of Use.