ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Time Authentication Scheme for Streaming Data
Cited - time in scopus Share share facebook twitter linkedin kakaostory
Authors
Nam-Su Jho, Taek-Young Youn, Ku-Young Jang
Issue Date
2015-12
Citation
International Conference on Internet (ICONI) 2015, pp.159-161
Language
English
Type
Conference Paper
Abstract
Method for authenticating of streaming data becomes more important as many applications like cloud services, online gaming, multimedia streaming services are popular. Previously proposed streaming data authentication methods mainly focused on identifying data provider and integrity of streamed data over insecure network (or channels with data loss). In some applications, it is also important to authenticating exact time when the data stream is generated (and it is not modified later). For example, we can consider the online surveillance, in which the streaming data is stored to be used in the future. In this model the data provider can be an adversary who can generate properly authenticatable data packets and replace the previously generated ones later. In this paper, we first consider the problem of authenticating the generation time of streamed data packets. The solution is based on Chameleon hash function, which provides a trapdoor for finding collisions. Moreover, the method can be applied to any previously proposed streaming data authentication schemes without reducing the efficiency of usual data authentication.
KSP Keywords
Authentication method, Cloud service, Data Authentication, Data loss, Data packet, Data stream, Generation time, Multimedia streaming, Online gaming, Streaming Data, Streaming service