2nd International ICST Conference on Communications and Networking in China

Research Article

sStream: Peer-to-Peer Live Streaming with Efficient User Authentication and Key Management

  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469379,
        author={Xuening Liu and Hao Yin and Chuang Lin},
        title={sStream: Peer-to-Peer Live Streaming with Efficient User Authentication and Key Management},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={P2P live streaming  hash-chain  key management  user authentication},
        doi={10.1109/CHINACOM.2007.4469379}
    }
    
  • Xuening Liu
    Hao Yin
    Chuang Lin
    Year: 2008
    sStream: Peer-to-Peer Live Streaming with Efficient User Authentication and Key Management
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469379
Xuening Liu1,*, Hao Yin1,*, Chuang Lin2,*
  • 1: Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, P.R. China
  • 2: Department of Computer Science and Tehnology, Tsinghua University, Beijing, 100084, P.R. China
*Contact email: xliu@csnet1.cs.tsinghua.edu.cn, hyin@csnet1.cs.tsinghua.edu.cn, clin@csnet1.cs.tsinghua.edu.cn

Abstract

Recent development of Peer-to-Peer (P2P) based media streaming technique brings unprecedented new momentum to the Internet streaming, which has been shown to be cost effective, scalable and easy to deploy. However, before these applications can be successfully and commercially deployed, it is very significant to achieve efficient access control mechanisms. Based our earlier research of secure streaming architecture of TrustStream, this work continues in-depth study on how to ensure that only the authorized users can access the correct media in p2p live streaming systems by adopting proposed user authentication and key management schemes. The main properties of presented secure systems include: i) the management server issues each authorized user a unique publickey certificate for other participant verifying its legal identity; ii) the lifetime of issued certificate is based upon media content instead of host’s system time; iii) one-way hash-chain technique is employed to extend the certificate’s lifetime; iv) the media is encrypted by the session key (SK) and then delivered to the communication group members; v) the SK is updated periodically and irrespective of clients’ behaviors; vi) the rekeying messages are selectively distributed to legitimate users via the p2p overlay network. Moreover, the analysis shows the efficiency, scalability and robustness of given schemes in p2p live streaming systems, named “sStream”.