2016
DOI: 10.1109/jsac.2016.2577301
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching

Abstract: In-network content caching has been a natural trend in emerging network architectures to handle the exponential growth of video traffic. However, due to the potentially wide attacking surfaces, caching video content in the increasingly untrusted networked environment inevitably raises new concerns on user privacy exposure and unauthorized video access. Existing encrypted protocols like HTTPs either fall short of fully leveraging in-network caching or require decrypting the traffic in the middle without guarant… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Currently, there are mainly three kinds of privacy protection methods. The first kind is cryptography-based methods, e.g., encryption transmission [1], [17], [18], secured multi-party computing [34] and blockchain-based methods [35]- [37]. For example, Yuan et al [17] proposed an encrypted video delivery protocol to prevent external attackers from accessing user privacy at in-network caching.…”
Section: Privacy Protection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, there are mainly three kinds of privacy protection methods. The first kind is cryptography-based methods, e.g., encryption transmission [1], [17], [18], secured multi-party computing [34] and blockchain-based methods [35]- [37]. For example, Yuan et al [17] proposed an encrypted video delivery protocol to prevent external attackers from accessing user privacy at in-network caching.…”
Section: Privacy Protection Methodsmentioning
confidence: 99%
“…Second, users' request traces will be automatically captured by content providers when users fetch specific video content. Encryption-based methods (e.g., [1], [17], [18]) cannot conceal request privacy since user requests must be visible to content providers for available video streaming. Third, the cost to protect video requests is much heavy because each individual video request consumes additional communication traffic bringing extra overhead to the CP and EC.…”
Section: Introductionmentioning
confidence: 99%
“…Yuan et al [54] first combined searchable encryption with efficient video delivery. They proposed a secure RE method to perform high-efficiency video delivery through encrypted in-network caching without revealing sensitive information about the videos.…”
Section: Fig 5 Architecture Of Blindbox [24] In the Setup Phase The Endpoint Prepares A Garbled Aes Embedded With The Encryption Key On Tmentioning
confidence: 99%
“…Ref. [9] proposes two different approaches for ISPs to efficiently cache contents in presence of encryption. In the first approach, the ISP infers information about popularity by analyzing the occurrences of pseudonomys associated with the contents and selects the contents to be cached accordingly.…”
Section: ) Privacy-preserving Cachingmentioning
confidence: 99%