2013
DOI: 10.1002/ett.2722
|View full text |Cite
|
Sign up to set email alerts
|

On the use of Attribute‐Based Encryption for multimedia content protection over Information‐Centric Networks

Abstract: Video streaming dominates the Internet traffic, a trend that is expected to increase in the next years. End users expect to access video content, regardless of their device, connection type and location. On the other hand, content providers set strict security requirements regarding the protection of their content, making up an overall difficult and challenging context for Over‐the‐Top service providers. A miscellany of proprietary approaches tries to address these issues, providing, however, only partial solu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 45 publications
0
5
0
2
Order By: Relevance
“…This approach is not sufficient since the name of the content can be easily identified. To improve upon access control mechanisms in CCN (securing the content and its name) from unauthorized users, several mechanisms have been proposed, such as attribute encryption access, [33][34][35] proxy re-encryptions, and broadcast encryption access control schemes [36,37].…”
Section: Secured Content Centric Network (Ccn/ndn)mentioning
confidence: 99%
“…This approach is not sufficient since the name of the content can be easily identified. To improve upon access control mechanisms in CCN (securing the content and its name) from unauthorized users, several mechanisms have been proposed, such as attribute encryption access, [33][34][35] proxy re-encryptions, and broadcast encryption access control schemes [36,37].…”
Section: Secured Content Centric Network (Ccn/ndn)mentioning
confidence: 99%
“…However, the cryptographic scheme should be carefully chosen, as some of them may hinder the caching (like traditional symmetric key cryptographic schemes, in which a content encrypted to a given user may not be useful to any other user [13]). Different cryptographic approaches have been explored in access control solutions for ICN, such as attribute-based encryption [3], [5], [14] and broadcast encryption [4]. The idea of such solutions is to create groups of users to share keys for decrypting content, consequently optimizing caching over the network.…”
Section: A Access Control In Information-centric Networkmentioning
confidence: 99%
“…Staying in the multimedia domain, Papanis et al are focusing on the protection of video streams circulated in an information‐centric network employing an Attribute‐Based Encryption scheme. The paper provides a unified architecture covering the full DRM life cycle, integrated with Attribute‐Based Encryption, so as to cover the requirements of the latter in a DRM ecosystem.…”
Section: Special Issue Summarymentioning
confidence: 99%