CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Stratum based Approach for Securing Multimedia Content Transmission over Large Scale P2P

by Ramesh Shahabadkar, Ramachandra V. Pujeri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 5
Year of Publication: 2014
Authors: Ramesh Shahabadkar, Ramachandra V. Pujeri
10.5120/15501-4279

Ramesh Shahabadkar, Ramachandra V. Pujeri . Stratum based Approach for Securing Multimedia Content Transmission over Large Scale P2P. International Journal of Computer Applications. 89, 5 ( March 2014), 43-48. DOI=10.5120/15501-4279

@article{ 10.5120/15501-4279,
author = { Ramesh Shahabadkar, Ramachandra V. Pujeri },
title = { Stratum based Approach for Securing Multimedia Content Transmission over Large Scale P2P },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 5 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 43-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number5/15501-4279/ },
doi = { 10.5120/15501-4279 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:28.873785+05:30
%A Ramesh Shahabadkar
%A Ramachandra V. Pujeri
%T Stratum based Approach for Securing Multimedia Content Transmission over Large Scale P2P
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 5
%P 43-48
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the increase of customer base over internet, a large community of the user adopts p2p network because of its potential characteristics of file sharing. From the past decade there has been an extensive research work towards ensuring better security systems over p2p network. However, majority of the security techniques are either highly sophisticated or doesn't yield full fledge security to the user. Hence, the proposed system introduces a security technique for safeguarding the communication channel that is used for multimedia contents sharing. The proposed system uses the potential characteristics of large scale distributed network and scalable coding to perform ciphering process of the multimedia files over P2P. The outcomes of the results are evaluated with respect to PSNR to find that computational overhead is significantly low. Thereby the proposed system ensure cost effective security model in p2p. .

References
  1. http://www. computerworld. com/s/article/69883/Peer_to_Peer_Network, Accessed on 21st Feb, 2014
  2. T. Do. , KA. Hua. , M. Tantaoui. 2004. P2VoD: Providing Fault Tolerant Video-on-Demand Streaming in Peer-to-Peer Environment. the Proc. of the IEEE ICC, France
  3. D. Ciullo. , M. A. Garcia. , A. Horvath, E. Leonardi, M. Mellia, D. Rossi, M. Telek, P. Veglia. 2008. Dissecting PPLive, SopCast, TVAnts, techrep, Polito
  4. http://zeenews. india. com/news/net-news/cyber-criminals-targeting-social-networking-sites-to-steal-money_827996. html, Accessed on 21st Feb, 2014
  5. G. Kalman. , M. Patrick. , M. Burkhard. , H. Daniel. , K. Aleksandra. , S. Ralf. 2009. Practical Security in P2P-based Social Networks, IEEE 34th Conference, pp. 269-272
  6. S. Anil. , M. Upendra. , R. Ajay. 2012. A pragmatic analysis of peer to peer networks and protocols for security and confidentiality, IJCCR, Vol. 2, Issue. 6
  7. http://ntrg. cs. tcd. ie/undergrad/4ba2. 02-03/p10. html, Accessed on 21st Feb, 2014
  8. M. Wolfgang. , E. Martin. , H. Andreas. 2004. Efficient content-based P2P image retrieval using peer content descriptions, SPIE Electronic Imaging
  9. J. Eui-Hyun. , C. Seong-Yun. 2006. A Robust Digital Watermarking System Adopting 2D Barcode against Digital Piracy on P2P network, International Journal of Computer Science and Network Security, Vol. 6, No. 10
  10. C-C, Chu. , X, Su. , B. S. Prabhu, R. Gadh. , S. Kurup. ,G. Sridhar. , V. Sridhar. 2006. Mobile DRM for Multimedia Content Commerce in P2P Networks, IEEE, CCNC
  11. S. Kumar, P. Sivaprakasam. 2012. A New Approach for Encrypting and Decrypting Data in Images among users in Ad hoc Network, European Journal of Scientific Research ISSN 1450-216X, Vol. 92, No. 3, pp. 425-430
  12. M. Bertrand. , G. G. Le. , D. Mathieu. 2010. Mitigating illegal contents via watermarking in video streaming P2P network, In Proc. IEEE Advanced Networks and Telecommunication Systems, India
  13. M. Djamal-Eddine. , M. Mubasher. , A. Toufik. 2006. Open Issues in P2P Multimedia Streaming, Multicomm
  14. B. Tom. 2005. Skype security evaluation, Anagram Laboratories
  15. T. Yun. , L. Jian-Guang. , Z. Qian. , Z. Meng. , Y. Shi-Qiang. 2007. Deploying P2P Networks for Large-Scale Live Video-Streaming Service, IEEE Communications Magazine
  16. H. Daniel. , W. James. 2005. Distributed video encoding over a peer-to-peer network, PREP
  17. R. Diego. , L. Alfio. , S. Giovanni. 2009. A P2P Platform based on Rate-Controlled FGS encoding for Broadcast Video Transmission to Heterogeneous Terminals with Heterogeneous Network Access, GTTI
  18. H. Philipp. 2012. Censorship-resistant Collaboration with a Hybrid DTN/P2P Network, Masters Thesis
  19. S. A. Kumar. , M. Shubham. ,Dekar, R. 2012. Peer to Peer Secure Communication in Mobile Environment: A Novel Approach, International Journal of Computer Applications, (0975 – 8887) Vol. 52, No. 9
  20. K. S. Sudhan. , G. Thangaraj. , P. Deepa. 2012. Achieving Quality of Metric for Video Streaming Service in the Warehouse Application with Coexisting of IEEE 802. 11 a/b/g Standards, International Journal of Computer Applications
  21. E. A. F. Ferreira. 2011. Detection of Encrypted Traf_c Generated by Peer-to-Peer Live Streaming Applications Using Deep Packet Inspection
  22. D. Heiko. 2012. Analysing the Security of Incentive Schemes in P2P-based File-sharing Systems
  23. http://trace. eas. asu. edu/yuv/, Accessed on 21st Feb, 2014
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Key Management P2P Security.