Adapting Encrypted Data Streams in Open Architectures

نویسندگان

  • Peter L. Reiher
  • Kevin Eustice
  • Kai-Min Sung
چکیده

Open architectures meet the demands of increasingly complex and diverse networks by adding programmability to some or all components of the network infrastructure. The effectiveness of this programmability, however, is severely reduced in the domain of encrypted data streams. Because encrypted streams are opaque, existing solutions to adapting encrypted data are limited to either performing link-level encryption across each node, or restricting adaptations to those that do not require knowledge of the content. These restrictions either reduce the functionality of the system or compromise the security of the data stream. This research examines an alternative method of adapting encrypted streams through intelligent tagging and layering of the data content. Sending separately encrypted layers of the data allows for adaptation of the data stream without actually decrypting the data along any point of the connection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

Enhanced Data Hiding in Encrypted Video Streams

To maintain security and privacy, digital video needs to be processed in encrypted format. The data should be concealed in the encrypted videos for the purpose of content notation and also for the tampering detection. By following this data hiding in encrypted domain preserves the confidentiality of the content without decryption. The three major parts of a novels scheme of concealing the data ...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Streaming Media: Risks and Solution Design a Secure Streaming System

Media streaming over internet is compelling for popular data shared in the Web, and the protection of it via security techniques is of vast interest. The video data creates security risks as data is moved over internet. This paper will cover generation architectures of security on the Video (Motion Picture + Sound) streams applied in order to achieve high security level of video transfer throug...

متن کامل

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important issue. Many researchers have proposed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001