Top Banner
KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming
47

KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

KIANOOSH MOKHTARIAN

SCHOOL OF COMPUTING SCIENCESIMON FRASER UNIVERSITY

3/24/2008

Secure Multimedia Streaming

Page 2: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Motivation

Multimedia streaming: a great source of revenue Its market will grow from $900 mln in 2005 to $6 bln in 2011

Page 3: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Motivation

Multimedia streaming: a great source of revenue Its market will grow from $900 mln in 2005 to $6 bln in 2011

Affecting our daily lives

Page 4: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Motivation

Multimedia streaming: a great source of revenue Its market will grow from $900 mln in 2005 to $6 bln in 2011

Affecting our daily lives

Security of multimedia systems

Page 5: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Overview

Desired security aspects

Conventional authentication methods

Requirements for a media authentication scheme

Previous works Stream authentication Typical video authentication Scalable video authentication

Conclusion and future research directions

Page 6: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

What Security Aspects?

Page 7: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

What Security Aspects?

Authentication

Data integrity

Access control

Data confidentiality

Non-repudiation

Availability of service

Page 8: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

What Security Aspects?

Authentication

Data integrity

Access control

Data confidentiality

Non-repudiation

Availability of service

Page 9: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

An Example

The Olympic games $$!

Page 10: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

An Example

The Olympic games

The network is by default UNSECURE Anyone can listen, capture, and replace the traffic.

Page 11: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conventional Authentication: Preliminaries

Digital signature Publicly verifiable Message dependant Not repudiatable

Page 12: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conventional Authentication: Preliminaries

Digital signature Publicly verifiable Message dependant Not repudiatable

One-way hash functions Fixed length output Easy to compute y = H(x) for everyone Infeasible to compute x given the value of H(x) Infeasible to find x1 and x2 such that H(x1) = H(x2)

if H(x) is authentic, then x is authentic

Page 13: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conventional Auth’: the Case of Multimedia

Treating the entire media as a file:Sign ( Hash(media) ) and Verify ( Hash(media) )

Page 14: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conventional Auth’: the Case of Multimedia

Treating the entire media as a file:Sign ( Hash(media) ) and Verify ( Hash(media) ) Cannot produce the media online Cannot verify the media online Sensitive to any loss or adaptation on the media

Page 15: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conventional Auth’: the Case of Multimedia

Treating the entire media as a file:Sign ( Hash(media) ) and Verify ( Hash(media) ) Cannot produce the media online Cannot verify the media online Sensitive to any loss or adaptation

Signing each frame

Page 16: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conventional Auth’: the Case of Multimedia

Treating the entire media as a file:Sign ( Hash(media) ) and Verify ( Hash(media) ) Cannot produce the media online Cannot verify the media online Sensitive to any loss or adaptation

Signing each frame Computationally expensive

Page 17: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conventional Auth’: the Case of Multimedia

Treating the entire media as a file:Sign ( Hash(media) ) and Verify ( Hash(media) ) Cannot produce the media online Cannot verify the media online Sensitive to any loss or adaptation

Signing each frame Computationally expensive

Using Message Authentication Codes (MAC) y = MACK (x) = Hash (x || K)

Page 18: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conventional Auth’: the Case of Multimedia

Treating the entire media as a file:Sign ( Hash(media) ) and Verify ( Hash(media) ) Cannot produce the media online Cannot verify the media online Sensitive to any loss or adaptation

Signing each frame Computationally expensive

Using Message Authentication Codes (MAC) y = MACK (x) = Hash (x || K) Cannot go beyond single-sender single-receiver case

Page 19: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Page 20: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Security!

Page 21: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Security!Online production, online verification

Page 22: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Security!Online production, online verificationComputational cost

Page 23: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Security!Online production, online verificationComputational costCommunication overhead

Page 24: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Security!Online production, online verificationComputational costCommunication overheadBuffer needed for authentication purposes

Page 25: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Security!Online production, online verificationComputational costCommunication overheadBuffer needed for authentication purposesRobustness against adaptations on the media

Whether to get the proxies involved or not

Page 26: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Security!Online production, online verificationComputational costCommunication overheadBuffer needed for authentication purposesRobustness against adaptations on the media

Whether to get the proxies involved or notTolerability of packet losses in network

Page 27: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Requirements

Security!Online production, online verificationComputational costCommunication overheadBuffer needed for authentication purposesRobustness against adaptations on the media

Whether to get the proxies involved or notTolerability of packet losses in networkSupported scenarios

Page 28: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Stream Authentication

Hash chaining

Packet 2 Packet nDigital Signature

Hash

H(pkt3)

Packet 1

H(pkt2)

StreamSignature

Page 29: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Stream Authentication

Hash chaining

No online production of the authenticated stream

Packet 2 Packet nDigital Signature

Hash

H(pkt3)

Packet 1

H(pkt2)

StreamSignature

Page 30: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Stream Authentication

Hash chaining

No online production of the authenticated stream Sensitive to any packet loss

Packet 2 Packet nDigital Signature

Hash

H(pkt3)

Packet 1

H(pkt2)

StreamSignature

Page 31: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Stream Authentication

One-time signature Based on conventional (symmetric) cryptographic functions

One-time signature chaining

Packet nDigital

SignatureOne-time signature

Packet 1

Signature on pkt n

StreamSignature

Public key to verify pkt 2

Packet 2

Signature on pkt 2

Public key to verify pkt 3

Page 32: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Stream Authentication

One-time signature Based on conventional (symmetric) cryptographic functions

One-time signature chaining

High communication overhead

Packet nDigital

SignatureOne-time signature

Packet 1

Signature on pkt n

StreamSignature

Public key to verify pkt 2

Packet 2

Signature on pkt 2

Public key to verify pkt 3

Page 33: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Stream Authentication

One-time signature Based on conventional (symmetric) cryptographic functions

One-time signature chaining

High communication overhead Sensitive to any packet loss

Packet nDigital

SignatureOne-time signature

Packet 1

Signature on pkt n

StreamSignature

Public key to verify pkt 2

Packet 2

Signature on pkt 2

Public key to verify pkt 3

Page 34: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Stream Authentication

SAIDA: Signature Amortization using IDA (Information Dispersal Algorithms)

Hash

IDA coding

Packet m

Partial auth info

Packet 2

Partial auth info

Packet 1

Partial auth info

HashHash

Digital Signature

Page 35: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Stream Authentication

SAIDA: Signature Amortization using IDA (Information Dispersal Algorithms)

Tradeoff between verification delay and overheads

Hash

IDA coding

Packet m

Partial auth info

Packet 2

Partial auth info

Packet 1

Partial auth info

HashHash

Digital Signature

Page 36: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Video Authentication: The General Case

Exploiting the strong correlation between consecutive video frames To reduce overheads To increase robustness

Extract key frames in a video sequence Extract and authenticate key features of such frames Authenticate non-key frames based on key frames

Page 37: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Scalable Video Authentication: Recall

Scalable video To support heterogeneous receivers A base layer and a number of enhancement layers

Base layer

Enhancement layer 1

Enhancement layer 2

Enhancement layer 3

Enhancement layer 4

Frame 1

Base layer

Enhancement layer 1

Enhancement layer 2

Enhancement layer 3

Enhancement layer 4

Frame 2

Base layer

Enhancement layer 1

Enhancement layer 2

Enhancement layer 3

Enhancement layer 4

Frame 3

Base layer

Enhancement layer 1

Enhancement layer 2

Enhancement layer 3

Enhancement layer 4

Frame 4

Base layer

Enhancement layer 1

Enhancement layer 2

Enhancement layer 3

Enhancement layer 4

Frame 5

Page 38: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Scalable Video Authentication

Any number of enhancement layers may be dropped Non-scalable video/stream auth schemes do not work

Page 39: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Scalable Video Authentication

Any number of enhancement layers may be dropped Non-scalable video/stream auth schemes do not work

Authenticating only the base layer Not enough

Page 40: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Scalable Video Authentication

Extending the hash chaining to 2D

Base layer

Enhancement layer 1

Enhancement layer 2

Frame 1 Frame 2

Hash

Hash

Base layer

Enhancement layer 1

Enhancement layer 2

Hash

Hash

Hash

Page 41: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Scalable Video Authentication

Extending the hash chaining to 2D Erasure Correction

Codes (ECC)can be usedfor toleratingpacket loss

Base layer

Enhancement layer 1

Enhancement layer 2

Frame 1 Frame 2

Hash

Hash

Base layer

Enhancement layer 1

Enhancement layer 2

Hash

Hash

Hash

Page 42: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Scalable Video Authentication

Extending the hash chaining to 2D Erasure Correction

Codes (ECC)can be usedfor toleratingpacket loss

No online production Base layer

Enhancement layer 1

Enhancement layer 2

Frame 1 Frame 2

Hash

Hash

Base layer

Enhancement layer 1

Enhancement layer 2

Hash

Hash

Hash

Page 43: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Scalable Video Authentication

Extending the hash chaining to 2D Erasure Correction

Codes (ECC)can be usedfor toleratingpacket loss

No online production

Communicationoverhead

Base layer

Enhancement layer 1

Enhancement layer 2

Frame 1 Frame 2

Hash

Hash

Base layer

Enhancement layer 1

Enhancement layer 2

Hash

Hash

Hash

Page 44: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conclusion

No previous scheme meets all of the requirements

Page 45: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Conclusion

No previous scheme meets all of the requirements

Future research directions Multimedia-devoted hash functions

Support for modern video coding standards FGS, MGS

The case of P2P streaming Taking advantage of distribution of peers

Page 46: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Thank You

Any Questions?

Page 47: KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.

Main References

Stallings, W., “Cryptography and network security: principles and practices,” 4th Edition, Prentice Hall, 2006.

“Streaming media, iptv, and broadband transport: Telecommunications carriers and entertainment services 2006-2011,” The Insight Research Corporation, Technical Report, April 2006, http://www.insight-corp.com/execsummaries/iptv06execsum.pdf.

Gennaro, R., and Rohatgi, P., “How to sign digital streams,” in Advances in Cryptology (CRYPTO’97), Santa Barbara, CA, August 1997, LNCS vol. 1294, pp. 180–197.

Park, J., Chong, E. and Siegel, H., “Efficient multicast stream authentication using erasure codes,” ACM Transaction on Information and System Security (TISSEC), vol. 6, no. 2, pp. 258–285, May 2003.

Li, W., “Overview of fine granularity scalability in MPEG-4 video standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 3, pp. 301–317, March 2001.

Wu, Y., and Deng, R., “Scalable authentication of MPEG-4 streams,” IEEE Transactions on Multimedia, vol. 8, pp. 152–161, February 2006.