SlideShare a Scribd company logo
Impulse Technologies
                                      Beacons U to World of technology
        044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
    On the Security and Efficiency of Content Distribution via Network
                                  Coding
   Abstract
          Content distribution via network coding has received a lot of attention lately.
   However, direct application of network coding may be insecure. In particular,
   attackers can inject "bogus” data to corrupt the content distribution process so as to
   hinder the information dispersal or even deplete the network resource. Therefore,
   content verification is an important and practical issue when network coding is
   employed. When random linear network coding is used, it is infeasible for the
   source of the content to sign all the data, and hence, the traditional "hash-and-sign”
   methods are no longer applicable. Recently, a new on-the-fly verification
   technique has been proposed by Krohn et al. (IEEE S&P '04), which employs a
   classical homomorphic hash function. However, this technique is difficult to be
   applied to network coding because of high computational and communication
   overhead. We explore this issue further by carefully analyzing different types of
   overhead, and propose methods to help reducing both the computational and
   communication cost, and provide provable security at the same time.




  Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
                                                                                          1

More Related Content

DOCX
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF...
DOCX
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
PDF
Presentation aina2016 seg3.0_methodology_v2
PDF
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
PPTX
Use of hog descriptors in phishing detection
PDF
K nearest neighbor classification over semantically secure encrypted relation...
PDF
K nearest neighbor classification over semantically secure encrypted relation...
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF...
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
Presentation aina2016 seg3.0_methodology_v2
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
Use of hog descriptors in phishing detection
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...

What's hot (20)

DOCX
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
DOCX
K nearest neighbor classification over semantically secure encrypted
PPTX
Isse 2014 homomorphic encryption and porticor post event
PPTX
becan
PDF
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
PDF
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
PPTX
Aicis'18 evaluation paper 47
PDF
Control Cloud Data Access Using Attribute-Based Encryption
PPTX
Employ the Cloud for Efficient Content Analytics - 10 november 2011
PDF
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
PDF
Network Forensic Investigation of HTTPS Protocol
PDF
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
PDF
Data Mining on Web URL Using Base 64 Encoding to Generate Secure URN
PDF
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
PPT
Privacy Techniques in Fourth Generation Heterogeneous Networks
PDF
International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011
PDF
Kadai1
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
K nearest neighbor classification over semantically secure encrypted
Isse 2014 homomorphic encryption and porticor post event
becan
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
Aicis'18 evaluation paper 47
Control Cloud Data Access Using Attribute-Based Encryption
Employ the Cloud for Efficient Content Analytics - 10 november 2011
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Network Forensic Investigation of HTTPS Protocol
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
Data Mining on Web URL Using Base 64 Encoding to Generate Secure URN
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Privacy Techniques in Fourth Generation Heterogeneous Networks
International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011
Kadai1
Ad

Similar to 4 (20)

PDF
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
PDF
IEEE Projects 2012-2013 Network Security
PDF
PDF
PDF
1757 1761
PDF
1757 1761
PDF
Network Coding Applications Christina Fragouli Emina Soljanin
PDF
Project titles abstract_2012
PDF
Networkaware Source Coding And Communication 1st Edition Nima Sarshar Et Al
PDF
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
PPTX
Coding Scheme/ Information theory/ Error coding scheme
DOC
Java and .net IEEE 2012
PDF
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
PDF
Network aware source coding and communication 1st Edition Nima Sarshar
PDF
NWCRG-IAB-Review-IETF91.pdf
PDF
Elgamal signature for content distribution with network coding
PDF
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
PDF
Ijetcas14 488
PDF
Ieee Projects Asp.Net Projects Ieee 2009
PDF
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
IEEE Projects 2012-2013 Network Security
1757 1761
1757 1761
Network Coding Applications Christina Fragouli Emina Soljanin
Project titles abstract_2012
Networkaware Source Coding And Communication 1st Edition Nima Sarshar Et Al
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Coding Scheme/ Information theory/ Error coding scheme
Java and .net IEEE 2012
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Network aware source coding and communication 1st Edition Nima Sarshar
NWCRG-IAB-Review-IETF91.pdf
Elgamal signature for content distribution with network coding
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
Ijetcas14 488
Ieee Projects Asp.Net Projects Ieee 2009
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Ad

4

  • 1. Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in On the Security and Efficiency of Content Distribution via Network Coding Abstract Content distribution via network coding has received a lot of attention lately. However, direct application of network coding may be insecure. In particular, attackers can inject "bogus” data to corrupt the content distribution process so as to hinder the information dispersal or even deplete the network resource. Therefore, content verification is an important and practical issue when network coding is employed. When random linear network coding is used, it is infeasible for the source of the content to sign all the data, and hence, the traditional "hash-and-sign” methods are no longer applicable. Recently, a new on-the-fly verification technique has been proposed by Krohn et al. (IEEE S&P '04), which employs a classical homomorphic hash function. However, this technique is difficult to be applied to network coding because of high computational and communication overhead. We explore this issue further by carefully analyzing different types of overhead, and propose methods to help reducing both the computational and communication cost, and provide provable security at the same time. Your Own Ideas or Any project from any company can be Implemented at Better price (All Projects can be done in Java or DotNet whichever the student wants) 1