ERA

Download the full-sized PDF of Multilevel access control and key management in scalable live streamingDownload the full-sized PDF

Analytics

Share

Permanent link (DOI): https://doi.org/10.7939/R3TP4Q

Download

Export to: EndNote  |  Zotero  |  Mendeley

Communities

This file is in the following communities:

Graduate Studies and Research, Faculty of

Collections

This file is in the following collections:

Theses and Dissertations

Multilevel access control and key management in scalable live streaming Open Access

Descriptions

Other title
Subject/Keyword
Key management
Acces control
Type of item
Thesis
Degree grantor
University of Alberta
Author or creator
Li, Xingyu
Supervisor and department
Davies, Robert J. (TRLabs)
Zhao, H.Vicky (Electrical and Computer Engineering )
Examining committee member and department
Yang, Herb (Computing Science)
Jiang, Hai (Electrical and Computer Engineering)
Department
Department of Electrical and Computer Engineering
Specialization

Date accepted
2009-12-17T17:51:20Z
Graduation date
2010-06
Degree
Master of Science
Degree level
Master's
Abstract
To prevent unauthorized access of multimedia content, effective access control and efficient key management schemes are of crucial importance for multimedia live streaming applications. To address the network heterogeneity, this thesis investigates scalable and multilevel access control, where a single bit stream can offer access to different levels of service. It uses the POSET hash-based structure to explore the data dependency between different layers in scalable coding, and proposes a secure and efficient key management scheme that uses public information and hash functions to reduce the rekey overhead. For those applications that require strict forward/backward security, sequential rekey is used to update keys. This thesis also addresses frequent membership update in live streaming, and considers applications that can tolerate a small amount of content leak. Through exploring their unique characteristics in membership dynamics, the proposed schemes reduce the rekey cost significantly.
Language
English
DOI
doi:10.7939/R3TP4Q
Rights
License granted by Xingyu Li (xingyu@ualberta.ca) on 2009-12-15T02:48:42Z (GMT): Permission is hereby granted to the University of Alberta Libraries to reproduce single copies of this thesis and to lend or sell such copies for private, scholarly or scientific research purposes only. Where the thesis is converted to, or otherwise made available in digital form, the University of Alberta will advise potential users of the thesis of the above terms. The author reserves all other publication and other rights in association with the copyright in the thesis, and except as herein provided, neither the thesis nor any substantial portion thereof may be printed or otherwise reproduced in any material form whatsoever without the author's prior written permission.
Citation for previous publication

File Details

Date Uploaded
Date Modified
2014-04-25T00:48:24.460+00:00
Audit Status
Audits have not yet been run on this file.
Characterization
File format: pdf (Portable Document Format)
Mime type: application/pdf
File size: 649515
Last modified: 2015:10:12 20:14:37-06:00
Filename: Li_Xingyu_Spring 2010.pdf
Original checksum: 8a2322061f3824ca4e355b26512731a5
Well formed: true
Valid: true
Page count: 88
Activity of users you follow
User Activity Date