A Speed Adjustable Scheme based Selective Encryption Control Model for Large-scale Multimedia Sensing System under Resources Constraints

被引:0
作者
Xiao, Chen [1 ]
Li, Tiemeng [1 ]
Yang, Nan [1 ]
Wang, Lifeng [2 ]
Ma, Shilong [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing Key Lab Intell Telecommun Software & Mult, Sch Comput Sci & Technol, Beijing, Peoples R China
[2] Beijing Elect Sci & Technol Inst, Dept Elect & Inform Engn, Beijing, Peoples R China
[3] Beihang Univ, Sch Comput Sci & Engn, Beijing, Peoples R China
来源
2014 IEEE COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP) | 2014年
关键词
multimedia sensing; internet of things; video encryption; resources constraint; SECURITY; INTERNET;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Video and audio streams in large-scale multimedia sensing system are high-volume, while computation and power resources are very scarce, which restricts the usage of complex data security process on multimedia data. Therefore, the confidentiality of video data under resources constraints is studied in this paper. Firstly, the trend of resources constraints is discussed, and an analysis model for multimedia data encryption optimization is proposed. Secondly, a general-purpose lightweight speed adjustable video encryption scheme is given. Thirdly, a series of selective encryption control models and their solution algorithms are proposed. Experimental analyses show the performances of the presented schemes are effective enough to support real-time multimedia sensing applications.
引用
收藏
页码:104 / 109
页数:6
相关论文
共 10 条
[1]  
[Anonymous], SECURITY CO IN PRESS
[2]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[3]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[4]   Security Challenges in the IP-based Internet of Things [J].
Heer, Tobias ;
Garcia-Morchon, Oscar ;
Hummen, Rene ;
Keoh, Sye Loong ;
Kumar, Sandeep S. ;
Wehrle, Klaus .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) :527-542
[5]  
Lian S., 2008, Multimedia Content Encryption: Techniques and Applications
[6]   A survey of video encryption algorithms [J].
Liu, Fuwen ;
Koenig, Hartmut .
COMPUTERS & SECURITY, 2010, 29 (01) :3-15
[7]  
Martello S., 1987, ANN DISCRETE MATH
[8]  
Ning H., 2012, ADV INTERNET THINGS, V2, P1, DOI [10.4236/ait.2012.21001, DOI 10.4236/AIT.2012.21001]
[9]  
Qiao L., 1997, Las Vegas : Proceedings of the 1s International Conference on Imaging Science, Systems and Technology, P21
[10]  
Xiao C, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, P871