1 efficient user authentication and key management for peer-to- peer live streaming systems authors:...

14
1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua Science and Technology, vol. 14, no. 2, pp. 234-241, 2009 Speaker: Shu-Fen Chiou ( 邱邱邱 )

Upload: emil-sherman

Post on 05-Jan-2016

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

1

Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

Authors: X. Liu, Y. Hao, C. Lin, and C. DuSource: Tsinghua Science and Technology, vol. 14, no. 2, pp. 234-241, 2009Speaker: Shu-Fen Chiou (邱淑芬 )

Page 2: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

2

Introduction

A

a.wmvFrame 1Frame 2Frame 3 … Frame N

B

Fra

me 1

Fra

me 2

P2P Live streaming

Live to watch a.wmv

Page 3: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

3

Challenges in streaming systems

High bit rates End-to-end delay Packet losses Network congestion Service guarantees Security

Page 4: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

4

Motivation

For P2P live media streaming, authors proposed a secure scheme using user authentication and key managements.

Page 5: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

5

Requirements

Confidentiality Data integrity Scalability Efficient

Page 6: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

6

User authenticationNotation AS Authorization serverPriKAS, PubKAS Private and corresponding public keys

from the ASn Total number of usersUi, Uj i-th and j-th usersPriKi , PubKi Private and corresponding public keys of Ui

CTi Certificate of Ui

Hm(x) Hm(x)=H(Hm-1(x)), m>1, H() is a one-way hash

Ts, Te certificate lifetimeRSi Private number for Ui only known by AS

Page 7: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

7

User authentication

Certificate generationNew user Ui AS

Generate PriKi , PubKi

Generate random value Ri, and calculate Hm(Ri) Login request

Verify Ui

Generate CTi

CTi={IDi|Ts|Te|T|IPi|PubKi| Hm(Ri)|Hm(RSi)|SigNi}

CTi

Page 8: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

8

User authentication

Certificate updateuser Ui AS

Between frames<Te+(t-1)T, Te+t T>,0<t<m

{IDi|t|Hm-t(Ri)}Check whetherH(Hm-t(Ri))=Hm-(t-1)(Ri)

{IDi|Hm-t(RSi)}

Page 9: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

9

User authentication Certificate verification (Uk verify Ui)

user Ui user Uk

CTiVerify CTi

CTi={IDi|Ts|Te|T|IPi|PubKi| Hm(Ri)|Hm(RSi)|SigNi}

{Mi|E(Mi)}Select random value Mi

Encrypt Mi by PriKi

Decrypt E(Mi )by PubKi

Get Mi’Check whether Mi’=Mi

Select random value Mk as symmetric secret key Encrypt Mk by PubKi

{E(Mk}Decrypt E(Mk )by PriKi

to get Mk

Page 10: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

Key management

Every user has a logic key tree

10

Key of secure channel

Logic key tree of j before i joins

Page 11: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

11

Key management User i joins to j

Logic key tree of j after i joins

1. j sends {Pubki(K8), K8(K’78), K’78(K’58), K’58(KEK’)} to i2. j sends other key materials to its old neighbors. e.g. j sends {K7(K’78), K’78(K’58), K’58(KEK’)} to U7

Page 12: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

12

Key management

User i leaves j

Logic key tree of j before i leaves Logic key tree of j after i leaves

When i leaves, j changes some of the key values and send to its neighbors

e.g. j sends {K4(K’34), K’34(K’14), K’14(KEK’)} to U4

Page 13: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

13

此篇 paper之優缺點 優點 :

延伸 authentication 及 key management應用在 P2P live streaming protocol

缺點 : Certificate verification無相互驗證

Page 14: 1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua

14

可能研究方向 Certificate verification相互驗證 加入付費機制