13-04-2012, 12:09 PM
Synopsis on Efficient & Secure Content Processing & Distribution by Cooperative Intermediaries
Efficient and Secure Content Processing and.doc (Size: 344 KB / Downloads: 30)
Efficient and Secure Content Processing and
Distribution by Cooperative Intermediaries
Abstract
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is an important problem and crucial for many Web applications. In this paper, we propose an approach that addresses data integrity and confidentiality in content adaptation and caching by intermediaries. Our approach permits multiple intermediaries to simultaneously perform content services on different portions of the data. Our protocol supports decentralized proxy and key management and flexible delegation of services. Our experimental results show that our approach is efficient and minimizes the amount of data transmitted across the network.
Introduction
With the emergence of various network appliances and heterogeneous client environments, there are other relevant new requirements for content services by intermediaries. For example, content may be transformed to satisfy the requirements of a client’s security policy, device capabilities, preferences, and so forth. Therefore, several content services have been identified that include but are not limited to content transcoding, in which data is transformed from one format into another, data filtering, and value-added services such as watermarking . Other relevant services are related to personalization, according to which special-purpose proxies can tailor the contents based on user preferences, current activities, and past access history. Many studies have been carried out on intermediary content services; however, the problem of data security in these settings has not caught much attention. Confidentiality and integrity are two main security properties that must be ensured for data in several distributed cooperative application domains such as collaborative e-commerce, distance learning, telemedicine, and e-government. Confidentiality means that data can only be accessed under the proper authorizations. Integrity means that data can only be modified by authorized subjects. The approaches developed for securely transferring data from a server to clients are not suitable when data is to be transformed by intermediaries. When a proxy mediates data transmission, if the data is enciphered during transmission, security is ensured; however, it is impossible for intermediaries to modify the data. On the other hand, when intermediaries are allowed to modify the data, it is difficult to enforce security.
Existing System
Previous work has been done on data adaptation and content delivery.
Proposed System
It combines peer-to-peer systems and Data Integrity Service Model to enforce the integrity of data transformed by intermediaries. In such a model, integrity is enforced by using metadata expressing modification policies specified by content owners. In this paper, we present a general and improved protocol to meet the high availability requirement for large-scale network services
Requirement Specification:
Software Requirements
• JDK
• Netbeans
• MS Access
Hardware Requirement
• RAM 512 MB
• Dual Core System
• Network Cables
Bibliography
• Java Complete Reference Java Network Programming, 3rd Edition O’Reilly Java Networking and AWT API superbible
• C. Aggarwal, J.L. Wolf, and P.S. Yu, “Caching on the World Wide Web,” IEEE Trans. Knowledge and Data Eng., vol. 11, no. 1, pp. 94-107, Jan. 1999.
• G. Berhe, L. Brunie, and J.M. Pierson, “Modeling Service-Based Multimedia Content Adaptation in Pervasive Computing,” Proc.First Conf. Computing Frontiers, Apr. 2004.
• L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “Web Caching and Zipf-Like Distributions: Evidence and Implications,”Proc. IEEE INFOCOM ’99, Mar. 1999.
S. Buchholz and A. Schill, “Adaptation-Aware Web Caching: Caching in the Future Pervasive Web,” Proc. 13th GI/ITG Conf.Kommunikation in Verteilten System (KiVS), 2003.
• V. Cardellini, P.S. Yu, and Y.W. Huang, “Collaborative Proxy System for Distributed Web Content Transcoding,” Proc. Ninth ACM Int’l Conf. Information and Knowledge Management (CIKM ’00),Nov. 2000.