Cloud Video Server (CVS): Secure Video Storage on Cloud using Heterogeneous Slaves

D. Kesavaraja*, A.Shenbagavalli**
* Assistant Professor, Department of Computer Science and Engineering, Dr.SivanthiAditanar College of Engineering, Tiruchendur, India.
** Professor & Head, Department of Electronics and Communication Engineering, National Engineering College, Kovilpatti, India.
Periodicity:November - January'2015
DOI : https://doi.org/10.26634/jcc.2.1.3304

Abstract

In today's fast growing world, everyone needs a secure storage for their important information like personal videos. So the service provider needs an excellent cloud video server with high security. But hackers easily hack any kind of security mechanism. In this paper , the novel tolerant security mechanism is proposed. A server stores all new information in its storage. The Cloud Video Server is acting as a controller of all the slaves. This system has two protocols named Promise Protocol and Review Protocol for monitoring slaves activity. This scheme uses two standard algorithms namely SHA3 (Secure Hash Algorithm -3 ) and Advanced Encryption Standard (AES) for security test. The performance is verified with the help of the metrics like security level, time complexity ,and Quality of Storage. The performance of this system is superior than the other schemes.

Keywords

Video Storage, Hashing, Encryption, Cloud Computing, Heterogeneous Environment, Tolerance Video Service

How to Cite this Article?

Kesavaraja, D., and Shenbagavalli, A. (2015). Cloud Video Server (CVS): Secure Video Storage on Cloud using Heterogeneous Slaves. i-manager’s Journal on Cloud Computing, 2(1), 32-41. https://doi.org/10.26634/jcc.2.1.3304

References

[1]. D.Kesavaraja, R.Balasubramanian and D.Sasireka, (2010). “Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business”, International Journal of Database Management Systems ( IJDMS ), Vol. 2, No. 2, pp. 44-55.
[2]. Saidane, Ayda; Nicomette, V.; Deswarte, Y.,(2009). “The Design of a Generic Intrusion-Tolerant Architecture for Web Servers,” IEEE Transactions on Dependable and Secure Computing, Vol.6, No.1, pp.45-58.
[3]. Wen-HsingKuo; Wanjiun Liao; Tehuang Liu,(2011). “Adaptive Resource Allocation for Layer-Encoded IPTV Multicasting in IEEE 802.16 WiMAX Wireless Networks,” IEEE Transactions on Multimedia, Vol.13, No.1, pp.116 -124.
[4]. J.-R. Ohm (1998).“Description of core experiments in MPEG-4 video,” ISO/IEC JTCI/SC29/WG11, N2554.
[5]. (2006). Mean Opinion Score (MOS) Terminology, 2006/07, ITU-T Rec. P.800.1.
[6]. Z. Wu and J. M. Boyce, (2007). “Adaptive error resilient video coding based on redundant slices of H.264/AVC,” in Proc. IEEE ICME, pp. 2138–2141.
[7]. P. Baccichet, S. Rane, A. Chimienti, and B. Girod, (2007). “Robust lowdelay video transmission using H.264/AVC redundant slices and flexible macroblock ordering,” in Proc. IEEE ICIP, Vol. 4, pp. 93–96.
[8]. Tillo, T.; Grangetto, M.; Olmo, G.,(2008). “Redundant Slice Optimal Allocation for H.264 Multiple DescriptionCoding,’ ,IEEE Transactions on Circuits and Systems for Video Technology, Vol.18, No.1, pp.59-70.
[9]. Kishore Ramachandran, LiviuIftode and Ajay Mohindra, “VaaS: Video as a Service on the Cloud” [Online]. Available: http://nsfcloud2011.cs.ucsb.edu /papers/Ramachandran_Paper.pdf.
[10]. [Online]. Available: http://www.csc.com/ managed_network_services/offerings/44522/51853- video_as_a_service_vaas.
[11]. [Online]. Available: http://www.mistralsolutions.com /hs-downloads/tech-briefs/dec09-article-3.html.
[12]. [Online]. Available: http://en.wikipedia.org /wiki/MVaaS.
[13]. [Online]. Available: http://en.wikipedia.org /wiki/Comparison_of_video_hosting_services.
[14]. Guurler, C.G.; Goorkemli, B.; Saygili, G.; Tekalp, A.M.,(2011). ”Flexible Transport of 3-D Video Over Networks,” Proceedings of the IEEE, Vol.99, No.4, pp. 694- 707.
[15]. Ellen Messmer (2010). ”Security of virtualization, cloud computing divides IT and security pros”, Network World, [Online]. Available:http://www.networkworld.com/article/2244954/virtualization/secu rity-of-virtualization-- cloud-computing-divides-it-and-security-pros.html.
[16]. (2014). ”SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions", DRAFT FIPS PUB 202 ,federal Information Processing Standards Publication ,[Online]. Available: http://csrc.nist.gov/ publications/drafts/fips-202/fips_202_draft.pdf.
[17]. (2012).”Tentative Timeline of the Development of New Hash Functions”, National Institute of Standards and Technology (NIST), Information Technology Laboratory [Online]. Available: http://csrc.nist.gov/ groups/ST/hash/timeline.html"NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition". NIST.
[18]. Guido Bertoni, Joan Daemen, Michael Peeters and Gilles Van Assche, (2011). “The Keccak sponge function family:Specifications summary “ Ref:http:// keccak.noekeon.org/specs_summary.html .
[19]. (2015). “Cryptographic hash function“, [Online]. Available:http://en.wikipedia.orgwiki/Cryptographic _hash_function.
[20]. Guido Bertoni, Joan Daemen,MichaelPeeters and Gilles Van Assche, (2007). “Sponge Functions”, ECRYPT Hash Workshop, [Online].
[21]. Guido Bertoni, Joan Daemen, Michael Peeters and Gilles Van Assche,(2008). “On the Indifferentiability of the Sponge Construction”, EuroCrypt.
[22]. “Keccak implementation overview Version 3.2” [Online]. Available:http://keccak.noekeon.org/Keccakimplementation- 3.2.pdf
[23]. Guo, Xu; Huang, Sinan; Nazhandali,Leyla; Schaumont, Patrick, (2010). “Fair and Comprehensive Performance Evaluation of 14 Second Round SHA-3 ASIC Implementations”, NIST 2nd SHA-3.
[24]. (2001). TREC Video Retrieval Test Collection [Online].Available:http://www.open-video.org/collection_detail. php?cid=7.
[25]. Kesavaraja, D.; Shenbagavalli, A.,(2013). “Cloud video as a Service [VaaS] with storage, streaming, security and Quality of service: Approaches and directions”, International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp.1093-1098.
[26]. Online]. Available:http://en.wikipedia.org /wiki/Precision_and_recall.
[27]. Powers, David M. W (2011). “Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness& Correlation”, Journal of Machine Learning Technologies, pp. 37–63.
[28]. Perruchet, P.; Peereman, R. (2004).“The exploitation of distributional information in syllable processing”. J. Neurolinguistics, pp. 97–119.
[29]. Fawcett, Tom (2006). “An Introduction to ROC Analysis”, Pattern Recognition Letters, pp. 861 – 874.
[30]. Olson, David L.; and Delen, Dursun (2008). Advanced Data Mining Techniques, Springer, 1st edition (February 1, 2008), pp.138.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.