Mapblogs -An Efficient Multimedia Transmitter using Parallel Computing Technique with Server & Client Communication on Real-Time Operations

DOI : 10.17577/IJERTCONV3IS27001

Download Full-Text PDF Cite this Publication

Text Only Version

Mapblogs -An Efficient Multimedia Transmitter using Parallel Computing Technique with Server & Client Communication on Real-Time Operations

Suhas Acharya M.Tech 2nd Semester Department Of CSE

City Engineering College

Vivek B Associate professor Department Of CSE

City Engineering College

AbstractMapblogs is an efficient method to delivermultimedia content from a sender to a group of receivers and is gaining popular applications such as real-time stock quotes, interactive games, video conference, live video broadcast, or video on demand. Authentication is one of the critical topics in securing Mapblogs in an environment attractive to malicious attacks.

Basically, Map blogs authentication may provide the following security services:

Data integrity: Each receiver should be able to assure that received packets have not been modified during transmissions.

Data origin authentication: Each receiver should be able to assure that each received packet comes from the real sender as it claims.

Non-repudiation: The sender of a packet should not be able to deny sending the packet to receivers in case there is a dispute between the sender and receivers. All the three services can be supported by an asymmetric key technique called signature. In an ideal case, the sender generates a signature for each packet with its private key, which is called signing, and each receiver checks the validity of the signature with the senders public key, which is called verifying. If the verification succeeds, the receiver knows the packet is authentic.

LIVE Blogging System: There will a communication between clients using parallel computing were the queries of other clients can be posted and can be replied by group of clients within the network.

Keywords – Component: Mapblogs, Multimedia, Broadcast

I. INTRODUCTION

Map bogs is an efficient method to deliver multimedia content from a sender to a group of receivers and is gaining popular applications such as real time stock quotes, interactive games, video conference, live video broadcast, or video on demand. Authentication is one of the critical topics in securing Map bogs in an environment attractive to malicious attacks.

Map bogs authentication may provide three security services such as data integrity, data origin authentication, Non repudiation. The sender generates a signature for each packet with its private key, which is called signing, and each receiver checks the validity of the signature with the senders public key, which is called verifying. If the verification succeeds, the receiver knows the packet is authentication

.There are following issues in real world challenging the design.

. First, efficiency needs to be considered, especially for receivers. Compared with the Map bogs sender, which could be a powerful server, receivers can have different capabilities and resources. Second, packet loss is inevitable.

In the Internet, Constant service interruptions may be caused due to packet losses congestion at routers is a major reason causing packet loss. For messages sent through a non-secure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures are equivalent to traditional handwritten signatures in many respects; properly implemented digital signatures are more difficult to forge than the handwritten type.

Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective. Digital signatures can also provide non- repudiation meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid. Efficiency and packet loss resilience can hardly be supported simultaneously by conventional Map bogs schemes.

    1. Advantages and Limitations

      1. Advantages

        The advantages of using digital signatures include:

        • Imposter prevention: By using digital signatures you are eliminating the possibility of committing fraud by an imposter signing the document. Since the digital signature cannot be altered. Digital signature serves the purpose of authenticity in the communication network. Using digital signature frauds can be prevented and security issues can be resolved.

          Message integrity:By having a digital signature you are infact proving the document to be valid. You are assuring the recipient that the document is free from Forgery or false information.

          Legal requirements:Using a digital signature satisfies sometype of legal requirement for the document in question. A digital signature takes care of any formal legal aspect of executing the document.

          WWW is called the World Wide Web. WWW supports many kinds of text, pictures, video and audio. WWW resources through a web browser which basically a program that runs on the internet.

          There are two kinds of browsers 1) text only browsers and 2) graphical browsers. Graphical browsers like Netscape Navigator and Internet Explorer are popular. These browsers provide you Inline images, fonts & document layouts. When you access a WWW server, the document is transferred to your computer and then the connection is terminated.

          The World Wide Web is a network of information, accessible via an easy-to-use interface. The information is often presented in hypertext or multimedia and provided by servers located around the world. The usability of the Web depends largely on the performance of these servers.

          This application is a Java client/server combination, which can be used to chat over the Internet or local networks

          With these features and with the advent of WWW, Web browsers and with BLOGGING, Internet has become the media of applications.

          We can use Blogging System for following activities:

          • To exchange information and converse with friends and family.

          • To participate in group discussions through public news bulletin board.

          • For Entertainment.

          • Leisure activities.

          • Access business while at home.

          • Communicate and collaborate through pictures and images.

          • At any given point of time, up-to-date information is provided.

      2. Limitations

        Cost: Digital signatures, even some of the simpler ones, comeat a cost. You must have the necessary software to encode the signatures, and if you're using hardware so that customers can sign physically, then the cost goes up even further. Digital signatures are an additional cost that should be weighed against their potential security benefits.

        Training and Troubleshooting: If your employees aren't tech savvyor simply aren't sure how to use a digital signature, then you will have to spend time training them about how the signature process works. This will take them away from their jobs, costing you money. Additionally, as with all computer- related applications, sooner or later there will be a hiccough in the system and you will need someone to troubleshoot. If none of your employees can find and fix the problem, you will have to hire someone else to do it.

        The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environment.

    2. Application Areas

Multimedia: It comes in many different formats. It can bealmost anything you can hear or see like text, pictures, music, sound, videos, records, films, animations, and more. Multimedia elements also have their own file formats with different extensions like mp3, and mp4. Multimedia is usually recorded and played, displayed or accessed by information content processing devices. Multimedia authentication dealswith confirming the genuineness or truth of the structure and/or content of multimedia.

Multimedia signal can be easily reproduced and manipulated. Although we cannot perceive the change, what we are seeing or listening to may have been changed maliciously for whatever reasons. Multimedia authentication is to confirm the genuineness or truth of the structure and/or content of multimedia. The first approach to multimedia authentication is cryptograph; while the second approach is the digital watermarking. In addition, cryptograph can be integrated into digital watermarking to provide more desirable authentication. It is worth mentioning that multimedia authentication is different from user authentication.

Video Conferencing: It is the conduct of a videoconference bya set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way video and audio transmissions. It has also been called 'visual collaboration' and is a type of groupware.

Videoconferencing differs from videophone calls in that it's designed to serve a conference or multiple locations rather than individuals. It is now possible to share your organizations valuable and sensitive information with more people than ever before. The Internet is a forum for public information exchange. Extranets provide suppliers and customers access to data that enhances their productivity. Remote workers have come to expect the same level of

resources as if they were in the office. Innovations such as TANDBERGs firewall traversal solution are making it possible to communicate across boundaries.

But, with open communication comes risk. Network administrators cite security as one of their highest concerns in managing communication tools. Financial institutions are constantly sharing information that must be restricted. The health care industry is overwhelmingly concerned with patient confidentiality. The fact is that any organization needs to protect its information as well as its resources. TANDBERG is a pioneer in developing solutions to resolve security concerns. By addressing the issue of security at three levels authentication, policy and encryption.

Basic Scheme

The goal is to authenticate Mapblogs streams from a sender to multiple receivers. Generally, the sender is a powerful Mapblogs server managed by a central authority and can be trustful. The sender signs each packet with a signature and transmits it to multiple receivers through a Mapblogs routing protocol. Each receiver needs to assure that the received packets are really from the sender (authenticity) and the sender cannot deny the signing operation by verifying the corresponding signatures. Ideally, authenticating a Mapblogs stream can be achieved by signing and verifying each packet. However, the per-packet signature design has been criticized for its high computation cost, and therefore, most previous schemes incorporate a block-based design. They do reduce the computation cost, but also introduce new problems. The block design builds up correlation among packets and makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Received packets may not be authenticated because some correlated packets are lost. Also, the heterogeneity of receivers means that the buffer resource at each receiver is different and can vary over the time depending on the overall load at the receiver. In the block design, the required block size, which is chosen by the sender, may not be satisfied by each receiver.

Enhanced Scheme

An enhanced scheme called MAPBLOGS-E combines the basic scheme MAPBLOGS-B and a packet filtering mechanism to tolerate packet injection. In particular, the sender attaches each packet with a mark, which is unique to the packet and cannot be spoofed. At each receiver, the Mapblogs stream is classified into disjoint sets based on marks. Each set of packets comes from either the real sender or the attacker.

The mark design ensures that a packet from the real sender never falls into any set of packets from the attacker, and vice versa. Next, each receiver only needs to perform

BatchVerify() over each set. If the result is True, the set of packets is authentic. If not, the set of packets is from the attacker, and the receiver simply drops them and does not need to divide the set into smaller subsets for further batch verification. Therefore, a strong resilience to DoS due to injected packets can be provided.

      1. Existing System

        • Efficiency and packet loss resilience can hardly be supported simultaneously by conventional Mapblogs schemes.

As is well known that existing digital signature algorithms are computationally expensive, the ideal approach of signing and verifying each packet independently raises a serious challenge to resource- constrained devices.

They are suitable for RSA which is expensive on signing while cheap on verifying. For each packet, however, each receiver needs to perform one more verification on its one-time or k-time signature plus one ordinary signature verification. Moreover, the length of one-time signature is too long (on the order of 1,000 bytes).

Existing block-based Mapblogs authentication schemes overlook the heterogeneity of receivers by letting the sender-

  • To choose the block size

  • To divide a Mapblogs stream into blocks

  • Associate each block with a signature and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms.

There are some problems in existing digital signature algorithms. They are computationally expensive. There is also possibility of packet loss, packet forgery by attackers leading to Denial of Service. The approach of signing and verifying each block independently raises a serious challenge to esource-constrained devices. Compared with the efficiency requirement and packet loss problems, the DoS attack is not common, but it is still important in hostile environments.

1.5 Summary

This chapter provides a basic introduction to the MAPBLOGS. In MAPBLOGS by giving the batch signature

to each packet separately we can ensure that the packets are successively received at the receiver end without any disturbance in the transmission medium. We can summerize that Mapblogs is an effective way to deliver a multimedia message from a sender to a group of receivers. Some of the security services such as integrity, authentication and non- repudiation are provided by the MAPBLOGS. We can justify it from the point that in the existing system we faced problems like we cant achieve efficency and resilence simultaneously which is overcomed in Mapblogs stream by assigning and verifying each packet by giving them signature independently.

CHAPTER 2

Literature Survey

Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next step is to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration r taken into account for developing the proposed system.

    1. Mapblogs Routing in Internetworks and Extended LANs

      Mapblgs Routing, propose an efficient mechanism of sender access control for bi-directional Mapblogs trees in the IP Mapblogs service model. Each on-tree router maintains dynamically the access policy for its downstream senders. With this scheme, data packets from unauthorized hosts are discarded once they hit any on-tree router. As such, group members do not receive irrelevant data, and network service availability is guaranteed since the Mapblogs tree is protected from denial-of-service attacks such as data flooding from malicious hosts. In order to achieve scalability for large-scale Mapblogs applications with many information sources and in order to accommodate more concurrent Mapblogs sessions, we also extend our control mechanism to inter-domain routing where a hierarchical access policy is maintained on the bi-directional tree.

    2. Security Issue and Solution in Mapblogs Content Distribution

      In Security Issues and Solutions in Mapblogs Content Distribution, A Survey we outline the various security and protection issues in Mapblogs content distribution. We focus on four areas of work, explain the issues and vulnerabilities that exist, and discuss the research that has been done to provide solutions. Security in Mapblogs content distribution has matured over the years, but there remain open problems in the area that must be resolved to help Mapblogs enable more applications.

    3. Batch Based Broadcast Authentication

      Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to

      broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes.

      To prevent adversaries from injecting bogus messages, authentication is required for broadcast in wireless sensor network. muTESLA is a light-weight broadcast authentication protocol, which uses a one-way hash chain and the delayed disclosure of keys to provide the authentication service. However, it suffers from several drawbacks in terms of time synchronization, limited broadcast rounds, key chain management at the source node. Therefore, a novel protocol is proposed called Batch-based Broadcast Authentication for wireless sensor networks. Batch-based broadcast Authentication doesnot require time synchronization, eliminates the requirement of key chain and supports broadcast for infinite rounds.

    4. Mapblogs Server Authentication Based (Batch Signature)

      We can justify our project statement by proposing new techniques for signing digital streams which deals with the problem of continuous authentication and signature of streams. An important requirement of our scheme, signature scheme is that the receiver can continuously verify the signature of packets. Clearly, the receiver can only verify the signature once it can trace the authentication links to a signature packet. Hence, the verification delay depends on the frequency and the transmission reliability of signature packets. The signature packet rate depends on the available computation and communication resources.

      Mapblogs is an efficient method to deliver multimedia content from a sender to a group of receivers and is gaining popular applications such as real-time stock quotes, interactive games, video conference, live video broadcast, or video on demand. Authentication is one of the critical topics in securing Mapblogs in an environment attractive to malicious attacks. Conventional block-based Mapblogs authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a Mapblogs stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environments.

    5. Summary

      The development of software is done by the important step Literature survey. The considerations taken into account for developing the proposed system are:

      Firstly, Mapblogs Routing in Internetworks and Extended LANs : here the data packets from unauthorized hosts are discarded once they hit any on-tree router. Secondly, Security

      issues in Mapblogs content distribution: here we explain the issues and vulnerability that exists. Thirdly, Broadcast Authentication :It enables users to broadcast the wireless sensor networks in an authenticated way. Final, Mapblogs authentication based on batch signature: The problems of continous authentication and signature of streams can be proposed for signing digital streams, Mapblogs is an efficient method to deliever multimedia content from a sender to a group of receivers.

      CHAPTER 3

      1. System Requirement Specification

        3.1 Feasibility study

        The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential.

        Three key considerations involved in the feasibility analysis are

        • Economical feasibility

        • Technical feasibility

        • Social feasibility

          3.1.1 Economical feasibility

          This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased.

          1) 3.1.2 Technical feasibility

          This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system.

          3.1.3 Social feasibility

          The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of

          confidence must be raised so that he is also able to make some constructive criticism, which is welcomed, as he is the final user of the system.

          3.2 Software Requirements

          Software Requirements Specification (SRS) is an important part of software development process. SRS includes overall description, functional requirements, supportability, performance requirement, design constraints etc. for any application. This content is very much useful in fulfilling the goals while implementing software project.

          A software requirements specification is a document which is used as a communication medium between the customer and the supplier. The complete description of the functions to be performed by the software specified in the SRS will assist the potential users to determine if the software specified meets their needs or how the software must be modified to meet their needs. Requirements must be measurable, testable, related to identified needs or opportunities, and defined to a level of detail sufficient for system design. This section of the SRS should contain all the software requirements to a level of detail sufficient to enable designers to design a system to satisfy those requirements, and testers to test that the system satisfies those requirements. With the help of software requirements we come to know the feasibility and the quality of software. To properly satisfy the basic goals, an SRS should have certain properties and should contain different types of requirements and below stated are some of the important requirements involved in developing software. System requirements should simply describe the external behavior of the system and its operational constraints.

        • Operating system : – Windows XP Professional.

        • Coding Language : – Java.

        • Tool Used : – NetBeans IDE.

      2. CONCLUSION

To reduce the signature verification overheads in the secure multimedia Mapblogsing, block-based authentication schemes have been proposed. Unfortunately, most previous schemes have many problems such as vulnerability to packet loss and lack of resilience to denial of service (DoS) attack. To overcome these problems, we develop a novel authentication scheme MAPBLOGS. We have demonstrated that MAPBLOGS is perfectly resilient to packet loss due to the elimination of the correlation among packets and can effectively deal with DoS attack. Moreover, we also show that the use of batch signature can achieve the efficiency less than or comparable with the conventional schemes. Finally, we further develop two new batch signature schemes based on BLS and DSA, which are more efficient than the batch RSA signature scheme.

Even though this application has been developed with the users own Protocols, this can be used in an Intranet based organization.

  1. This system was developed so that people can exchange information as well as converse with each other.

  2. Through this system people can access Blogging rooms globally.

  3. The system is interactive and friendly.

  4. Entire system is fully automatic to the clients and satisfies the clients request

  5. Especially the system is more useful to the technical people when the need for sending pictures, images it is solved through WHITE BOARD UTILITY OF Canvas.

FUTURE ENHANCEMENTS

This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods efficiently identify non-trivial numbers of invalid signatures in batches of (potentially large) numbers of signatures. Our methods use divide-and-conquer search to identify the invalid signatures within a batch, but prune the search tree to substantially reduce the number of pairing computations required. The methods presented in this paper require computing on average O(W) products of pairings to identify w invalid signatures within a batch of size N,

compared with the O(w (log2(N/w)+1)) [for w<N/2] that traditional divide-and-conquer methods require. Our methods avoid the problem of exponential growth in expected computational cost that affect earlier proposals which, on average, require computing O(w) products of pairings.

We compare the expected performance of our batch verification methods with previously published divide-and- conquer and exponential cost methods for Cha-Cheon identity-based signatures. However, our methods also apply to a number of short signature schemes and as well as to other identity-based signature schemes.

This project can be enhanced by implementing different protocols and can be made more useful for varied clients according to the requirements of the client, it can also possible in future that each client in this globe has his own customized Blogging.

  1. It can be enhanced in the field of voice chatting. Using VoIP protocol

  2. It can be enhanced in the field of Video Conferencing.

REFERENCES

  1. S.E. Deering, Multicast Routing in Internetworks and Extended LANs, Proc. ACM SIGCOMM Symp. Comm. Architectures and Protocols, pp. 55-64, Aug. 1988.

  2. T. Ballardie and J. Crowcroft, Multicast-Specific Security Threats and Counter-Measures, Proc. Second Ann. Network and Distributed System Security Symp. (NDSS 95), pp. 2-16, Feb. 1995.

  3. P. Judge and M. Ammar, Security Issues and Solutions in Mulicast Content Distribution: A Survey, IEEE Network Magazine, vol. 17, no. 1, pp. 30-36, Jan./Feb. 2003.

  4. Y. Challal, H. Bettahar, and A. Bouabdallah, A Taxonomy of Multicast Data Origin Authentication: Issues and Solutions, IEEE Comm. Surveys & Tutorials, vol. 6, no. 3, pp. 34-57, Oct. 2004.

  5. Y. Zhou and Y. Fang, BABRA: Batch-Based Broadcast Authentication in Wireless Sensor Networks, Proc. IEEE GLOBECOM, Nov. 2006.

  6. Y. Zhou and Y. Fang, Multimedia Broadcast Authentication Based on Batch Signature, IEEE Comm. Magazine, vol. 45, no. 8, pp. 72-77, Aug. 2007.

Leave a Reply