Abstract
With the explosive growth of multimedia data, Enterprise Multimedia Security (EMS) is a serious matter to maintain enterprise information security. As the rise of social media applications triggers higher bandwidth demand and shorter end-to-end delay requirements, edge computing has emerged as a promising technique to reduce delay. Edge servers are often deployed around mobile devices via a one-hop wireless network connection. However, migrating multimedia data over wireless networks to edge servers for edge computing is vulnerable to eavesdroppers. Ensuring the security of enterprise multimedia data in the edge computing is a top priority. To cater for the data security over wireless transmisson for edge computing, window-based fountain codes, is treated as a feasible technology to compensate this gap. Based on the characteristics of the fountain codes, data security over wireless transmisson is implemented only when the target receiver accumulates enough coding packets in advance of the eavesdropper. In the general wireless transmission, the eavesdropper receives data packets or not depends on whether the wireless channel lose packets. To ensure data security, we introduce the constellation-rotation technique and interfering noise into wireless signal which can disturb the eavesdropper’s signal quality and increase the packet loss in the eavesdropper. Specifically, we study how to partition the video streaming into windows, which takes the end-to-end delay into consideration while guaranteeing lower intercept probability which indicates the probability video data is leaked to the eavesdropper.
Similar content being viewed by others
References
Ahmad S, Hamzaoui R, Al-Akaidi MM (2011) Unequal error protection using fountain codes with applications to video communication. IEEE Trans Multimed 13 (1):92–101
Bogino MC, Cataldi P, Grangetto M, Magli E, Olmo G (2007) Sliding-window digital fountain codes for streaming of multimedia contents. In: 2007 IEEE International symposium on circuits and systems, pp 3467–3470
Bohli JM, Hessler A, Ugus O, Westhoff D (2009) Security enhanced multi-hop over the air reprogramming with fountain codes. In: 2009 IEEE 34th Conference on local computer networks, pp 850–857
Byers JW, Luby M, Mitzenmacher M (2002) A digital fountain approach to asynchronous reliable multicast. IEEE J Selected Areas Commun 20(8):1528–1540
Cataldi P, Grangetto M, Tillo T, Magli E, Olmo G (2010) Sliding-window raptor codes for efficient scalable wireless video broadcasting with unequal loss protection. IEEE Trans Image Process 19(6):1491–1503
Chen S, Pande A, Zeng K, Mohapatra P (2015) Live video forensics: source identification in lossy wireless networks. IEEE Trans Inform Forens Secur 10(1):28–39
Diao Z (2017) Cloud-based support for massively multiplayer online role-playing games. Ph.D. thesis, University of Magdeburg, Germany. http://nbn-resolving.de/urn:nbn:de:gbv:ma9:1-9429
Dong B, Chen Z, Wang HW, Tang LA, Zhang K, Lin Y, Li Z, Chen H (2017) Efficient discovery of abnormal event sequences in enterprise security systems. In: Proceedings of the 2017 ACM on conference on information and knowledge management, CIKM ’17. https://doi.org/http://doi.acm.org/10.1145/3132847.3132854. ACM, New York, pp 707–715, DOI https://doi.org/10.1145/3132847.3132854, (to appear in print)
Du Q, Li W, Song H (2017) Security enhancement via dynamic fountain code for wireless multicast. In: International conference on wireless algorithms, systems, and applications, pp 509–521
Du Q, Xu Y, Li W, Song H (2018) Security enhancement for multicast over internet of things by dynamically constructed fountain codes. Wirel Commun Mob Comput 2018:1–11
Gong W, Qi L, Xu Y (2018) Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel Commun Mob Comput 2018:1–8
Hallman RA, Li S, Chang V (2018) 2nd international workshop on multimedia privacy and security. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security - CCS ’18, pp 2173–2174
Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2017) Cloud-assisted secure video transmission and sharing framework for smart cities. Futur Gener Comput Syst 83:596–606
Huang W, Xia Y, Ding L, Xu Y, Yang F, He D, Zhang W (2015) Hierarchical qoe model for wireless video streaming with fountain codes. In: 2015 IEEE international symposium on broadband multimedia systems and broadcasting, pp 1–6
Huang T, Yi B, Yao W, Li W (2017) Unequal error protection scheme for image transmission based on regularized variable-node and expanding window fountain codes. Multimed Tools Appl 76(11):13,383–13,400
Lee WC (1982) Mobile communications engineering. McGraw-Hill Professional
Li W, Du Q, Sun L, Ren P, Wang Y (2016) Security enhanced via dynamic fountain code design for wireless delivery. In: 2016 IEEE Wireless communications and networking conference, pp 1–6
Li T, Song T, Liang Y (2018) Wireless communications under hostile jamming: security and efficiency. Springer, Singapore
Liva G, Paolini E, Chiani M (2010) Performance versus overhead for fountain codes over f q. IEEE Commun Lett 14(2):178–180
López PG, Montresor A, Epema DHJ, Datta A, Higashino T, Iamnitchi A, Barcellos MP, Felber P, Rivierè E (2015) Edge-centric computing: vision and challenges. ACM Special Interest Group on Data Communication 45(5):37–42
Luby M (2002) Lt codes. In: The 43rd Annual IEEE symposium on foundations of computer science, 2002. Proceedings, p 271
Massey JL (1988) An introduction to contemporary cryptology. Proc IEEE 76 (5):533–549
Niu H, Iwai M, Sezaki K, Sun L, Du Q (2014) Exploiting fountain codes for secure wireless delivery. IEEE Commun Lett 18(5):777–780
Qi L, Dou W, Wang W, Li G, Yu H, Wan S (2018) Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6:46,926–46,937
Qi L, Zhang X, Dou W, Hu C, Yang C, Chen J (2018) A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Futur Gener Comput Syst 88:636–643
Seba A, Nouali-Taboudjemat N, Badache N, Seba H (2019) A review on security challenges of wireless communications in disaster emergency response and crisis management situations. J Netw Comput Appl 126:150–161
Sejdinovic D, Vukobratovic D, Doufexi A, Senk V, Piechocki RJ (2009) Expanding window fountain codes for unequal error protection. IEEE Trans Commun 57(9):2510–2516
Shokrollahi A (2006) Raptor codes. IEEE Trans Inform Theory 14(6):2551–2567
Sorokin R, Rougier JL (2018) Video conference in the fog: an economical approach based on enterprise desktop grid. Annales Des munications 73:305–316
Stecklina O, Kornemann S, Grehl F, Jung R, Kranz T, Leander G, Schweer D, Mollus K, Westhoff D (2015) Custom-fit security for efficient and pollution-resistant multicast ota-programming with fountain codes. In: 2015 15th international conference on innovations for community services (I4CS), pp 1–8
Sun K, Wu D (2016) Mpc-based delay-aware fountain codes for live video streaming. In: 2016 IEEE international conference on communications (ICC), pp 1–6
Sun K, Zhang H, Wu D (2016) Delay-aware fountain codes for video streaming with optimal sampling strategy. arXiv:https://arxiv.org/abs/1605.03236
Sun L, Ren P, Du Q, Wang Y (2016) Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans Indust Inform 12(1):291–300
Sun K, Zhang H, Wu DO, Zhuang H (2018) Mpc-based delay-aware fountain codes for real-time video communication. IEEE Internet Things J 5(1):415–424
Vukobratovic D, Stankovic V, Sejdinovic D, Stankovic L, Xiong Z (2009) Scalable video multicast using expanding window fountain codes. IEEE Trans Multimed 11(6):1094–1104
Wagner J, Chakareski J, Frossard P (2006) Streaming of scalable video from multiple servers using rateless codes. In: 2006 IEEE international conference on multimedia and expo, pp 1501–1504
Wang X, Chen W, Cao Z (2011) Sparc: superposition-aided rateless coding in wireless relay systems. IEEE Trans Veh Technol 60(9):4427–4438. https://doi.org/10.1109/TVT.2011.2171773
Xu X, Fu S, Qi L, Zhang X, Liu Q, He Q, Li S (2018) An iot-oriented data placement method with privacy preservation in cloud environment. J Netw Comput Appl 124:148–157
Xu X, Li Y, Huang T, Xue Y, Peng K, Qi L, Dou W (2019) An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J Netw Comput Appl 133:75–85
Xu X, Liu Q, Luo Y, Peng K, Zhang X, Meng S, Qi L (2019) A computation offloading method over big data for iot-enabled cloud-edge computing. Futur Gener Comput Syst 95:522–533
Xu X, Xue Y, Qi L, Yuan Y, Zhang X, Umer T, Wan S (2019) An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Futur Gener Comput Syst 96:89–100
Yu H, Wang Y, Liu Y (2016) Cooperative video coding scheme with fountain code on the concentration on data size. In: 2016 IEEE international conference on network infrastructure and digital content (IC-NIDC), pp 337–341
Zhang X, Du Q (2006) Adaptive low-complexity erasure-correcting code-based protocols for qos-driven mobile multicast services over wireless networks. IEEE Trans Veh Technol 55(5):1633–1647. https://doi.org/10.1109/TVT.2006.874547
Acknowledgements
This research is supported by the National Key Research and Development Program of China (no. 2017YFB1001801), the National Science Foundation of China under Grant no. 61672276, and the Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing University.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Nie, H., Jiang, X., Tang, W. et al. Data security over wireless transmission for enterprise multimedia security with fountain codes. Multimed Tools Appl 79, 10781–10803 (2020). https://doi.org/10.1007/s11042-019-08479-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08479-z