TITLE

A Method for Applying a Server/Client API Module in a D-DRM System Using ICN-OPENSSL

AUTHOR(S)
Jong Won Yang; Joon Woo; Chang-Ho Seo
PUB. DATE
March 2012
SOURCE
International Journal of Digital Content Technology & its Applic;Mar2012, Vol. 6 Issue 4, p42
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In this study, we proposed a system architecture in which contents are distributed and stored in each local network caching server by building a CDN system in contents distribution networks. Also, this study designed the DRM server and the D-DRM module in order to safely perform the contents request of users. In addition, this study performed a lightening process for the existing OPENSSL for supporting safe data transmission between distributed DRM modules. Also, this study designed an optimized ICN-OPENSSL module by replacing the existing OPENSSL with the encryption algorithm designed in this study. Finally, it can be used by using not only the ICN_SSL Server/Client API module implemented in this study but also the D-DRM module or other different system modules. In addition, the ICN_SSL API presents the log file related to its operation and error generation in order that module users obtain the implementation results.
ACCESSION #
76361781

 

Related Articles

  • Grid based Approach for Data Confidentiality. Malempati, Sreelatha; Mogalla, Shashi // International Journal of Computer Applications;Jul2011, Vol. 25, p1 

    Network security measures are required to protect data during their transmission. Sensitive information transmitted across a network requires confidentiality. Data confidentiality is the protection of transmitted data from passive attacks. Passive attacks are eaves dropping or monitoring the...

  • Analysis of Multiple Keys for Variable Data Length in Multinode Network for Encryption. Kakkar, Ajay; Singh, M. L.; Bansal, P. K. // International Journal of Engineering Science & Technology;2011, Vol. 3 Issue 6, p5237 

    Data security of the model depends upon the combination of keys. The processing speed, latency, S-Boxes, accuracy and key length have been used to determine the strength of the model. The paper deals with the above mentioned parameters for wireless model having multiple nodes. The results have...

  • If it had teeth, it might bite someone. Bradner, Scott // Network World;3/29/2004, Vol. 21 Issue 13, p28 

    The National Cyber Security Partnership (NCSP) has released the first two of five planned reports concerning various aspects of cyber security. The partnership is an outgrowth of the December 2003 National Cyber Security Summit convened in response to last year's National Strategy to Secure...

  • End-to-End Encryption.  // Network Dictionary;2007, p177 

    A definition of the term "End-to-End Encryption" is presented. It refers to a complete protection of data transmitted between two points in a network. The data that leaves its source remain encrypted while it passes through any intermediate computers, such as routers, and decrypting only when...

  • WITNESS BASED AND VOTING BASED DATA FUSION ASSURANCE MECHANISM IN SENSOR NETWORKS. Umashankar, M.; Chandrasekar, C. // International Journal of Research & Reviews in Applied Sciences;2010, Vol. 4 Issue 2, p194 

    Security is a very important issue when designing or deploying any network or protocol. The nature of large, ad-hoc, wireless sensor networks presents significant challenges in designing security schemes. One or several sensors then collect the detection results from other sensors. The collected...

  • Analysis of cipher text size produced by various Encryption Algorithms. ARORA, MANI; ENGELES, DERICK // International Journal of Engineering Science & Technology;2011, Vol. 3 Issue 7, p5459 

    In the digital world, it is the need of the hour to secure the data communication from unauthorized access. Over the time a number of techniques and algorithms have came into operation for its security. This research paper is done qualitatively to emphasize the need for securing the data as well...

  • A new video encryption algorithm based on the complex chaotic system. Linghao Li; Xiaojun Tong // Applied Mechanics & Materials;2014, Issue 556-562, p3376 

    In this article,a new type of video encryption system based on complex chaotic model was proposed. The algorithm selects the more complex the chaos model,generates pseudo random sequence to used encrypt the key data of encryption process,the experimental results show that this encryption...

  • Data Encryption and Decryption Using RSA Algorithm in a Network Environment. Goshwe, Nentawe Y. // International Journal of Computer Science & Network Security;Jul2013, Vol. 13 Issue 7, p9 

    One of the principal challenges of resource sharing on data communication network is its security. This is premised on the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. This paper presents a design of data encryption...

  • Strange Number System: An Enhancing Tool for Data Encryption and Decryption. Das, Debasis; Lanjewar, U. A. // International Journal of Advanced Research in Computer Science;Mar/Apr2012, Vol. 3 Issue 2, p167 

    In the electronic age, while information needs to be sent on network with security, it has to be encrypted to protect information from 'prying eyes'. Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics