用户名: 密码: 验证码:
P2P流媒体内容分发的关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
Internet的高速发展和宽带网络的迅速普及使得流媒体应用速发展成为当今主流的网络应用。相比传统的C/S网络应用模式,P2P技术为部署成本合理、可扩展性高、良好服务质量和用户体验的大规模流媒体内容分发服务提供了更为有效的手段,研究P2P流媒体内容分发的关键技术也因此具有重要的现实意义。然而,P2P网络自身的自由、开放和无中心特性以及流媒体服务所具有的带宽资源消耗大、传输实时性要求高和传输持续时间长等特点,使得提供可靠、可管、可控的P2P流媒体内容分发服务极具挑战性。P2P流媒体内容分发所涉及的关键技术主要包括覆盖网络构建和节点组织、“内容”和“带宽”管理、编码技术、安全和管理机制等几个方面;本文对这些关键技术进行了研究,并重点研究了再编码无比率编码方式下数据存储和传输的相关问题,主要工作和研究成果概括如下
     (1)利用C/S模式或者其演进模式(内容分发网络)部署大规模流媒体服务,不仅系统的可扩展性、并发处理能力存在不足,而且部署成本高昂;在充分发挥P2P技术优势的基础上,提出一种采用编码技术且具有良好可管理性的P2P流媒体内容分发模式:借鉴网络编码的思想引入可有效提高数据存储和传输性能的再编码无比率编码方式,在服务器端及各个节点对多媒体数据进行编码处理,并以“边缘化”索引维护为目的构建基于中心域和分治域服务器的“多域分治”体系结构,同时给出完整的层次化功能模块划分。
     (2)P2P视频点播系统的高动态性和交互性特点使得其设计和实现较P2P文件共享系统和直播系统更加复杂;具有良好服务质量和用户体验的视频点播服务主要依赖于系统的节点组织、数据存储和数据传输三个核心方面;采用混合式方式进行节点组织、基于再编码无比率编码方式综合考虑数据存储和传输、并引入多源(视频文件)共享交叉存储方式设计了一个具有高可扩展性、高可靠性、额外开销小的P2P视频点播系统——xVoD;利用与用户播放记录相关的“动态起始点”进行邻居节点选择,使得系统能够很好地支持用户的VCR操作;利用多源共享交叉存储方式可充分发挥用户节点的上载能力、提高资源利用率;按照“稀缺优先”原则使用启发式算法分配各数据块存储空间能够增加各数据块分布的“均匀”程度,以提高数据块在用户节点存储空间的命中率;利用基于无比率编码请求驱动的调度方式大大简化数据块调度的同步问题和数据提供者的选择问题;按照紧急度、稀缺度相关的数据块请求优先级响应请求,并采用贪心算法分配带宽,以尽力服务请求优先级高的节点从而保证用户播放质量;实验仿真结果显示,xVoD在源服务器负载、启动时延、VCR时延和数据路由开销等方面都表现出良好的性能,且系统性能随着所分配存储空间大小的增加呈上升趋势。
     (3)P2P流媒体系统中“内容”分布状态随着一些系统参数以及用户节点的在线状况和观看行为不断变化,并对用户的播放质量和服务器负载产生一定影响;结合流媒体系统的特性,从节点间资源共享的角度出发,提出P2P流媒体系统“数据可得率”的定义并给出概率形式描述;然后基于给定的采用无比率编码技术的视频点播系统模型和相关假设进行数据块可得率的分析和计算;利用离散马尔可夫链模型对用户的观看行为进行建模分析,得出数据块访问率和拥有率的计算方法;并借助实验仿真,探讨和总结数据可得率与文件分块数、数据块编码分片数、邻居节点数量等系统参数以及用户节点的在线规律和行为之间的关系,初步给出一些指导系统设计和优化的参数选择策略。
     (4)高可运营性的P2P流媒体内容分发系统需要合理、高效的安全机制给予保障,既能抵御“外部”入侵——确保只有合法用户才可以得到服务且保证他们之间数据传输的机密性、完整性和可鉴别性又能防范“内部”污染——快速鉴别不良行为用户制造的不可用污染数据、减少污染数据的传播;通过引入基于椭圆曲线自认证公钥系统构建系统安全体系,并设计一套高效的认证和密钥建立机制以提供给合法用户节点之间安全的通信环境;利用同态哈希函数对编码数据的有效性进行鉴别以防范数据污染,并辅以一定的管理机制有力保障系统健康、高效运转。
The streaming media application has become more and more popular with the rapid development of Internet and broadband networks. Compared with traditional framework of client/server (C/S), peer-to-peer (P2P) technologies provide effective means of deploying large-scale streaming media distribution with low cost, high scalability as well as good quality of service and experience. Driven by application requirements, the key technologies of P2P streaming media distribution draw more and more attentions from both industry and academia. However, there are still full of challenges for providing reliable and manageable P2P streaming service, for the nature of P2P networks (free, open and centreless) and streaming service (large bandwidth consumption, real-time requirement and long transmission duration). The key technologies for P2P streaming media distribution includes overlay networks construction coupled with peer organization, management of "content" and "bandwidth" resources, coding technologies, together with mechanisms of security and management etc.. In this paper, these issues are studied, with a special focus on data storage and transmission using recoded rateless coding.
     Firstly, using either C/S framework or its evolution form CDN to deploy large-scale streaming media service not only leads to the system's lack of scalability and concurrent processing capacity, but also brings high cost. Taking advantage of P2P, a novel manageable P2P streaming media distribution framework using coding technology is proposed. Learning from the idea of network coding, the recorded rateless coding is processed at both the server and peer to improve the performance of data storage and transmission. At the same time, in order to maintain the index with edge servers, a "multi-domain divide and conquer" architecture is designed, attached by the entire layered function module partition.
     Secondly, the high dynamics and interactivity of P2P video-on-demand (VoD) system make it more complex to design and implement than P2P file sharing and live systems. Building P2P VoD system with high quality of service and experience depends on three core aspects:peer organization, data storage and data transmission. Hybrid peer organization mechanism, recoded rateless coding for data storage and transmission, as well as cross-sharing multi-channel architecture are adopted for designing a novel VoD system, namely xVoD, which has high resilience and scalability, low communication overhead etc.. In xVoD, "dynamic starting point" is introduced for neighbor nodes selection, which supports VCR operations well; cross-sharing multi-channel architecture aims to make full use of the peer's uploading and storage capacities; following "rare first" strategy, a heuristic storage allocation algorithm is used to make the distribution of each data block more uniform, which can improve the probability of getting blocks from neighbors (not server); rateless coding-based request-driven scheduling not only eliminates the need for reconciling packets inside each block, but also simplifies the retrieval of different providers; according to the request priority relying on urgency and rarity, block request is responded and bandwidth is allocated using greedy algorithm by the provider. The experiment results show that xVoD substantially reduces server stress, and also has significantly good performance in terms of startup latency, VCR latency and block seeking overhead. Meanwhile the performance improves with more storage of each peer.
     Thirdly, the distribution state of "content" changes constantly, according to some system parameters, the user's online status and viewing behavior, which has some influence upon playback quality and server stress. Considering the nature of streaming media application, from the perspective of resource sharing among peers, data-get-rate of P2P streaming system is defined, and the probability description is also presented. Then for the given model under some assumptions of a rateless coding-based P2P VoD system, the data-get-rate is analyzed and calculated. In addition, the modeling analysis of user behavior is given using discrete Markov chain model. By means of experiments, the relationship between data-get-rate and system parameters (including number of file blocks, number of coded pieces, number of neighbor nodes) as well as the law of user behavior is studied. Furthermore, some preliminary guidelines for VoD system design and optimization are given.
     Fourthly, reasonable and efficient security mechanism is needed for the operation of P2P streaming systems. It requires not only protecting against attacks from the outside to guarantee that only registered user can access services with data confidentiality, integrity and authenticity, but also detecting the data pollution from the inside to reduce the propagation of bad encoded packets. ECC-based self-certified public key cryptosystems (ECCSCPKC) is introduced to construct the system security infrastructure; and its related security schemes, with a few modifications, are used for designing an efficient authentication and key agreement (AKA) protocol. Meanwhile, homomorphic hash function is used for checking the validity of an encoded packet without decoding; in addition, some strategies are established to support effective management of the system.
引文
[1]中国互联网络信息中心 国互联网络发展状况统计报告 2010年1月
    [2]"Streaming media", http://en.wikipedia.org/wiki/Streaming_media
    [3]S.E. Deering, D.R. Cheriton, Multicast routing in datagram internetworks and extended LANs, ACM Trans. Comput. Syst., Vol.8 (2),1990, pp.85-110
    [4]K.A. Hua, Y. Cai, S. Sheu, Patching:a multicast technique for true video-on-demand services, In Proceedings of MULTIMEDIA'98,1998, pp. 191-200
    [5]S. Sheu, K. Hua and W. Tavanapong. Chaining:a generalized batching technique for video-on-demand systems, In Proceedings of Multimedia Computing and Systems'97,1997, pp.110-117
    [6]A. Biliris, C. Cranor, F. Douglis et al., CDN brokering, In Proceedings of WCW, 2001, pp.393-402
    [7]"AKAMAI", www.akamai.com
    [8]"YOUTUBE", www.youtube.com
    [9]"SKYPE", www.skype.com
    [10]"PPLIVE'\www.pplive.com
    [11]"PPSTREAM", www.ppstream.com
    [12]"UUSEE", www.uusee.com
    [13]"SOPCAST", www.sopcast.com
    [14]"KUWO", www.kuwo.cn
    [15]"NAPSTER", www.napster.com
    [16]Y. Chu, S.G. Rao, H. Zhang, A case for end system multicast, ACM SIGMETRICS Performance Evaluation Review, Vol.28 (1),2000, pp.1-12
    [17]A.J. Ganesh, A. Kermarrec, L. Massoulie, Peer-to-peer membership manage-ment for gossip-based protocols, IEEE Trans. Comput., Vol.52 (2),2003, pp.139-149
    [18]X. Zhang, J. Liu, B. Li et al., CoolStreaming/DONet:A data-driven overlay, In Proceedings of IEEE INFOCOM'05,2005, pp.2102-2111
    [19]Y. Liu, Y. Guo, C. Liang, A survey on peer-to-peer video streaming systems, Peer-to-Peer Networking and Applications, Vol.1(1), pp.18-28
    [20]S. Banerjee, B. Bhattacharjee, C. Kommareddy, Scalable application layer multicast, In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM'02), 2002, pp.205-217
    [21]D. Tran, K. Hua, T. Do, ZIGZAG:an efficient peer-to-peer scheme for media streaming, In Proceedings of the IEEE INFOCOM'03,2003, pp.1283-1292
    [22]M. Castro, P. Druschel, A. Kermarrec et al., SplitStream:high-bandwidth multicast in cooperative environments, In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP),2003, pp.298-313
    [23]A. Rowstron, P. Druschel, Pastry:Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, In Proceedings of IFIP/ACM Middle-ware,2001
    [24]M. Castro, P. Druschel, A. Kermarrec et al., SCRIBE:A large-scale and decentralized application-level multicast infrastructure, IEEE Journal on Selected Areas in Communication, Vol.20 (8),2002, pp.1489-1499
    [25]D. Kostic, A. Rodriguez, J. Albrecht et al., Bullet:high bandwidth data dissemination using an overlay mesh, ACM SIGOPS Operation Systems Review, Vol.37 (5),2003. pp.282-297
    [26]M. Zhang, J. Luo, L. Zhao and S. Yang, A peer-to-peer network for live media streaming using a push-pull approach, In Proceedings of the 13th ACM international conference on Multimedia,2005, pp.287-290
    [27]N. Magharei, R. Rejaie, PRIME:Peer-to-Peer Receiver-driven Mesh-based Streaming, In Proceedings of IEEE INFOCOM'07,2007, pp.1415-1423
    [28]N. Magharei, R. Rejaie. PRIME:Peer-to-Peer Receiver-driven Mesh-based Streaming, IEEE/ACM Transactions on Networking, Vol.17 (4),2009, pp. 1052-1065
    [29]D. Wu, C. Liang, Y. Liu et al, View-Upload Decoupling:A Redesign of Multi-Channel P2P Video Systems, In Proceedings of IEEE INFOCOM'09, 2009, pp.2726-2730
    [30]D. Wu, Y. Liu, K. Ross, Queuing Network Models for Multi-Channel P2P Live Streaming Systems, In Proceedings of IEEE INFOCOM'09,2009, pp.73-81
    [31]Y. Guo, K. Suh, J. Kurose et al., P2Cast:Peer-to-peer patching scheme for vod service, In Proceedings of the 12th World Wide Web Conference,2003, pp. 301-309
    [32]T. Do, K. Hua, M. Tantaoui, P2VoD:Providing fault tolerant video-on-demand streaming in peer-to-peer environment, In Proceedings of IEEE International Conference on Communications,2004, pp.1467-1472
    [33]Y. Cui, B. Li, K. Nahrstedt, oStream:Asynchronous streaming multicast in application-layer overlay networks, IEEE JSAC special issue on Recent Advances in Service Overlay, Vol.22 (1),2004, pp.91-106
    [34]W-P. Yiu, X. Jin, S-H. Chan, VMesh:Distributed segment storage for peer-to-peer interactive video streaming, IEEE J. Select. Areas Commun., Vol.25 (9),2007, pp.1717-1731
    [35]S. Rhea, B. Godfrey, B. Karp et al, OpenDHT:a public DHT service and its uses, In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, ACM.2005, pp.73-84
    [36]V.K. Goyal, Multiple description coding:compression meets the network, IEEE Signal Processing Magazine.2001, Vol.18 (5), pp.74-93
    [37]Y. Wang, A. Reibman, S. Lin, Multiple description coding for video delivery, In Proceedings of the IEEE,2005, Vol.93 (1), pp.57-70
    [38]J.R. Ohm. Advances in scalable video coding, In Proceedings of the IEEE,2005, Vol.93(1), pp.42-56
    [39]H. Schwarz, D. Marpe, T. Wiegand, Overview of the Scalable Video Coding Extension of the H.264/AVC Standard, IEEE Transactions on Circuits and Systems for Video Technology, Vol.17 (9), pp.1103-1129
    [40]D.J.C. Mackay, Fountain codes, IEEE Proceedings Communications,2005, pp. 1062-1068
    [41]R. Ahlswede, N. Cai, S.Y.R. Li et al, Network information flow, IEEE Transactions on Information Theory, Vol.44 (4),2000, pp.1204-1216
    [42]C. Gkantsidis, P. Rodriguez, Network coding for large scale content distribution, In Proceedings of IEEE INFOCOM'05,2005, pp.2235-2245
    [43]V.N. Padmanabhan, H.J. Wang, P.A. Chou et al., Distributing streaming media content using cooperative networking, In Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video (NOSSDA'02),2002, pp.177-186
    [44]M. Wang, Z. Li, B. Li et al, A high-throughput overlay multicast infrastructure with network coding, In Proceedings of the 13th IEEE International Workshop on Quality of Service (IWQoS),2005, pp.37-53
    [45]C. Wu, B. Li, rStream:Resilient peer-to-peer streaming with rateless codes, In Proceedings of the 13th annual ACM international conference on Multimedia, 2005, pp.307-310
    [46]C. Wu, B. Li, rStream:Resilient and optimal peer-to-peer streaming with rateless codes, IEEE Transactions on Parallel and Distributed Systems, Vol.19(1),2008, pp.77-92
    [47]W. Tsaur, Several Security Schemes Constructed Using ECC-Based Self-Certified Public Key Cryptosystems, Applied Mathematics and Computation, Vol.168 (1), 2005, pp.447-464
    [48]M.N. Krohn, M.J. Freedman, D. Mazieres, On-the-fly verification of rateless erasure codes for efficient content distribution, In Proceedings of 2004 IEEE Symposium on Security and Privacy,2004, pp.226-240
    [1]杨时谦、何代义 打造数字媒体娱乐新平台 华为技术 第15期 2007年2月25-26页
    [2]A. Biliris, C. Cranor, F. Douglis et al., CDN brokering, In Proceedings of WCW, 2001, pp.393-402
    [3]J.R. Ohm, Advances in scalable video coding, In Proceedings of IEEE,2005, Vol. 93(1), pp.42-56
    [4]H. Schwarz, D. Marpe, T. Wiegand, Overview of the Scalable Video Coding Extension of the H.264/AVC Standard, IEEE Transactions on Circuits and Systems for Video Technology, Vol.17 (9), pp.1103-1129
    [5]"MPEG-4", http://mpeg.chiariglione.org/standards/mpeg-4/mpeg-4.htm
    [6]W. Li, Overview of fine granularity scalability in MPEG-4 video standard, IEEE transactions on circuits and systems for video technology,2001, Vol.11 (3), pp. 301-317
    [7]P. Baccichet, T. Schierl, T. Wiegand et al., Low-delay peer-to-peer streaming using scalable video coding, In Proceedings of IEEE Packet Video 2007, pp.173-181
    [8]Z. Liu, Y. Shen, K. Ross et al., LayerP2P:Using Layered Video Chunks in P2P Live Streaming, IEEE Transactions on Multimedia, Nov 2009, Vol.11 (9), pp.1340-1352
    [9]V.K. Goyal, Multiple description coding:compression meets the network, IEEE Signal Processing Magazine,2001, Vol.18 (5), pp.74-93
    [10]Y. Wang, A.R. Reibman, S. Lin, Multiple description coding for video delivery, In Proceedings of the IEEE,2005, Vol.93 (1), pp.57-70
    [11]V.N. Padmanabhan, H.J. Wang, P.A. Chou, Resilient peer-to-peer streaming, In Proceedings of the 11th IEEE International Conference on Network Protocols,2003, pp.16-27
    [12]S. Khan, R. Schollmeier, E. Steinbach, A performance comparison of multiple description video streaming in peer-to-peer and content delivery networks, In Proceedings of 2004 IEEE International Conference on Multimedia and Expo,2004, pp.503-506
    [13]Z. Liu, Y. Shen, S.S. Panwar et al., P2P Video Live Streaming with MDC Providing Incentives for Redistribution, In Proceedings of 2007 IEEE International Conference on Multimedia and Expo,2007, pp.48-51
    [14]H. Wang, A. Ortega, Robust video communication by combining scalability and multiple description coding techniques, In Proceedings of the Image and Video Communications and Processing,2003, pp.111-124
    [15]R. Ahlswede, N. Cai, S.Y.R. Li et al., Network information flow, IEEE Transactions on Information Theory, Vol.44 (4),2000, pp.1204-1216
    [16]R. Koetter, M. Medard, An algebraic approach to network coding, IEEE/ACM Transactions on Networking, Vol.11 (5),2003, pp.782-795
    [17]S.Y.R. Li, R.W. Yeung, N. Cai, Linear network coding, IEEE Transactions on Information, Vol.49 (2),2003, pp.371-381
    [18]D. Wang, Q. Zhang, J.C. Liu, Partial network coding:Theory and application in continuous sensor data collection, In Proceedings of 14th IEEE International Workshop on Quality of Service (IWQoS 2006),2006, pp.93-101
    [19]J.S. Park, D.S. Lun, F. Soldo, et al., Performance of network coding in ad hoc networks, In Proceedings of the 25th Military Communications Conference,2006, pp.1-6
    [20]A.G. Dimakis, P.B. Godfrey, M. Wainwright, et al., Network coding for distributed storage systems, In Proceedings of INFOCOM'07,2007, pp.2000-2008
    [21]M. Wang, B. Li, How practical is network coding? In Proceedings of the 14th IEEE International Workshop on Quality of Service(IWQoS2006),2006, pp.274-278
    [22]M. Wang, B. Li, R2:Random Push with Random Network Coding in Live Peer-to-Peer Streaming, IEEE Journal on Selected Areas in Communications, Vol.25 (9),2007, pp.1655-1666
    [23]C. Feng, B. Li, On Large-Scale Peer-to-Peer Streaming Systems with Network Coding, In Proceedings of the 16th ACM international conference on Multimedia, 2008, pp.269-278
    [24]D.J.C. Mackay, Fountain codes, IEE Proceedings of Communications,2005, pp.1062-1068
    [25]M. Luby, LT Codes, In Proceedings of the 43rd Symposium on Foundataions of Computer Science,2002, pp.271-280
    [26]A. Shokrollahi, Raptor Codes, IEEE Transactions on Information Theory, Vol.52 (6),2006. pp.2551-2567
    [27]P. Maymounkov, Online codes, New York University Research Report TR2002-833,2002
    [28]M. Luby, M. Watson, T. Gasiba et al., Raptor codes for reliable download delivery in wireless broadcast systems, In Proceedings of 3rd IEEE Consumer Communications and Networking Conference, Vol.1,2006, pp.192-197
    [29]C. Gkantsidis, P. Rodriguez, Network coding for large scale content distribution, In Proceedings of IEEE INFOCOM'05, Vol.4,2005, pp.2235-2245
    [30]C. Wu, B. Li, rStream:Resilient peer-to-peer streaming with rateless codes, In Proceedings of the 13th annual ACM international conference on Multimedia,2005, pp.307-310
    [31]C. Wu, B. Li, rStream:Resilient and optimal peer-to-peer streaming with rateless codes, IEEE Transactions on Parallel and Distributed Systems, Vol.19 (1),2008, pp.77-92
    [32]M. Grangetto, R. Gaeta, M. Sereno, Rateless Codes Network Coding for Simple and Efficient P2P Video Streaming, In Proceedings of ICME'09,2009, pp. 1500-1503
    [33]D. Lou, Y. Mao, T. Yeap, The production of peer-to-peer videostreaming networks, ACM SIGCOMM:P2P-TV workshop,2007, pp.346-351
    [34]"GNUTELLA", gnufu.net
    [35]"FREENET", freenetproject.org
    [36]"NAPSTER", www.napster.com
    [37]"GROOVE", www.groove.com
    [38]C. Laat, G. Gross, L. Gommans et al.. Generic AAA Architecture, RFC 2903, IETF, August 2000
    [39]"AAA protocol", http://en.wikipedia.org/wiki/AAA_protocol
    [40]"Digital rights management", http://en.wikipedia.org/wiki/Digital_rights_mana-gement
    [41]"Service-oriented architecture", http://en.wikipedia.org/wiki/Service-orientedarc-hitecture
    [42]X. Zhao, Y. Lv, W. He. A Novel Micropayment Scheme with Complete Anonymity, In Proceedings of the Fifth International Conference on Information Assurance and Security, IAS'09,2009, Vol.1, pp.638-642
    [1]"PPLIVE", www.pplive.com
    [2]"PPSTREAM", www.ppstream.com
    [3]"UUSEE", www.uusee.com
    [4]C. Huang, J. Li, K. Ross, Can Internet Video-on-Demand Be Profitable? In Proceedings of ACM SIGCOMM'07, August 2007, pp.133-144
    [5]Y. He, I. Lee, L. Guan, Distributed Throughput Maximization in P2P VoD Applications, IEEE Transactions on Multimedia, Vol.11 (2),2009, pp.509-522
    [6]C. Xu, G.M. Muntean, E.Fallon et al., Distributed Storage-Assisted Data-Driven Overlay Network for P2P VoD Services, IEEE Transactions on Broadcasting, Vol. 55(1),2009, pp.1-10
    [7]U.C. Kozat, O. Harmanci, S. Kanumuri et al., Peer Assisted Video Streaming With Supply-Demand-Based Cache Optimization. IEEE Transactions on Multimedia, Vol.11 (3),2009, pp.494-508
    [8]Y. Huang, T. Fu, D. M. Chiu et al.. Challenges design and analysis of a large-scale P2P vod systems, In Proceedings of ACM SIGCOMM'08,2008, pp.375-388
    [9]Y. Liu, Y. Guo, C. Liang, A survey on peer-to-peer video streaming systems, Peer-to-Peer Networking and Applications, Vol.1 (1), pp.18-28.
    [10]李振华 P2P十年:何去何从?中国计算机学会通讯 2010年第1期59-63页
    [11]"BITTORRENT", www.bittorrent.com
    [12]"MAZE", maze.tianwang.com
    [13]M. Zhang, J. Luo, L. Zhao et al., A peer-to-peer network for live media streaming using a push-pull approach, In Proceedings of the 13th ACM international conference on Multimedia,2005, pp.287-290
    [14]"QQLIVE", live.qq.com
    [15]"TVANTS", www.tvants.com
    [16]C. Wu, B. Li, rStream:Resilient peer-to-peer streaming with rateless codes, In Proceedings of the 13th annual ACM international conference on Multimedia, 2005, pp.307-310
    [17]D. Lou, T. Yeap, Resilient Video-on-Demand streaming over P2P networks, In Proceedings of the 2nd IEEE Workshop on Hot Topics in Web Systems and Technologies,2008
    [18]N. Magharei, R. Rejaie, PRIME:Peer-to-Peer Receiver-driven Mesh-based Streaming, In Proceedings of IEEE INFOCOM'07, May 2007, pp.1415-1423
    [19]N. Magharei, R. Rejaie, PRIME:Peer-to-Peer Receiver-driven Mesh-based Streaming, IEEE/ACM Transactions on Networking, Vol.17 (4),2009, pp. 1052-1065
    [20]W-P. Yiu, X. Jin, S-H. Chan, VMesh:Distributed segment storage for peer-to-peer interactive video streaming, In Proceedings of IEEE Journal on Selected Areas in Communications, Vol.25 (9),2007, pp.1717-1731
    [21]X. Wang, C. Zheng, Z. Zhang et al., The design of video segmentation-aided VCR support for P2P VoD systems, IEEE Transactions on Consumer Electronics, Vol.54 (2),2008, pp.531-537
    [22]L. Yu, L. Gao, J. Zhao, Sonic VoD:A VCR-supported P2P-VoD system with network coding, IEEE Transactions on Consumer Electronics, Vol.55 (2),2009, pp.576-582
    [23]Y. He, Y. Liu, Vovo:VCR-oriented video-on-demand in large-scale peer-to-peer networks, IEEE Transactions on Parallel and Distributed Systems, Vol.20 (4), 2009, pp.528-539
    [24]Y. He, G. Shen, Y. Xiong, L. Guan, Optimal prefetching scheme in p2p vod applications with guided seeks, IEEE Transactions on Multimedia, Vol.11 (1), 2009, pp.138-151
    [25]S. Jin, A. Bestavros, Cache-and-relay streaming mediadelivery for asynchronous clients, In Proceedings of International workshop on networked group communication,2002
    [26]Y. Guo, K. Suh, J. Kurose et al., A peer-to-peer on-demand streaming service and its performance evaluation, In Proceedings of 2003 IEEE international conference on multimedia and Expo (ICME'03),2003, pp.649-652
    [27]C. Li, C. Chen, Measurement-based study on the relation between users' watching behavior and network sharing in P2P VoD systems, Computer Networks:The International Journal of Computer and Telecommunications Networking, Vol.54 (1),2010, pp.13-27
    [28]盛骤,谢式千,潘承毅 概率论与数理统计(第二版) 高等教育出版社 1989131-134页
    [29]B. Cheng, X. Liu, Z. Zhang et al, Evaluation and Optimization of a Peer-to-Peer Video-on-Demand System, J. Syst. Archit., Vol.54 (7),2008, pp.651-663
    [30]T.H. Cormen, C.E. Leiserson, R.L. Rivest et al著 潘金贵,顾铁成,李成法等译算法导论(第二版) 机械工业出版社2006 228-230页
    [31]C. Zheng, G. Shen, S. Li, Distributed prefetching scheme for random seek support in peer-to-peer streaming applications, In Proceedings of the ACM workshop on advances in peer-to-peer multimedia streaming,2005. pp.29-38
    [1]B. Cheng, X. Liu, Z. Zhang et al., Evaluation and optimization of a peer-to-peer video-on-demand system, Journal of Systems Architecture, Vol.54 (7), July 2008, pp.651-663
    [2]N. Magharei, R. Rejaie, PRIME:Peer-to-Peer Receiver-driven Mesh-based Streaming, In Proceedings of IEEE INFOCOM, May 2007, pp.1415-1423
    [3]N. Magharei, R. Rejaie, PRIME:Peer-to-Peer Receiver-driven Mesh-based Streaming, IEEE/ACM Transactions on Networking, Vol.17 (4),2009, pp. 1052-1065
    [4]R. Bhagwan, D. Moore, S. Savage et al., Replication strategies for highly available peer-to-peer storage, In Proceedings of FuDiCo:Future directions in Distributed Computing,2002
    [5]R. Bhagwan, S. Savage, and G.M. Voelker, Understanding Availability, In Proceedings of IPTPS '03,2003, pp.256-267
    [6]X. Chu, K. Zhao, Z. Li et al., Auction-Based On-Demand P2P Min-Cost Media Streaming with Network Coding, IEEE Transactions on Parallel and Distributed Systems, Vol.20 (12),2009, pp.1816-1829
    [7]盛骤,谢式千,潘承毅 概率论与数理统计(第二版) 高等教育出版社 1989
    [8]Y. Huang, T. Fu, D.M. Chiu et al., Challenges design and analysis of a large-scale P2P vod systems, In Proceedings of ACM SIGCOMM'08,2008, pp.375-388
    [9]C. Li, C. Chen, Measurement-based study on the relation between users' watching behavior and network sharing in P2P VoD systems, Computer Networks:The International Journal of Computer and Telecommunications Networking, Vol.54 (1),2010, pp.13-27
    [10]陆大絟 随机过程及其应用 清华大学出版社 1986
    [11]W-P. Yiu, X. Jin, S-H. Chan, VMesh:Distributed segment storage for peer-to-peer interactive video streaming, In Proceedings of IEEE Journal on Selected Areas in Communications, Vol.25 (9),2007, pp.1717-1731
    [12]C. Zheng, G. Shen, S. Li, Distributed prefetching scheme for random seek support in peer-to-peer streaming applications, In Proceedings of the ACM workshop on advances in peer-to-peer multimedia streaming,2005, pp.29-38
    [1]A. Friedman, L. J. Camp, Peer-to-Peer Security, The Handbook of Information Security, Harvard,2005
    [2]D. Wallach, A survey of peer-to-peer security issues, In Proceedings of International Symposium on Software Security,2002
    [3]L. Lima, J.P. Vilela, P.F. Oliveira et al., Network Coding Security:Attacks and Countermeasures, Departamento de Ciencia de Computadores,2008
    [4]W. Tsaur, Several Security Schemes Constructed Using ECC-Based Self-Certified Public Key Cryptosystems, Applied Mathematics and Computation, Vol.168 (1). 2005, pp.447-464
    [5]Bruce Schneier著 吴世忠,祝世雄,张文政等译 应用密码学—协议、算法与C源程序 机械工业出版社 2000
    [6]M. Davio, Y. Desmedt, J. Goubert et al., Efficient Hardward and Software Implementation of the DES, In Proceedings of EUROCRYPT'84 Advances in Cryptology,1985, pp.114-120
    [7]ANSI X9.52, Triple Data Encryption Algorithm Modes of Operation, USA,1998
    [8]NIST, FIPS PUB 197, Advanced Encryption Standard, USA,2001
    [9]周玉洁,冯登国 公开密钥算法及其快速实现 国防工业出版社2002
    [10]"Message Authentication Code", http://en.wikipedia.org/wiki/Message_authentic-ation code
    [11]R.L. Rivest, The MD5 Message Digest Algorithm, RFC 1320,1992
    [12]NTST, FIPS PUB 185, Digital Signature Standard,1994
    [13]谢冬青,冷健,PKI原理与技术 清华大学出版社,2004
    [14]M.N. Krohn, M.J. Freedman, D. Mazieres, On-the-fly verification of rateless erasure codes for efficient content distribution, In Proceedings of 2004 IEEE Symposium on Security and Privacy,2004, pp.226-240
    [15]K. Ohta, T. Okamoto, A digital multisignature scheme based on Fiat-Shamir scheme, Advances in Cryptology—ASIACRYPT'91, LNCS, Vol.739,1993, pp. 139-148
    [16]A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology, LNCS, Vol.196,1985, pp.47-53
    [17]M. Girault, Self-certified public keys, Advances in Cryptology—EUROCRYPT '91, LNCS, Vol.547,1991, pp.490-497
    [18]W. Tsaur, A Pairing-Based Authentication Scheme for Protecting Multiple Mobile Agent Hosts, In Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications,2006, pp.423-428
    [19]R. Kandikattu, L. Jacob, A Light-Weight Secure Key Setup and Signaling Architecture for Wireless Mesh Networks. IETE Technical Review, Vol.25 (4), 2008, pp.168-174
    [20]X. Zhao, Y. Lv, T.H. Yeap et al., A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks, In Proceedings of the Fifth International Joint Conference on INC, IMS and IDC, NCM'09,2009, pp.471-474
    [21]P. Horster, M. Michels, H. Petersen, Authenticated encryption schemes with low communication costs, Electronics Letters, Vol.30 (15),1994, pp.1212-1213
    [22]W.B. Lee, C.C. Chang, Authenticated encryption scheme without using a one way function, Electronics Letters, Vol.31 (19),1995. pp.1656-1657.
    [23]C. Gkantsidis, P.R. Rodriguez, Cooperative Security for Network Coding File Distribution, In Proceedings of INFOCOM'06.2006, pp.1-13
    [24]R.R. Joos, A.R. Tripathi, Mutual Authentication in Wireless Networks, Technical Report University of Minnesota,1997
    [25]T. Aura, P. Nikander, J. Leiwo, DoS-resistant authentication with client puzzles, In Proceedings of the 8th Int. Workshop Security Protocols, Vol.2133,2000, pp.170-177
    [26]J. Liang, R. Kumar, Y. Xi et al., Pollution in P2P file sharing systems, In Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol.2,2005, pp.1174-1185

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700