Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - December Issue 2013 by IJCTT Journal
Volume-6 Issue-1                           
Year of Publication : 2013
Authors :Muzammil H Mohammed , Masood A Shaik

MLA

Muzammil H Mohammed , Masood A Shaik"Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach"International Journal of Computer Trends and Technology (IJCTT),V6(1):52-57 December Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- -Currently internet client varies widely both in hardware and software properties. The ever increasing requirements of clients to support heterogeneous environment, demand techniques to adapt the same content to diverse devices by pervasive computing. Content service may perform media conversion such as from text to audio. The transcoding function changes the data from one format into another. To address all these types of variation and to provide a suitable content and presentation to client proxy-based transcoding approach is used. The computational load caused by object transcoding is shared among the proxies by flexible delegation of services which reduces the transcoding load and provides fast response to the client. The data server also ensures data security by maintaining data integrity and confidentiality. The Lease Technique is proposed to ensure cache consistency among the intermediaries in CDN. A cache hit also reduces access latency for the clients. System performance thus improves, especially when a large amount of data is involved. Besides these improvements, caching makes the system robust by letting caching proxies provide content distribution services when the server is not available. With the emergence of various network appliances and heterogeneous client environments, there are other relevant new requirements for content services by intermediaries.

References:-

[1] C. Aggarwal, J.L. Wolf, and P.S. Yu, “Caching on the World Wide Web,” IEEE Trans. Knowledge and Data Eng., vol. 11, no. 1, pp. 94-107, Jan. 1999.
[2] G. Berhe, L. Brunie, and J.M. Pierson, “Modeling Service-BasedMultimedia Content Adaptation in Pervasive Computing,” Proc.First Conf. Computing Frontiers, Apr. 2004.
[3] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “Web Caching and Zipf-Like Distributions: Evidence and Implications,”Proc. IEEE INFOCOM ’99, Mar. 1999.
[4] S. Buchholz and A. Schill, “Adaptation-Aware Web Caching:Caching in the Future Pervasive Web,” Proc. 13th GI/ITG Conf.Kommunikation in Verteilten Systemen (KiVS), 2003.
[5] V. Cardellini, P.S. Yu, and Y.W. Huang, “Collaborative Proxy System for Distributed Web Content Transcoding,” Proc. Ninth ACM Int’l Conf. Information and Knowledge Management (CIKM ’00)Nov. 2000.
[6] K. Arnold and J. Gosling. The Java programming language, 2nd Ed., Addison-Wesley, 1998.
[7] D. Aucsmith. Tamper resistant software: An implementation. In Ross Anderson, editor, Information Hiding — Proc. 1st Int. Workshop, LNCS no. 1174, Springer-Verlag, 1996.
[8] D. Beaver, J. Feigenbaum, and V. Shoup. Hiding instances in zero-know ledge proof systems. Advances in Cryptology — CRYPTO `90, Springer-Verlag, 1990.
[9] B. Bershad, S. Savage, P. Pardyak, E. Sirer, M. Fiuczynski, D. Becker, S. Eggers, and C. Chambers. Extensibility, safety and performance in the SPIN operating system. In Proc. 15th Symp. on Operating Systems Principles, 1995.
[10] F. Chang, A. Itzkovitz, and V. Karamcheti. User-level resource-constrained environments, In preparation, November 1999.
[11] C. Collberg, C. Thomborson. On the limits of software watermarking. In Proc. ACM Symp. on Principles of Programming Languages, 1999.
[12] C. Collberg, C. Thomborson, D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proc. ACM Symp. on Principles of Programming Languages, 1998.
[13] P. Dasgupta, V. Karamcheti, and Z. Kedem. Transparent distribution middleware for general-purpose computations, In Proc. Parallel and Distributed Processing Techniques and Applications, 1999.
[14] J. Feigenbaum. Encrypting problem instances, or, can you take advantage of someone without having to trust him. Advances in Cryptology — CRYPTO ‘85, Springer-Verlag, 1985.
[15] Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications. In Proc. 6th Usenix Security Symp., 1996.
[16] C. Harrison, D. Chess, and A. Kerschenbaum. Mobile agents: Are they a good idea? IBM Research Report, 1995.
[17] S. Kent, R. Atkinson. Security architecture for the Internet protocol, Internet Engineering Task Force (IETF), Network Working Group, RFC 2401, 1998.
[18] Lipkind, I. Pechtchanski, and V. Karamcheti, Object Views: Language support for intelligent object caching in parallel and distributed computations, In Proc. Object-Oriented Programming Systems, Languages, and Applications, 1999.
[19] G. Necula and P. Lee. Proof-carrying code In Proc. 24th ACM Symp. on Principles of Programming Languages, 1997.
[20] D. Malkhi and M. Reiter. A high-throughput secure reliable multicast protocol, J. of Computer Security, 1997, pp. 113–127
[21] Object Management Group. CORBA Services: Common object services specification, security service, v. 1.2, 1998.
[22] T. Sander and C. Tschudin. Protecting mobile agents against malicious hosts. Mobile Agent Security, LNCS, Springer-Verlag, 1997
[23] Sun Microsystems. Java 2 Platform, Enterprise Edition Specification Version 1.2, 1999.

Keywords:-Distributed environment, Transcoding approach, least technique, caching