Network Coding an Secure and Efficient Process for Content Distribution

International Journal of Computer Trends and Technology (IJCTT)
© 2014 by IJCTT Journal
Volume-16 Number-2
Year of Publication : 2014
Authors : A. Purushotham , Bhaludra Raveendranadh Singh , K.Laxmi , Moligi Sangeetha


A. Purushotham , Bhaludra Raveendranadh Singh , K.Laxmi , Moligi Sangeetha. "Network Coding an Secure and Efficient Process for Content Distribution". International Journal of Computer Trends and Technology (IJCTT) V16(2):63-67, Oct 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Content distribution in network sometimes may be vulnerable henceforth unauthorized users can inject “bogus” data to corrupt the content during its distribution process in order to deplete the network resource. The direct application of network coding may be insecure. Content verification is the important and practical issue when maintaining integrity of the content. While random linear networking coding is used, it is impracticable for the source of the content to sign all the data, and also the traditional methods such as “hash and sign” are no longer applicable. This is achieved by on the fly verification, which employs a classical homomorphic hash function. In this method content is spitted and hashing is applied. Hashed content is sent to the destination through peer to peer network. Key is sent to the destination directly from the source. Without the key unauthorized users finds difficult to modify the content. Hence the content is secured, however this technique is very complex to be applied to network coding because of high computational and communication overhead. We analyzing this issue further by carefully for different types of overhead, and we propose methods to reducing both communication and computational cost, and also to achieving that providing provable security at the same time.

1) Qiming Li, John C.S. Lui, and Dah-Ming Chiu, “On the Security and Efficiency of Content Distribution via Network Coding”, IEEE Transactions On Dependable And Secure Computing, Vol.9, No.2, March/April 2012.
2) Abarna.R, Krupahari.A.L and PraveenKumar.R, Information Technology, Anand Institute of Higher Technology, Chennai “ Enhancing the Security of Content Distribution using On-the-Fly Verification via Network Coding” IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013.
3) April 2005, S.Acedanski, S.Deb, M.Medard, and R.Koetter, Multiple storage locations are available but limited space is consumed. Each storage location chooses a part of the file without the knowledge of what is stored in the other locations. The problem is storing a large file in a distributed manner over a network.
4) 2005, M.Wang, Y.Zhu, B.Li, Large Volume of data in the overlay network seeks to design and implement the best strategy to disseminate data.

Content Distribution, bogus data, Security, network coding, verification, computational cost, Peer to Peer network