TY - JOUR T1 - A Novel Approach to Incorporate Efficient Security in Content Distribution AU - Singh, K. John AU - Dilawari, Neha AU - Manimegalai, R. JO - Journal of Engineering and Applied Sciences VL - 9 IS - 5 SP - 190 EP - 197 PY - 2014 DA - 2001/08/19 SN - 1816-949x DO - jeasci.2014.190.197 UR - https://makhillpublications.co/view-article.php?doi=jeasci.2014.190.197 KW - Network coding KW -content distribution KW -security KW -andom network coding KW -epidemic attack KW -throughput AB - Network coding for content distribution has been in recent, researches lately owing to its wide applications in distribution of shared multimedia content, etc. In network coding, an intermediary node can combine different packets together in order to reduce the number of transmissions and thus increase the overall throughput of the network. Since, attackers tend to inject fake data in order to corrupt the process of content distribution, so that the distribution of information gets hindered and the network resources gets exhausted, content verification becomes a crucial issue when network coding is used. Moreover, it is quite infeasible to use the conventional hash-and-sign methodologies to sign all the data. Therefore, a homomorphic hash function is proposed to overcome the anomaly. However, this technique is quite complex in application and has communication overheads. So, researchers further explore the technique by examining and proposing other methods to aid in reducing computational cost, keeping the security concern in parallel. ER -