files/journal/2022-09-02_12-54-44-000000_354.png

Journal of Engineering and Applied Sciences

ISSN: Online 1818-7803
ISSN: Print 1816-949x
109
Views
2
Downloads

A Novel Approach to Incorporate Efficient Security in Content Distribution

K. John Singh, Neha Dilawari and R. Manimegalai
Page: 190-197 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Network coding for content distribution has been in recent, researches lately owing to its wide applications in distribution of shared multimedia content, etc. In network coding, an intermediary node can combine different packets together in order to reduce the number of transmissions and thus increase the overall throughput of the network. Since, attackers tend to inject fake data in order to corrupt the process of content distribution, so that the distribution of information gets hindered and the network resources gets exhausted, content verification becomes a crucial issue when network coding is used. Moreover, it is quite infeasible to use the conventional hash-and-sign methodologies to sign all the data. Therefore, a homomorphic hash function is proposed to overcome the anomaly. However, this technique is quite complex in application and has communication overheads. So, researchers further explore the technique by examining and proposing other methods to aid in reducing computational cost, keeping the security concern in parallel.


How to cite this article:

K. John Singh, Neha Dilawari and R. Manimegalai. A Novel Approach to Incorporate Efficient Security in Content Distribution.
DOI: https://doi.org/10.36478/jeasci.2014.190.197
URL: https://www.makhillpublications.co/view-article/1816-949x/jeasci.2014.190.197