A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things
Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming media services. Solutions such as the newly standardized H.264/SVC (scalable video coding; designed to compress original video bitstream into a...
Saved in:
| Published in: | IEEE internet of things journal Vol. 7; no. 9; pp. 8932 - 8942 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Piscataway
IEEE
01.09.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 2327-4662, 2327-4662 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming media services. Solutions such as the newly standardized H.264/SVC (scalable video coding; designed to compress original video bitstream into a multilayer video stream according to requirements) have been proposed. With the pervasive application of SVC in applications, such as video on demand, video conferencing, and video surveillance in the Internet of Things (IoT), there has been increased scrutiny on security of H.264/SVC. In this article, we propose a bitstream-oriented layered encryption scheme for SVC bitstream. According to the multilayer bit code structure of SVC, the bitstream is separated and encrypted, respectively, by rearranging the network abstraction layer (NAL) unit of SVC bitstream. This provides hierarchical protection for the multilayer characteristic of SVC. In order to provide sufficient security, as well as achieving improved computational efficiency, we use different cryptographic algorithms for the base layer and enhancement layers according to its requirements. The base layer adopts off-the-shelf high-security encryption algorithms, such as block cipher, to ensure security. Each enhancement layer is encrypted with a different key through the stream cipher with low computational complexity, providing layered control of the video. Furthermore, we propose a hierarchical key management scheme to implement layered access control according to the principle of hierarchical deterministic wallet (H-D wallet). Our scheme can be applied to the user-level distinction in video on demand and video surveillance systems in IoT. The analysis and experiments indicate that the proposed scheme achieves a high-security level, yet incurs reasonably low compression cost and computational complexity. |
|---|---|
| AbstractList | Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming media services. Solutions such as the newly standardized H.264/SVC (scalable video coding; designed to compress original video bitstream into a multilayer video stream according to requirements) have been proposed. With the pervasive application of SVC in applications, such as video on demand, video conferencing, and video surveillance in the Internet of Things (IoT), there has been increased scrutiny on security of H.264/SVC. In this article, we propose a bitstream-oriented layered encryption scheme for SVC bitstream. According to the multilayer bit code structure of SVC, the bitstream is separated and encrypted, respectively, by rearranging the network abstraction layer (NAL) unit of SVC bitstream. This provides hierarchical protection for the multilayer characteristic of SVC. In order to provide sufficient security, as well as achieving improved computational efficiency, we use different cryptographic algorithms for the base layer and enhancement layers according to its requirements. The base layer adopts off-the-shelf high-security encryption algorithms, such as block cipher, to ensure security. Each enhancement layer is encrypted with a different key through the stream cipher with low computational complexity, providing layered control of the video. Furthermore, we propose a hierarchical key management scheme to implement layered access control according to the principle of hierarchical deterministic wallet (H-D wallet). Our scheme can be applied to the user-level distinction in video on demand and video surveillance systems in IoT. The analysis and experiments indicate that the proposed scheme achieves a high-security level, yet incurs reasonably low compression cost and computational complexity. |
| Author | Yu, Linchen Ren, Wei Xu, Cheng Zhu, Tianqing Choo, Kim-Kwang Raymond |
| Author_xml | – sequence: 1 givenname: Cheng orcidid: 0000-0003-1164-0807 surname: Xu fullname: Xu, Cheng organization: School of Computer Science, China University of Geosciences, Wuhan, China – sequence: 2 givenname: Wei orcidid: 0000-0001-8590-1737 surname: Ren fullname: Ren, Wei email: weirencs@cug.edu.cn organization: School of Computer Science, China University of Geosciences, Wuhan, China – sequence: 3 givenname: Linchen surname: Yu fullname: Yu, Linchen organization: School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China – sequence: 4 givenname: Tianqing orcidid: 0000-0003-3411-7947 surname: Zhu fullname: Zhu, Tianqing organization: School of Computer Science, China University of Geosciences, Wuhan, China – sequence: 5 givenname: Kim-Kwang Raymond orcidid: 0000-0001-9208-5336 surname: Choo fullname: Choo, Kim-Kwang Raymond organization: Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA |
| BookMark | eNp9kD1v2zAQhokiBZqm-QFFlwM62-GXRHF0jSR26yBD3K7CiTrFDGzSJZnBU_56ZTgoig6Z7h3uuffwfGRnIQZi7LPgUyG4vfq-vF9PJZd8Kq01Rlbv2LlU0kx0Xcuzf_IHdpnzE-d8xCph63P2MoOFp4TJbbzDLVwHlw774mMADD38oAPcYcBH2lEo8OA2Y4AhJljhgRL1MHOOcoZ5DCXFLYzcYiprffXwaw7ffMklEe7ABygbgmUolAIViAOsNz485k_s_YDbTJev84L9vLlezxeT1f3tcj5bTZy0qkxs35GqO7RcaVVzM3BEcg4rsp22preV7RreCKd5h8bUom-kqYhI4GBd06kL9vV0d5_i72fKpX2KzymMla3UWteC60aMW-K05VLMOdHQ7pPfYTq0grdH1e1RdXtU3b6qHhnzH-N8waPBktBv3yS_nEg_Pvq3yXJrG6XUH6d9jT4 |
| CODEN | IITJAU |
| CitedBy_id | crossref_primary_10_1109_TVT_2021_3094806 crossref_primary_10_1007_s12083_024_01733_8 crossref_primary_10_1155_2021_8653083 crossref_primary_10_1080_09720529_2021_2011099 crossref_primary_10_1002_ett_4379 crossref_primary_10_3390_s21134419 crossref_primary_10_1109_ACCESS_2025_3546618 crossref_primary_10_3390_electronics12214542 |
| Cites_doi | 10.1109/DESEC.2018.8625151 10.1016/j.image.2009.07.002 10.1109/COMNET.2017.8285586 10.1109/TCSVT.2007.905530 10.1109/ICIMU.2011.6122767 10.1109/NCM.2008.259 10.1007/978-3-540-89796-5_51 10.1007/s00530-013-0326-0 10.1016/j.image.2012.06.005 10.1109/TMM.2018.2856629 10.1007/11922841_33 10.1109/TCSVT.2007.905532 10.1016/j.jvcir.2011.02.005 10.1109/ICCONS.2018.8663244 10.1016/j.dam.2016.06.028 10.1007/978-3-540-68127-4_37 10.1109/WCSP.2017.8170920 10.1007/s11042-014-2160-6 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/JIOT.2020.2997725 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2327-4662 |
| EndPage | 8942 |
| ExternalDocumentID | 10_1109_JIOT_2020_2997725 9099833 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: NSFC grantid: 61972366; 61502439 funderid: 10.13039/501100001809 – fundername: Open Funding of Guizhou Provincial Key Laboratory of Public Big Data grantid: 2018BDKFJJ009; 2017BDKFJJ006 – fundername: Major Scientific and Technological Special Project of Guizhou Province grantid: 20183001 |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c293t-9dbe36ba90343607f0aaecca5e9b497d959b8081c40ba7761d8275eee1af9c8b3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 11 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000571765000087&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2327-4662 |
| IngestDate | Sun Nov 09 07:07:14 EST 2025 Tue Nov 18 22:38:04 EST 2025 Sat Nov 29 06:16:51 EST 2025 Wed Aug 27 02:32:28 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 9 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c293t-9dbe36ba90343607f0aaecca5e9b497d959b8081c40ba7761d8275eee1af9c8b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-1164-0807 0000-0001-8590-1737 0000-0001-9208-5336 0000-0003-3411-7947 |
| PQID | 2444610481 |
| PQPubID | 2040421 |
| PageCount | 11 |
| ParticipantIDs | proquest_journals_2444610481 crossref_primary_10_1109_JIOT_2020_2997725 ieee_primary_9099833 crossref_citationtrail_10_1109_JIOT_2020_2997725 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-09-01 |
| PublicationDateYYYYMMDD | 2020-09-01 |
| PublicationDate_xml | – month: 09 year: 2020 text: 2020-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE internet of things journal |
| PublicationTitleAbbrev | JIoT |
| PublicationYear | 2020 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 wuille (ref23) 2012 ref12 reichel (ref25) 2010 ref14 reichel (ref5) 2005 ref11 ref2 ref17 ref16 ref19 wu (ref26) 2001; 4209 stütz (ref18) 2008 ref24 ref20 ref22 ref21 kim (ref15) 2007 index (ref1) 2017; 6 ref8 ref7 ref9 ref4 hue (ref10) 2017 ref3 ref6 |
| References_xml | – ident: ref24 doi: 10.1109/DESEC.2018.8625151 – ident: ref17 doi: 10.1016/j.image.2009.07.002 – ident: ref6 doi: 10.1109/COMNET.2017.8285586 – ident: ref4 doi: 10.1109/TCSVT.2007.905530 – year: 2012 ident: ref23 publication-title: Bip32 Hierarchical Deterministic Wallets – ident: ref7 doi: 10.1109/ICIMU.2011.6122767 – ident: ref14 doi: 10.1109/NCM.2008.259 – ident: ref16 doi: 10.1007/978-3-540-89796-5_51 – ident: ref11 doi: 10.1007/s00530-013-0326-0 – ident: ref19 doi: 10.1016/j.image.2012.06.005 – ident: ref8 doi: 10.1109/TMM.2018.2856629 – ident: ref12 doi: 10.1007/11922841_33 – start-page: 1 year: 2007 ident: ref15 article-title: A selective video encryption for the region of interest in scalable video coding publication-title: Proc TENCON IEEE Region 10 Conf – ident: ref3 doi: 10.1109/TCSVT.2007.905532 – ident: ref22 doi: 10.1016/j.jvcir.2011.02.005 – ident: ref9 doi: 10.1109/ICCONS.2018.8663244 – ident: ref21 doi: 10.1016/j.dam.2016.06.028 – start-page: 314 year: 2017 ident: ref10 article-title: HEVC based distributed scalable video coding for surveillance visual system publication-title: Proc 4th NAFOSTED Conf Inf Comput Sci – year: 2005 ident: ref5 publication-title: Joint Scalable Video Model (JSVM) 2 0 Reference Encoding Algorithm Description – ident: ref13 doi: 10.1007/978-3-540-68127-4_37 – start-page: 446 year: 2008 ident: ref18 article-title: Format-compliant encryption of H.264/AVC and SVC publication-title: Proc 10th IEEE Int Symp Multimedia – volume: 6 year: 2017 ident: ref1 article-title: Forecast and methodology, 2016-2021 – volume: 4209 start-page: 284 year: 2001 ident: ref26 article-title: Fast encryption methods for audiovisual data confidentiality publication-title: Proc Multimedia Syst Appl III – year: 2010 ident: ref25 article-title: Wien M. joint scalable video model JSVM-19 – ident: ref2 doi: 10.1109/WCSP.2017.8170920 – ident: ref20 doi: 10.1007/s11042-014-2160-6 |
| SSID | ssj0001105196 |
| Score | 2.267654 |
| Snippet | Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 8932 |
| SubjectTerms | Access control Algorithms Complexity Cryptography Encryption H.264/SVC hierarchical key management Internet of Things Internet of Things (IoT) layered access control layered encryption Multilayers Security Security management Static VAr compensators Streaming media Surveillance Surveillance systems User requirements Video coding Video compression Video data Video on demand Videoconferencing |
| Title | A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things |
| URI | https://ieeexplore.ieee.org/document/9099833 https://www.proquest.com/docview/2444610481 |
| Volume | 7 |
| WOSCitedRecordID | wos000571765000087&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library (IEL) (UW System Shared) customDbUrl: eissn: 2327-4662 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001105196 issn: 2327-4662 databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3BbtQwEB21FQcuFCiILQXNgRMiu0nsxJ7jsmq1QFWQKKi3yHFssVLJVtsUaU_8OmMnuxWiQurNB08U-dnjZ3tmHsAb0rqwhTBJzr4vkUb7xEgrE18KlRF55UxE-lSdnemLC_qyA--2uTDOuRh85sahGd_ym6W9CVdlE2I6o4XYhV2lyj5X6_Y-JQtkpBweLrOUJh8_fD7nA2CejtnlMoks_tp6opbKPw447ion-_f7n8fwaGCPOO3hfgI7rn0K-xtlBhwW6gH8nuJ8EVKLo9LJJR63drWOzgFN2-Ant8bbuBc2-8ENZPqKp2YdxDtxGnUUcdYHsiPbzcdMaiZfv8_w_aILGSbmJy5aZP6I_a2i63DpsdcBfQbfTo7PZ_NkkFpILO_3XUJN7URZG0qFFGWqfGpMALdwVEtSDRVUB40OK9Pa8OBnjc5VwQOSGU9W1-I57LXL1r0AzMh7zWYkJZ89fWECabLeC2GpUXk-gnSDQmWHOuRBDuOyiueRlKoAXBWAqwbgRvB2a3LVF-H4X-eDgNS24wDSCI42UFfDMr2umNuEevNSZ4d3W72Eh-HbfVDZEex1qxv3Ch7YX93ievU6zsA_gTPZtA |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Rb9MwED6NgQQvDBgThQH3wBMirRM7se-xVJs6VgoSBe0tchxbVBop6jKkPvHXsZ20EwIh8eYHnxLli-8-23f3AbwipXKTc51k3vclQiuXaGFE4gouUyInrY5Iz-R8ri4u6OMevNnVwlhrY_KZHYZhvMuvV-Y6HJWNyNMZxfktuJ0LkbGuWuvmRCUNdKTory5TRqN3Zx8WfguYsaF3up5G5r8Fn6im8ocLjnHl9OD_3ugB3O_5I447wB_Cnm0ewcFWmwH7pXoIP8c4XYbi4qh1coknjVlvontA3dR4bjd4k_nizb76AXoCizO9CfKdOI5KijjpUtnR202HntaMPn2Z4NtlG2pM9DdcNugZJHbnirbFlcNOCfQxfD49WUymSS-2kBgf8duE6sryotLEuOAFk45pHeDNLVWCZE05VUGlwwhWaSmLtFaZzP0HSbUjoyp-BPvNqrFPAFNyTnkzEsLvPl2uA20yznFuqJZZNgC2RaE0fSfyIIhxWcYdCaMyAFcG4MoeuAG83pl879pw_GvyYUBqN7EHaQDHW6jLfqFelZ7dhI7zQqVP_271Eu5OF-9n5exsfv4M7oXndClmx7Dfrq_tc7hjfrTLq_WL-Df-Avk83Ps |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Hierarchical+Encryption+and+Key+Management+Scheme+for+Layered+Access+Control+on+H.264%2FSVC+Bitstream+in+the+Internet+of+Things&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Xu%2C+Cheng&rft.au=Ren%2C+Wei&rft.au=Yu%2C+Linchen&rft.au=Zhu%2C+Tianqing&rft.date=2020-09-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2327-4662&rft.volume=7&rft.issue=9&rft.spage=8932&rft_id=info:doi/10.1109%2FJIOT.2020.2997725&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |