A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things

Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming media services. Solutions such as the newly standardized H.264/SVC (scalable video coding; designed to compress original video bitstream into a...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE internet of things journal Ročník 7; číslo 9; s. 8932 - 8942
Hlavní autoři: Xu, Cheng, Ren, Wei, Yu, Linchen, Zhu, Tianqing, Choo, Kim-Kwang Raymond
Médium: Journal Article
Jazyk:angličtina
Vydáno: Piscataway IEEE 01.09.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Témata:
ISSN:2327-4662, 2327-4662
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming media services. Solutions such as the newly standardized H.264/SVC (scalable video coding; designed to compress original video bitstream into a multilayer video stream according to requirements) have been proposed. With the pervasive application of SVC in applications, such as video on demand, video conferencing, and video surveillance in the Internet of Things (IoT), there has been increased scrutiny on security of H.264/SVC. In this article, we propose a bitstream-oriented layered encryption scheme for SVC bitstream. According to the multilayer bit code structure of SVC, the bitstream is separated and encrypted, respectively, by rearranging the network abstraction layer (NAL) unit of SVC bitstream. This provides hierarchical protection for the multilayer characteristic of SVC. In order to provide sufficient security, as well as achieving improved computational efficiency, we use different cryptographic algorithms for the base layer and enhancement layers according to its requirements. The base layer adopts off-the-shelf high-security encryption algorithms, such as block cipher, to ensure security. Each enhancement layer is encrypted with a different key through the stream cipher with low computational complexity, providing layered control of the video. Furthermore, we propose a hierarchical key management scheme to implement layered access control according to the principle of hierarchical deterministic wallet (H-D wallet). Our scheme can be applied to the user-level distinction in video on demand and video surveillance systems in IoT. The analysis and experiments indicate that the proposed scheme achieves a high-security level, yet incurs reasonably low compression cost and computational complexity.
AbstractList Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming media services. Solutions such as the newly standardized H.264/SVC (scalable video coding; designed to compress original video bitstream into a multilayer video stream according to requirements) have been proposed. With the pervasive application of SVC in applications, such as video on demand, video conferencing, and video surveillance in the Internet of Things (IoT), there has been increased scrutiny on security of H.264/SVC. In this article, we propose a bitstream-oriented layered encryption scheme for SVC bitstream. According to the multilayer bit code structure of SVC, the bitstream is separated and encrypted, respectively, by rearranging the network abstraction layer (NAL) unit of SVC bitstream. This provides hierarchical protection for the multilayer characteristic of SVC. In order to provide sufficient security, as well as achieving improved computational efficiency, we use different cryptographic algorithms for the base layer and enhancement layers according to its requirements. The base layer adopts off-the-shelf high-security encryption algorithms, such as block cipher, to ensure security. Each enhancement layer is encrypted with a different key through the stream cipher with low computational complexity, providing layered control of the video. Furthermore, we propose a hierarchical key management scheme to implement layered access control according to the principle of hierarchical deterministic wallet (H-D wallet). Our scheme can be applied to the user-level distinction in video on demand and video surveillance systems in IoT. The analysis and experiments indicate that the proposed scheme achieves a high-security level, yet incurs reasonably low compression cost and computational complexity.
Author Yu, Linchen
Ren, Wei
Xu, Cheng
Zhu, Tianqing
Choo, Kim-Kwang Raymond
Author_xml – sequence: 1
  givenname: Cheng
  orcidid: 0000-0003-1164-0807
  surname: Xu
  fullname: Xu, Cheng
  organization: School of Computer Science, China University of Geosciences, Wuhan, China
– sequence: 2
  givenname: Wei
  orcidid: 0000-0001-8590-1737
  surname: Ren
  fullname: Ren, Wei
  email: weirencs@cug.edu.cn
  organization: School of Computer Science, China University of Geosciences, Wuhan, China
– sequence: 3
  givenname: Linchen
  surname: Yu
  fullname: Yu, Linchen
  organization: School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China
– sequence: 4
  givenname: Tianqing
  orcidid: 0000-0003-3411-7947
  surname: Zhu
  fullname: Zhu, Tianqing
  organization: School of Computer Science, China University of Geosciences, Wuhan, China
– sequence: 5
  givenname: Kim-Kwang Raymond
  orcidid: 0000-0001-9208-5336
  surname: Choo
  fullname: Choo, Kim-Kwang Raymond
  organization: Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA
BookMark eNp9kD1v2zAQhokiBZqm-QFFlwM62-GXRHF0jSR26yBD3K7CiTrFDGzSJZnBU_56ZTgoig6Z7h3uuffwfGRnIQZi7LPgUyG4vfq-vF9PJZd8Kq01Rlbv2LlU0kx0Xcuzf_IHdpnzE-d8xCph63P2MoOFp4TJbbzDLVwHlw774mMADD38oAPcYcBH2lEo8OA2Y4AhJljhgRL1MHOOcoZ5DCXFLYzcYiprffXwaw7ffMklEe7ABygbgmUolAIViAOsNz485k_s_YDbTJev84L9vLlezxeT1f3tcj5bTZy0qkxs35GqO7RcaVVzM3BEcg4rsp22preV7RreCKd5h8bUom-kqYhI4GBd06kL9vV0d5_i72fKpX2KzymMla3UWteC60aMW-K05VLMOdHQ7pPfYTq0grdH1e1RdXtU3b6qHhnzH-N8waPBktBv3yS_nEg_Pvq3yXJrG6XUH6d9jT4
CODEN IITJAU
CitedBy_id crossref_primary_10_1109_TVT_2021_3094806
crossref_primary_10_1007_s12083_024_01733_8
crossref_primary_10_1155_2021_8653083
crossref_primary_10_1080_09720529_2021_2011099
crossref_primary_10_1002_ett_4379
crossref_primary_10_3390_s21134419
crossref_primary_10_1109_ACCESS_2025_3546618
crossref_primary_10_3390_electronics12214542
Cites_doi 10.1109/DESEC.2018.8625151
10.1016/j.image.2009.07.002
10.1109/COMNET.2017.8285586
10.1109/TCSVT.2007.905530
10.1109/ICIMU.2011.6122767
10.1109/NCM.2008.259
10.1007/978-3-540-89796-5_51
10.1007/s00530-013-0326-0
10.1016/j.image.2012.06.005
10.1109/TMM.2018.2856629
10.1007/11922841_33
10.1109/TCSVT.2007.905532
10.1016/j.jvcir.2011.02.005
10.1109/ICCONS.2018.8663244
10.1016/j.dam.2016.06.028
10.1007/978-3-540-68127-4_37
10.1109/WCSP.2017.8170920
10.1007/s11042-014-2160-6
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/JIOT.2020.2997725
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 8942
ExternalDocumentID 10_1109_JIOT_2020_2997725
9099833
Genre orig-research
GrantInformation_xml – fundername: NSFC
  grantid: 61972366; 61502439
  funderid: 10.13039/501100001809
– fundername: Open Funding of Guizhou Provincial Key Laboratory of Public Big Data
  grantid: 2018BDKFJJ009; 2017BDKFJJ006
– fundername: Major Scientific and Technological Special Project of Guizhou Province
  grantid: 20183001
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c293t-9dbe36ba90343607f0aaecca5e9b497d959b8081c40ba7761d8275eee1af9c8b3
IEDL.DBID RIE
ISICitedReferencesCount 11
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000571765000087&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2327-4662
IngestDate Sun Nov 09 07:07:14 EST 2025
Tue Nov 18 22:38:04 EST 2025
Sat Nov 29 06:16:51 EST 2025
Wed Aug 27 02:32:28 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 9
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-9dbe36ba90343607f0aaecca5e9b497d959b8081c40ba7761d8275eee1af9c8b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-1164-0807
0000-0001-8590-1737
0000-0001-9208-5336
0000-0003-3411-7947
PQID 2444610481
PQPubID 2040421
PageCount 11
ParticipantIDs proquest_journals_2444610481
crossref_primary_10_1109_JIOT_2020_2997725
ieee_primary_9099833
crossref_citationtrail_10_1109_JIOT_2020_2997725
PublicationCentury 2000
PublicationDate 2020-09-01
PublicationDateYYYYMMDD 2020-09-01
PublicationDate_xml – month: 09
  year: 2020
  text: 2020-09-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2020
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
wuille (ref23) 2012
ref12
reichel (ref25) 2010
ref14
reichel (ref5) 2005
ref11
ref2
ref17
ref16
ref19
wu (ref26) 2001; 4209
stütz (ref18) 2008
ref24
ref20
ref22
ref21
kim (ref15) 2007
index (ref1) 2017; 6
ref8
ref7
ref9
ref4
hue (ref10) 2017
ref3
ref6
References_xml – ident: ref24
  doi: 10.1109/DESEC.2018.8625151
– ident: ref17
  doi: 10.1016/j.image.2009.07.002
– ident: ref6
  doi: 10.1109/COMNET.2017.8285586
– ident: ref4
  doi: 10.1109/TCSVT.2007.905530
– year: 2012
  ident: ref23
  publication-title: Bip32 Hierarchical Deterministic Wallets
– ident: ref7
  doi: 10.1109/ICIMU.2011.6122767
– ident: ref14
  doi: 10.1109/NCM.2008.259
– ident: ref16
  doi: 10.1007/978-3-540-89796-5_51
– ident: ref11
  doi: 10.1007/s00530-013-0326-0
– ident: ref19
  doi: 10.1016/j.image.2012.06.005
– ident: ref8
  doi: 10.1109/TMM.2018.2856629
– ident: ref12
  doi: 10.1007/11922841_33
– start-page: 1
  year: 2007
  ident: ref15
  article-title: A selective video encryption for the region of interest in scalable video coding
  publication-title: Proc TENCON IEEE Region 10 Conf
– ident: ref3
  doi: 10.1109/TCSVT.2007.905532
– ident: ref22
  doi: 10.1016/j.jvcir.2011.02.005
– ident: ref9
  doi: 10.1109/ICCONS.2018.8663244
– ident: ref21
  doi: 10.1016/j.dam.2016.06.028
– start-page: 314
  year: 2017
  ident: ref10
  article-title: HEVC based distributed scalable video coding for surveillance visual system
  publication-title: Proc 4th NAFOSTED Conf Inf Comput Sci
– year: 2005
  ident: ref5
  publication-title: Joint Scalable Video Model (JSVM) 2 0 Reference Encoding Algorithm Description
– ident: ref13
  doi: 10.1007/978-3-540-68127-4_37
– start-page: 446
  year: 2008
  ident: ref18
  article-title: Format-compliant encryption of H.264/AVC and SVC
  publication-title: Proc 10th IEEE Int Symp Multimedia
– volume: 6
  year: 2017
  ident: ref1
  article-title: Forecast and methodology, 2016-2021
– volume: 4209
  start-page: 284
  year: 2001
  ident: ref26
  article-title: Fast encryption methods for audiovisual data confidentiality
  publication-title: Proc Multimedia Syst Appl III
– year: 2010
  ident: ref25
  article-title: Wien M. joint scalable video model JSVM-19
– ident: ref2
  doi: 10.1109/WCSP.2017.8170920
– ident: ref20
  doi: 10.1007/s11042-014-2160-6
SSID ssj0001105196
Score 2.2677522
Snippet Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 8932
SubjectTerms Access control
Algorithms
Complexity
Cryptography
Encryption
H.264/SVC
hierarchical key management
Internet of Things
Internet of Things (IoT)
layered access control
layered encryption
Multilayers
Security
Security management
Static VAr compensators
Streaming media
Surveillance
Surveillance systems
User requirements
Video coding
Video compression
Video data
Video on demand
Videoconferencing
Title A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things
URI https://ieeexplore.ieee.org/document/9099833
https://www.proquest.com/docview/2444610481
Volume 7
WOSCitedRecordID wos000571765000087&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Xplore
  customDbUrl:
  eissn: 2327-4662
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001105196
  issn: 2327-4662
  databaseCode: RIE
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5UPHjxLdYXc_Akbrvv3TnWotQHVbBKb0uSTbCgW6mr0JN_3SS7bRFF8JZDZlny5fFNMjMfwLEnfSVjJhzzJqQdFBE5nNLIUeQrngeklOBWbCLp9dLBgO4W4HSWCyOltMFnsmma9i0_H4l3c1XWIk1n0iBYhMUkiatcrfl9imfISFw_XHouta4ub_vaAfTdpt5yNYmMvh09VkvlxwZsT5WLtf_9zzqs1uwR2xXcG7Agi01YmyozYL1Qt-Czjd2hSS22SifPeF6I8cRuDsiKHK_lBOdxL9rsSTdQ01e8YRMj3oltq6OInSqQHbVdt6lJTev-sYNnw9JkmLAXHBao-SNWt4qyxJHCSgd0Gx4uzvudrlNLLThCn_elQzmXQcwZuUEYxG6iXMYMuJEkHlKSU0TcaHSI0OVMD76Xp34S6QHxmCKR8mAHlopRIXcBvdj3c6FYmnIKfcaYxyMSuQwFRdo5SxrgTlHIRF2H3MhhPGfWH3EpM8BlBrisBq4BJzOT16oIx1-dtwxSs441SA04mEKd1cv0LdPcxtSbD1Nv73erfVgx366Cyg5gqRy_y0NYFh_l8G18ZGfgF0M72t8
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fT9swED4xmDReBhtDdOPHPfA0La3zw0nusatABboyad3EW2Q7tlaJpVMJk_rEv47tpEVoCIk3P_iUKF9sf3e-uw_gONSR0alQgbsTsg6K4oGknAeGIiPLmIxR0otNZONxfnVF39fgy6oWRmvtk8901w39XX45U7cuVNYjS2fyOH4FGzxJItZUaz1EVEJHR9L26jJk1Ds_u5xYFzBiXbvpWhrJHx0-Xk3lvy3YnyunWy97o2142_JH7DeAv4M1Xb2HraU2A7ZLdQfu-jicuuJir3VyjSeVmi_89oCiKvFCL_Ah88Wa_bYDtAQWR2Lh5Dux75UUcdCksqO1G3Ytren9-DXAr9Pa1ZiIPzit0DJIbOKKusaZwUYJ9AP8PD2ZDIZBK7YQKHvi1wGVUsepFMTiJE5ZZpgQDl6uSSaUlcRJOpUOlTApsiwNyzzKuP0goTCkchnvwno1q_QeYJhGUamMyHNJSSSECCUnVepEEbfuWdYBtkShUG0ncieIcV14j4RR4YArHHBFC1wHPq9M_jZtOJ6bvOOQWk1sQerA_hLqol2oN4VlN67jfJKHH5-2OoI3w8m3UTE6G198gk33nCbFbB_W6_mtPoDX6l89vZkf-r_xHssI3iY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Hierarchical+Encryption+and+Key+Management+Scheme+for+Layered+Access+Control+on+H.264%2FSVC+Bitstream+in+the+Internet+of+Things&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Xu%2C+Cheng&rft.au=Ren%2C+Wei&rft.au=Yu%2C+Linchen&rft.au=Zhu%2C+Tianqing&rft.date=2020-09-01&rft.pub=IEEE&rft.eissn=2327-4662&rft.volume=7&rft.issue=9&rft.spage=8932&rft.epage=8942&rft_id=info:doi/10.1109%2FJIOT.2020.2997725&rft.externalDocID=9099833
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon