ijact-book-coverT

Securing the Edge: A Comprehensive Review of Adaptive Video Streaming Security Mechanisms in Decentralized Environments

© 2023 by IJACT

Volume 1 Issue 3

Year of Publication : 2023

Author : Koffka Khan

:10.56472/25838628/IJACT-V1I3P103

Citation :

Koffka Khan, 2023. "Securing the Edge: A Comprehensive Review of Adaptive Video Streaming Security Mechanisms in Decentralized Environments" ESP International Journal of Advancements in Computational Technology (ESP-IJACT)  Volume 1, Issue 3: 25-43.

Abstract :

The review paper explores the evolving landscape of security challenges and solutions in the realm of adaptive video streaming at the edge. As the demand for high-quality video content continues to surge, the decentralized nature of edge computing introduces unique security considerations. The paper comprehensively examines the vulnerabilities associated with adaptive video streaming at the edge, encompassing issues such as content piracy, privacy concerns, and the potential for malicious attacks. Furthermore, it critically evaluates existing security mechanisms and protocols, shedding light on their effectiveness in mitigating these challenges. Special attention is given to the intersection of edge computing and video streaming, emphasizing the need for adaptive security measures that can dynamically respond to varying network conditions and potential threats. Additionally, the review explores emerging technologies, such as blockchain and machine learning, and their applications in bolstering security at the edge. By providing a holistic overview of the current state of security in adaptive video streaming at the edge, this paper aims to guide future research efforts and inform industry practitioners on best practices for safeguarding the integrity, confidentiality, and availability of video content in dynamic edge environments.

References :

[1] Bakare, B.I. and Ekolama, S.M., 2021. Preventing man-in-the-middle (MITM) attack of GSM calls. European Journal of Electrical Engineering and Computer Science, 5(4), pp.63-68.

[2] Farahani, R., Shojafar, M., Timmerer, C., Tashtarian, F., Ghanbari, M. and Hellwagner, H., 2022. ARARAT: A Collaborative Edge-Assisted Framework for HTTP Adaptive Video Streaming. IEEE Transactions on Network and Service Management, 20(1), pp.625-643.

[3] Ghaznavi, M., Jalalpour, E., Salahuddin, M.A., Boutaba, R., Migault, D. and Preda, S., 2021. Content delivery network security: A survey. IEEE Communications Surveys & Tutorials, 23(4), pp.2166-2190.

[4] Guşatu, M. and Olimid, R.F., 2021, November. Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing. In International Conference on Information Technology and Communications Security (pp. 286-295). Cham: Springer International Publishing.

[5] Hou, X., Ren, Z., Wang, J., Cheng, W., Ren, Y., Chen, K.C. and Zhang, H., 2020. Reliable computation offloading for edge-computing-enabled software-defined IoV. IEEE Internet of Things Journal, 7(8), pp.7097-7111.

[6] Hua, H., Li, Y., Wang, T., Dong, N., Li, W. and Cao, J., 2023. Edge computing with artificial intelligence: A machine learning perspective. ACM Computing Surveys, 55(9), pp.1-35.

[7] Jin, X., Dang, F., Fu, Q.A., Li, L., Peng, G., Chen, X., Liu, K. and Liu, Y., 2022, October. StreamingTag: a scalable piracy tracking solution for mobile streaming services. In Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (pp. 596-608).

[8] Keshari, S.K., Kansal, V. and Kumar, S., 2021. A systematic review of quality of services (QoS) in software defined networking (SDN). Wireless Personal Communications, 116, pp.2593-2614.

[9] Khan K, Goodridge W. B-DASH: broadcast-based dynamic adaptive streaming over HTTP. International Journal of Autonomous and Adaptive Communications Systems. 2019;12(1):50-74.

[10] Khan K, Goodridge W. Future DASH applications: A survey. International Journal of Advanced Networking and Applications. 2018 Sep 1;10(2):3758-64.

[11] Khan K, Goodridge W. Markov Decision Processes for bitrate harmony in adaptive video streaming. In2017 Future Technologies Conference (FTC), Vancouver, Canada, unpublished.

[12] Khan K, Goodridge W. QoE evaluation of dynamic adaptive streaming over HTTP (DASH) with promising transport layer protocols: Transport layer protocol performance over HTTP/2 DASH. CCF Transactions on Networking. 2020 Dec;3(3-4):245-60.

[13] Khan K, Goodridge W. Rate oscillation breaks in HTTP on-off distributions: a DASH framework. International Journal of Autonomous and Adaptive Communications Systems. 2020;13(3):273-96.

[14] Khan K. A Framework for Meta-Learning in Dynamic Adaptive Streaming over HTTP. International Journal of Computing. 2023 Apr;12(2).

[15] Khan K. A Video Streaming in Industrial Internet of Things Taxonomy (VSIIoT), International Journal of Multidisciplinary Research and Publications, 2023 (pp. 148-164).

[16] Kumar, A., Banerjea, S., Jain, R. and Pandey, M., 2022. Software‐defined content delivery network at the edge for adaptive video streaming. International Journal of Network Management, 32(6), p.e2210.

[17] Lu, S., Lu, J., An, K., Wang, X. and He, Q., 2023. Edge computing on IoT for machine signal processing and fault diagnosis: A review. IEEE Internet of Things Journal.

[18] Mardian, R.D., Suryanegara, M. and Ramli, K., 2019, June. Measuring quality of service (QoS) and quality of experience (QoE) on 5G technology: A review. In 2019 IEEE International Conference on Innovative Research and Development (ICIRD) (pp. 1-6). IEEE.

[19] Phung, C.D., Silva, B.F., Nogueira, M. and Secci, S., 2019. MPTCP robustness against large-scale man-in-the-middle attacks. Computer Networks, 164, p.106896.

[20] Rahman, W.U., Hong, C.S. and Huh, E.N., 2019. Edge computing assisted joint quality adaptation for mobile video streaming. IEEE Access, 7, pp.129082-129094.

[21] Salva-Garcia, P., Alcaraz-Calero, J.M., Wang, Q., Arevalillo-Herráez, M. and Bernabe, J.B., 2020. Scalable virtual network video-optimizer for adaptive real-time video transmission in 5G networks. IEEE Transactions on Network and Service Management, 17(2), pp.1068-1081.

[22] Simpson, S.V. and Nagarajan, G., 2021. A fuzzy based co-operative blackmailing attack detection scheme for edge computing nodes in MANET-IOT environment. Future Generation Computer Systems, 125, pp.544-563.

[23] Sivasankari, N. and Kamalakkannan, S., 2022. Detection and prevention of man-in-the-middle attack in iot network using regression modeling. Advances in Engineering Software, 169, p.103126.

[24] Varyani, N., Zhang, Z.L. and Dai, D., 2020. QROUTE: An efficient quality of service (QoS) routing scheme for software-defined overlay networks. IEEE Access, 8, pp.104109-104126.

[25] Wang, X., Li, J., Ning, Z., Song, Q., Guo, L., Guo, S. and Obaidat, M.S., 2023. Wireless powered mobile edge computing networks: A survey. ACM Computing Surveys.

[26] Xu, W., Yang, Z., Ng, D.W.K., Levorato, M., Eldar, Y.C. and Debbah, M., 2023. Edge learning for B5G networks with distributed signal processing: Semantic communication, edge computing, and wireless sensing. IEEE journal of selected topics in signal processing, 17(1), pp.9-39.

[27] Zhang, D., Piao, M., Zhang, T., Chen, C. and Zhu, H., 2020. New algorithm of multi-strategy channel allocation for edge computing. AEU-International Journal of Electronics and Communications, 126, p.153372.

[28] Zhang, S., Wang, C., Jin, Y., Wu, J., Qian, Z., Xiao, M. and Lu, S., 2021. Adaptive configuration selection and bandwidth allocation for edge-based video analytics. IEEE/ACM Transactions on Networking, 30(1), pp.285-298.

[29] Zhao, J., Liang, P., Liufu, W. and Fan, Z., 2020. Recent developments in content delivery network: A survey. In Parallel Architectures, Algorithms and Programming: 10th International Symposium, PAAP 2019, Guangzhou, China, December 12–14, 2019, Revised Selected Papers 10 (pp. 98-106). Springer Singapore.

[30] Zolfaghari, B., Srivastava, G., Roy, S., Nemati, H.R., Afghah, F., Koshiba, T., Razi, A., Bibak, K., Mitra, P. and Rai, B.K., 2020. Content delivery networks: State of the art, trends, and future roadmap. ACM Computing Surveys (CSUR), 53(2), pp.1-34.

Keywords :

Adaptive Video Streaming, Edge, Piracy, Privacy, Malicious Attacks, Blockchain, Machine Learning.