By Topic

The design and implementation of a music broadcasting system via IP multicast with user-authentication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Uehara, T. ; Center for Inf. Technol., Kyoto Univ., Japan ; Sato, T. ; Yamaoka, K.

This paper presents the design and implementation of a pay-broadcasting system which can supply the contents to support a number of clients simultaneously on the Internet. The authors have surveyed user-authentication methods on IP multicasting are compared under the constraint that the system should be constructed without any specific hardware for user identification, and it also must be installed without any changes on the network infrastructure of the Internet. To support scalable number of users, the contents of the system should be supplied to the users as the same data-stream. To keep the security of the contents, the encrypted single data-stream should be decoded by different keys individually distributed to the authorized users. Broadcasting encryption and tracing traitors schemes proposed by Naor et al. are considered to be suitable to realize such system. As a prototype of the system, a music broadcasting system named "MusicCast/AS" was implemented with user-authentication on IP multicasting. Its server and clients are implemented as software running on common Linux systems and the system do not need any changes in the existing campus network as a testbed. The practicality of the methodology was verified by the experimentation to broadcast encrypted music data to the campus network. The scalablity of the users and security of the keys are also discussed on the implementation.

Published in:

Communications, Computers and signal Processing, 2003. PACRIM. 2003 IEEE Pacific Rim Conference on  (Volume:2 )

Date of Conference:

28-30 Aug. 2003