Font Size: a A A

Streaming Media System Authentication And Authorization Model Of The Design And Realization

Posted on:2011-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhangFull Text:PDF
GTID:2208360308467510Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The rapid development and popularization of the internet provide a strong market momentum for streaming media services, and streaming media service is becoming increasingly popular. Streaming media technology can make audio, video and other multimedia be real-timely played on the Internet without having to wait for being downloaded. By traditional multi-media technology, we have to wait the multimedia being completely downloaded to play. The emergence and development of streaming media technology promote the innovation of overall Internet structure, and enrich the performing forms of the traditional Internet content, while giving more broadband entertainment and interactive applications. The streaming media has become a new attractive media. Streaming media technology is now widely used in various aspects of Internet information services, such as multimedia news releasing, video on demand, distant education, online broadcasting, e-commerce, real-time video conferencing etc.The security of streaming media system is receiving more and more people's attention. Streaming media system is in a dynamic and open network environment, and in such environments, the identity authentication of system users and the access control at client and server end are the primary issues to ensure the security of the system because identity authentication and access management are the most basic requirements of network security. To verify the authenticity of the identity of network users is to ensure that the information resources of network can only be accessed by legitimate users. The article studies authentication and access control for streaming media system in depth, and its main work is as follows:(1) This article uses Kerberos authentication model which is based on TCP/IP networks for the identity authentication of streaming media system; the model is widely used in the distributed network to build a third-party authentication protocol. The new built model which is based on Kerberos authentication protocol for streaming media system includes security policy, authentication protocol, working models and authentication services. The new model was designed to solve user authentication issues arising from different streaming media systems. Moreover, the article has given the implementation of the model.(2) On the other hand, in order to fully ensure the system security, this paper designed an authorization management model for the members (server and client) of the streaming media system. The model is divided into client authorization management and streaming media server authorization management. This article constructed an access control model based on the XACML policy with the PMI for streaming media server. The model defines the strategy which integrates attribute certificate provided by the PMI and XACML language. The strategy mechanism is more flexible, and streaming media servers provide fine-grained access control for the object.(3) There was also a mutual trust attribute mechanism model which was based on the automated trust negotiation mechanism and attributes of entities to solve, the access control and authorization management for customers who come from different security domains.
Keywords/Search Tags:authentication, authorization management, XACML, Kerberos, automated trust negotiation, PMI
PDF Full Text Request
Related items