Abstract
With the explosive growth of multimedia data, Enterprise Multimedia Security (EMS) is a serious matter to maintain enterprise information security. As the rise of social media applications triggers higher bandwidth demand and shorter end-to-end delay requirements, edge computing has emerged as a promising technique to reduce delay. Edge servers are often deployed around mobile devices via a one-hop wireless network connection. However, migrating multimedia data over wireless networks to edge servers for edge computing is vulnerable to eavesdroppers. Ensuring the security of enterprise multimedia data in the edge computing is a top priority. To cater for the data security over wireless transmisson for edge computing, window-based fountain codes, is treated as a feasible technology to compensate this gap. Based on the characteristics of the fountain codes, data security over wireless transmisson is implemented only when the target receiver accumulates enough coding packets in advance of the eavesdropper. In the general wireless transmission, the eavesdropper receives data packets or not depends on whether the wireless channel lose packets. To ensure data security, we introduce the constellation-rotation technique and interfering noise into wireless signal which can disturb the eavesdropper’s signal quality and increase the packet loss in the eavesdropper. Specifically, we study how to partition the video streaming into windows, which takes the end-to-end delay into consideration while guaranteeing lower intercept probability which indicates the probability video data is leaked to the eavesdropper.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.