Resource thrifty secure mobile video transfers on open WiFi networks

George Papageorgiou, John Gasparis, Srikanth V. Krishnamurthy, Ramesh Govindan, Thomas F. La Porta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75% and the energy consumption by as much as 92%.

Original languageEnglish (US)
Title of host publicationCoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies
PublisherAssociation for Computing Machinery
Pages333-344
Number of pages12
ISBN (Print)9781450321013
DOIs
StatePublished - Jan 1 2013
Event2013 9th ACM International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2013 - Santa Barbara, CA, United States
Duration: Dec 9 2013Dec 12 2013

Publication series

NameCoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies

Other

Other2013 9th ACM International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2013
CountryUnited States
CitySanta Barbara, CA
Period12/9/1312/12/13

Fingerprint

Cryptography
Smartphones
Mobile devices
Energy utilization
Processing
Costs
Experiments

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Papageorgiou, G., Gasparis, J., Krishnamurthy, S. V., Govindan, R., & La Porta, T. F. (2013). Resource thrifty secure mobile video transfers on open WiFi networks. In CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies (pp. 333-344). (CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies). Association for Computing Machinery. https://doi.org/10.1145/2535372.2535389
Papageorgiou, George ; Gasparis, John ; Krishnamurthy, Srikanth V. ; Govindan, Ramesh ; La Porta, Thomas F. / Resource thrifty secure mobile video transfers on open WiFi networks. CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies. Association for Computing Machinery, 2013. pp. 333-344 (CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies).
@inproceedings{b9fa19ae0a4b4d3d9cc7e467c5a953ee,
title = "Resource thrifty secure mobile video transfers on open WiFi networks",
abstract = "Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75{\%} and the energy consumption by as much as 92{\%}.",
author = "George Papageorgiou and John Gasparis and Krishnamurthy, {Srikanth V.} and Ramesh Govindan and {La Porta}, {Thomas F.}",
year = "2013",
month = "1",
day = "1",
doi = "10.1145/2535372.2535389",
language = "English (US)",
isbn = "9781450321013",
series = "CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies",
publisher = "Association for Computing Machinery",
pages = "333--344",
booktitle = "CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies",

}

Papageorgiou, G, Gasparis, J, Krishnamurthy, SV, Govindan, R & La Porta, TF 2013, Resource thrifty secure mobile video transfers on open WiFi networks. in CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies. CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies, Association for Computing Machinery, pp. 333-344, 2013 9th ACM International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2013, Santa Barbara, CA, United States, 12/9/13. https://doi.org/10.1145/2535372.2535389

Resource thrifty secure mobile video transfers on open WiFi networks. / Papageorgiou, George; Gasparis, John; Krishnamurthy, Srikanth V.; Govindan, Ramesh; La Porta, Thomas F.

CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies. Association for Computing Machinery, 2013. p. 333-344 (CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Resource thrifty secure mobile video transfers on open WiFi networks

AU - Papageorgiou, George

AU - Gasparis, John

AU - Krishnamurthy, Srikanth V.

AU - Govindan, Ramesh

AU - La Porta, Thomas F.

PY - 2013/1/1

Y1 - 2013/1/1

N2 - Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75% and the energy consumption by as much as 92%.

AB - Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75% and the energy consumption by as much as 92%.

UR - http://www.scopus.com/inward/record.url?scp=84893426043&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84893426043&partnerID=8YFLogxK

U2 - 10.1145/2535372.2535389

DO - 10.1145/2535372.2535389

M3 - Conference contribution

AN - SCOPUS:84893426043

SN - 9781450321013

T3 - CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies

SP - 333

EP - 344

BT - CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies

PB - Association for Computing Machinery

ER -

Papageorgiou G, Gasparis J, Krishnamurthy SV, Govindan R, La Porta TF. Resource thrifty secure mobile video transfers on open WiFi networks. In CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies. Association for Computing Machinery. 2013. p. 333-344. (CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies). https://doi.org/10.1145/2535372.2535389