TY - GEN
T1 - Resource thrifty secure mobile video transfers on open WiFi networks
AU - Papageorgiou, George
AU - Gasparis, John
AU - Krishnamurthy, Srikanth V.
AU - Govindan, Ramesh
AU - Porta, Tom La
PY - 2013
Y1 - 2013
N2 - Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75% and the energy consumption by as much as 92%.
AB - Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75% and the energy consumption by as much as 92%.
UR - http://www.scopus.com/inward/record.url?scp=84893426043&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893426043&partnerID=8YFLogxK
U2 - 10.1145/2535372.2535389
DO - 10.1145/2535372.2535389
M3 - Conference contribution
AN - SCOPUS:84893426043
SN - 9781450321013
T3 - CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies
SP - 333
EP - 344
BT - CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies
PB - Association for Computing Machinery
T2 - 2013 9th ACM International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2013
Y2 - 9 December 2013 through 12 December 2013
ER -