Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for improving the security of a content distribution network using SDN technology

A technology for content distribution network and security, which is applied in the field of improving the security of content distribution network. It can solve the problem that it is difficult to be attacked, does not consider the cost of restoring the original file by the file requester, and cannot support "playing while downloading and parsing while downloading, etc. problem, achieve the effect of reducing the number of connections and improving security

Active Publication Date: 2019-01-29
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the simple Shamir threshold technology cannot be directly applied to the content distribution network, because the client needs to download all t file fragments to the local to fully recover the original file. Therefore, if the cache server and the client host If the video or webpage files are transmitted between them, the mode of "play while downloading" or "parse while downloading" will not be supported
[0006] After research, we believe that the original Shamir threshold technology only considers the reliable storage and transmission of files, but does not consider the cost of the file requester to restore the original file. In order to solve the above problems, the original file can be split only during storage , before sending, the sender temporarily assembles the original file, so that the file requester can receive the complete file directly, but the following two points must be guaranteed: 1. The file requester and sender must confirm each other’s identity ; 2. It must be ensured that the complete file is difficult to be attacked during transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for improving the security of a content distribution network using SDN technology
  • A method and system for improving the security of a content distribution network using SDN technology
  • A method and system for improving the security of a content distribution network using SDN technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In view of one or more problems mentioned above, the present invention provides a method and system for improving the security of content distribution network by adopting SDN technology.

[0034] The invention includes m CDN servers, n cache servers, an SDN network and an SDN controller. The SDN network includes multiple paths interconnected by SDN switches, the SDN switches communicate with the SDN controller through the OpenFlow protocol, and both the CDN server and the cache server are connected to the SDN network.

[0035] The SDN controller holds a private key for encrypting outgoing messages, and the m CDN servers and clients accessing the SDN network hold a paired public key.

[0036] The present invention uses the Shamir threshold technology to split the original file into n cache servers. When the client tries to access the original file through the SDN network, the request sent will be forwarded to the SDN controller, and the request contains the unique identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for improving network security of a content delivery network by employing an SDN (Software Defined Network) technology. The system comprises multiple CDN (Content Delivery Network) servers, multiple cache servers, multiple SDN switches, an SDN controller and multiple SDN switches. The SDN controller receives an access request of a user for accessing an original file, generates a CDN server address message, encrypts the CDN server address message through a private key, sends the encrypted CDN server address message to the user, generates an access request message, and encrypts the access request message through the private key. The CDN server receives the encrypted access request message. The CDN server analyzes the encrypted access request message, obtains analyzed information, and compares the analyzed information with the information in the original access request message before encryption; if the information is the same, the CDN server obtains the original file from the cache server; the user analyzes the CDN server address message and compares the analyzed information with the information in the original CDN server address message before encryption; and if the information is the same, the original file is obtained from the CDN server.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and system for improving the security of a content distribution network by using SDN technology. Background technique [0002] Content Delivery Network (CDN) is a technology that sends files such as videos and web pages from a remote central server to multiple CDN servers. Users connect to the nearest CDN server through DNS and other methods, thereby reducing the load on the central server and enhancing the service quality perceived by users. However, in the content distribution network, security issues still need to be considered. If a single CDN server and users If the transmission path between them is attacked, it will easily lead to the leakage of the transmitted files. [0003] A commonly used technology to ensure file security is the Shamir threshold technology. Assuming that there are n participants, the participants can be cache servers that store files. The threshold v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/04H04L63/0414H04L67/06
Inventor 孙毅丁东辉邓波
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI