{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:46Z","timestamp":1740149026986,"version":"3.37.3"},"reference-count":35,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T00:00:00Z","timestamp":1629936000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2019-0-01601"],"award-info":[{"award-number":["2019-0-01601"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,8,26]]},"abstract":"<jats:p>MPEG-DASH is a video streaming standard that outlines protocols for sending audio and video content from a server to a client over HTTP. However, it creates an opportunity for an adversary to invade users\u2019 privacy. While a user is watching a video, information is leaked in the form of meta-data, the size of data and the time the server sent the data to the user. After a fingerprint of this data is created, the adversary can use this to identify whether a target user is watching the corresponding video. Only one defense strategy has been proposed to deal with this problem: differential privacy that adds sufficient noise in order to muddle the attacks. However, that strategy still suffers from the trade-off between privacy and efficiency. This paper proposes a novel defense strategy against the attacks with rigorous privacy and performance goals creating a private, scalable solution. Our algorithm, \u201cNo Data are Alone\u201d (NDA), is highly efficient. The experimental results show that our scheme is more than two times efficient in terms of excess downloaded video (represented as waste) compared to the most efficient differential privacy-based scheme. Additionally, no classifier can achieve an accuracy above 7.07% against videos obfuscated with our scheme.<\/jats:p>","DOI":"10.1155\/2021\/4702469","type":"journal-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T19:50:11Z","timestamp":1630093811000},"page":"1-14","source":"Crossref","is-referenced-by-count":0,"title":["Efficient yet Robust Privacy Preservation for MPEG-DASH-Based Video Streaming"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6912-3637","authenticated-orcid":true,"given":"Luke","family":"Cranfill","sequence":"first","affiliation":[{"name":"Information and Intelligent Security Lab, Kennesaw State University, Marietta, GA 30060, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1650-0902","authenticated-orcid":true,"given":"Jeehyeong","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Electronics Technology Institute, Seongnam-si, Gyeonggi-do 13509, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4909-9027","authenticated-orcid":true,"given":"Hongkyu","family":"Lee","sequence":"additional","affiliation":[{"name":"Information and Intelligent Security Lab, Kennesaw State University, Marietta, GA 30060, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1887-6396","authenticated-orcid":true,"given":"Victor Youdom","family":"Kemmoe","sequence":"additional","affiliation":[{"name":"Information and Intelligent Security Lab, Kennesaw State University, Marietta, GA 30060, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1847-6088","authenticated-orcid":true,"given":"Sunghyun","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hanyang University, Ansan, Gyeonggi-do 15588, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6206-083X","authenticated-orcid":true,"given":"Junggab","family":"Son","sequence":"additional","affiliation":[{"name":"Information and Intelligent Security Lab, Kennesaw State University, Marietta, GA 30060, USA"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/mmul.2011.71"},{"first-page":"1357","article-title":"Beauty and the burst: Remote identification of encrypted video streams","author":"R. Schuster","key":"2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2019.2906568"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc.2016.7444944"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2730819"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2015.2418194"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23210"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813645"},{"first-page":"735","article-title":"Differentially private aggregation of distributed time-series with transformation and encryption","author":"V. Rastogi","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079321"},{"key":"11","unstructured":"ArthurD.VassilvitskiiS.K-means++: the advantages of careful seeding2006Stanford, CA, USAStanford UniversityTechnical report"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00202-1_24"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"first-page":"245","article-title":"Is anybody home? inferring activity from smart home network traffic","author":"B. Copos","key":"14"},{"key":"15","unstructured":"KennedyS. M.Encrypted traffic analysis on smart speakers with deep learning2019Cincinnati, OH, USAUniversity of CincinnatiPh.D. thesis"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2737970"},{"first-page":"506","article-title":"Profiliot: a machine learning approach for iot device identification based on network traffic analysis","author":"M. Yair","key":"17"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2020.2969015","article-title":"Traffic fingerprinting attacks on internet of things using machine learning","volume":"8","author":"M. Skowron","year":"2020","journal-title":"IEEE Access"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2016.7524528"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2551203"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.23919\/tst.2017.8195352"},{"first-page":"42","article-title":"Website fingerprinting attack on psiphon and its forensic analysis","author":"T. G. Ejeta","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/iciot48696.2020.9089497"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.09.008"},{"key":"25","first-page":"15","article-title":"Fingerprinting attack on tor anonymity using deep learning","volume":"42","author":"K. Abe","year":"2016","journal-title":"Proceedings of the Asia-Pacific Advanced Network"},{"first-page":"213","article-title":"The DUSTER attack: Tor onion service attribution based on flow watermarking with track hiding","author":"A. Iacovazzi","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/spw.2019.00047"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1744"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2019.8885429"},{"issue":"1","key":"30","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/TIFS.2017.2737970","article-title":"Robust smartphone app identification via encrypted network traffic analysis","volume":"13","author":"V. F. Taylor","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/mitp.2018.2876988"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"first-page":"1375","article-title":"Walkie-talkie: an efficient defense against passive website fingerprinting attacks","author":"T. Wang","key":"33"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2018.00018"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2799820"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4702469.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4702469.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4702469.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T19:50:20Z","timestamp":1630093820000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/4702469\/"}},"subtitle":[],"editor":[{"given":"Feng","family":"Xue","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,8,26]]},"references-count":35,"alternative-id":["4702469","4702469"],"URL":"https:\/\/doi.org\/10.1155\/2021\/4702469","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,8,26]]}}}