請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/89992
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 張瑞益 | zh_TW |
dc.contributor.advisor | Ray-I Chang | en |
dc.contributor.author | 魏廉臻 | zh_TW |
dc.contributor.author | Lien-Chen Wei | en |
dc.date.accessioned | 2023-09-22T16:58:21Z | - |
dc.date.available | 2023-11-09 | - |
dc.date.copyright | 2023-09-22 | - |
dc.date.issued | 2023 | - |
dc.date.submitted | 2023-08-10 | - |
dc.identifier.citation | Chang, R.-I., Chu, Y.-H., Wei, L.-C., & Wang, C.-H. (2020). Bounded-error-pruned sensor data compression for energy-efficient IoT of environmental intelligence. Applied Sciences, 10(18), 6512.
Chang, R.-I., Wei, T.-T., & Wang, C.-H. (2015). A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systems. Electronic Commerce Research, 15(1), 49-71. doi: 10.1007/s10660-015-9176-5 Alloulah, M., & Huang, H. (2019). Future millimeter-wave indoor systems: A blueprint for joint communication and sensing. Computer, 52(7), 16-24. Savazzi, S., Sigg, S., Vicentini, F., Kianoush, S., & Findling, R. (2019). On the use of stray wireless signals for sensing: A look beyond 5G for the next generation of industry. Computer, 52(7), 25-36. Satyanarayanan, M., & Davies, N. (2019). Augmenting cognition through edge computing. Computer, 52(7), 37-46. Gao, N., Shao, W., & Salim, F. D. (2019). Predicting personality traits from physical activity intensity. Computer, 52(7), 47-56. Tariq, N., Asim, M., Al-Obeidat, F., Zubair Farooqi, M., Baker, T., Hammoudeh, M., & Ghafir, I. (2019). The security of big data in fog-enabled IoT applications including blockchain: A survey. Sensors, 19(8), 1788. Gill, S. S., Tuli, S., Xu, M., Singh, I., Singh, K. V., Lindsay, D., . . . Jain, U. (2019). Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges. Internet of Things, 8, 100118. Mohan, A., Gauen, K., Lu, Y. H., Li, W. W., & Chen, X. (2017, 28-31 May 2017). Internet of video things in 2030: A world with many cameras. Paper presented at the 2017 IEEE International Symposium on Circuits and Systems (ISCAS). Nabeeh, N. A., Abdel-Basset, M., El-Ghareeb, H. A., & Aboelfetouh, A. (2019). Neutrosophic multi-criteria decision making approach for iot-based enterprises. IEEE Access, 7, 59559-59574. Fang, S., Da Xu, L., Zhu, Y., Ahati, J., Pei, H., Yan, J., & Liu, Z. (2014). An integrated system for regional environmental monitoring and management based on internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1596-1605. Li, N., Sun, M., Bi, Z., Su, Z., & Wang, C. (2014). A new methodology to support group decision-making for IoT-based emergency response systems. Information systems frontiers, 16, 953-977. Liang, Y., & Peng, W. (2010). Minimizing energy consumptions in wireless sensor networks via two-modal transmission. ACM SIGCOMM Computer Communication Review, 40(1), 12-18. Chang, R.-I., Li, M.-H., Chuang, P., & Lin, J.-W. (2017). Bounded error data compression and aggregation in wireless sensor networks Smart Sensors Networks (pp. 143-157): Elsevier. Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014), 1-32. Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395-411. Ashi, Z., Al-Fawa'reh, M., & Al-Fayoumi, M. (2020). Fog computing: security challenges and countermeasures. International Journal of Computer Applications, 175, 30-36. doi: 10.5120/ijca2020920648 Le, T., & Liu, Y. (2010, 6-10 Dec. 2010). Opportunistic Overlay Multicast in Wireless Networks. Paper presented at the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010. Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203-209. Vincent, O. R., Folorunso, O., & Akinde, A. (2010). Improving e-payment security using elliptic curve cryptosystem. Electronic Commerce Research, 10, 27-41. Wei, T.-T., Wang, C.-H., Chu, Y.-H., & Chang, R.-I. (2012). A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services. International Journal of Digital Multimedia Broadcasting, 2012, 540801. doi: 10.1155/2012/540801 Anderson, C. (2004). The long tail. Retrieved May 31, 2009, from http://www.wired.com/wired/archive/12.10/tail.html?pg=1&topic=tail Bilgin, A., Marcellin, M. W., & Altbach, M. I. (2003). Compression of electrocardiogram signals using JPEG2000. IEEE Transactions on Consumer Electronics, 49(4), 833-840. Li, H.-S., Chuang, C.-C., Lin, C.-C., Chang, R.-I., Wang, C.-H., & Hsieh, C.-C. (2011). Data Compression for Energy Efficient Communication on Ubiquitous Sensor Networks. Journal of Applied Science and Engineering, 14(3), 245-254. doi: 10.6180/jase.2011.14.3.08 Lin, C.-C., Chuang, C.-C., Chiang, C.-W., & Chang, R.-I. (2010). A novel data compression method using improved JPEG-LS in wireless sensor networks. Paper presented at the 2010 The 12th International Conference on Advanced Communication Technology (ICACT). Bendifallah, A., Benzid, R., & Boulemden, M. (2011). Improved ECG compression method using discrete cosine transform. Electronics letters, 47(2), 1. Chen, J., Ma, J., Zhang, Y., & Shi, X. (2006). A wavelet-based ECG compression algorithm using Golomb codes. Paper presented at the 2006 International Conference on Communications, Circuits and Systems. Fang, J., & Li, H. (2009). Hyperplane-based vector quantization for distributed estimation in wireless sensor networks. IEEE Transactions on Information Theory, 55(12), 5682-5699. Wang, Y.-C., Hsieh, Y.-Y., & Tseng, Y.-C. (2009). Multiresolution spatial and temporal coding in a wireless sensor network for long-term monitoring applications. IEEE Transactions on Computers, 58(6), 827-838. Kawahara, M., Yi-Jen, C., & Berger, T. (1998, 30 March-1 April 1998). High-speed software implementation of Huffman coding. Paper presented at the Proceedings DCC '98 Data Compression Conference (Cat. No.98TB100225). Marcelloni, F., & Vecchio, M. (2008). A simple algorithm for data compression in wireless sensor networks. IEEE communications letters, 12(6), 411-413. Javed, M., & Nadeem, A. (2000). Data compression through adaptive Huffman coding schemes (Vol. 2). Tharini, C., & Ranjan, P. V. (2009). Design of modified adaptive Huffman data compression algorithm for wireless sensor network. Journal of Computer Science, 5(6), 466. Huang, N. Y., Lin, C. C., Chuang, C. C., & Chang, R. I. (2010). Lossless compression for low correlation data in wireless sensor networks. Paper presented at the In Proceedings of the Workshop on Wireless Ad Hoc and Sensor Network, Wisla, Poland, 18–20 October 2010. Luo, H., Liu, Y., & Das, S. K. (2006). Routing correlated data with fusion cost in wireless sensor networks. IEEE Transactions on Mobile Computing, 5(11), 1620-1632. Luo, H., Luo, J., Liu, Y., & Das, S. K. (2006). Adaptive data fusion for energy efficient routing in wireless sensor networks. IEEE Transactions on Computers, 55(10), 1286-1299. Kumar, R., Wolenetz, M., Agarwalla, B., Shin, J., Hutto, P., Paul, A., & Ramachandran, U. (2003). DFuse: A framework for distributed data fusion. Paper presented at the Proceedings of the 1st international conference on Embedded networked sensor systems. Jin, G.-y., & Park, M.-S. (2006). CAC: Context adaptive clustering for efficient data aggregation in wireless sensor networks. Paper presented at the NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems: 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006. Proceedings 5. Lee, S., Yoo, J., & Chung, T. (2004). Distance-based energy efficient clustering for wireless sensor networks. Paper presented at the 29th Annual IEEE International Conference on Local Computer Networks. Yoon, S., & Shahabi, C. (2007). The clustered aggregation (cag) technique leveraging spatial and temporal correlations in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 3(1), 3-es. Goel, S., & Imielinski, T. (2001). Prediction-based monitoring in sensor networks: taking lessons from MPEG. ACM SIGCOMM Computer Communication Review, 31(5), 82-98. Choi, K., Kim, M.-h., Chae, K.-J., Park, J.-J., & Joo, S.-S. (2009). An efficient data fusion and assurance mechanism using temporal and spatial correlations for home automation networks. IEEE Transactions on Consumer Electronics, 55(3), 1330-1336. Makarenko, A., & Durrant-Whyte, H. (2004). Decentralized data fusion and control in active sensor networks. Paper presented at the Proceedings of the Seventh International Conference on Information Fusion. Yuan, W., Krishnamurthy, S. V., & Tripathi, S. K. (2003). Synchronization of multiple levels of data fusion in wireless sensor networks. Paper presented at the GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489). Sharaf, M. A., Beaver, J., Labrinidis, A., & Chrysanthis, P. K. (2003). TiNA: A scheme for temporal coherency-aware in-network aggregation. Paper presented at the Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized business review. Sriman, B., Kumar, S., & Prabakaran, S. (2020). Blockchain Technology: Consensus Protocol Proof of Work and Proof of Stake (pp. 395-406). Skh Saad, S. M., & Raja Mohd Radzi, R. Z. (2020). Comparative Review of the Blockchain Consensus Algorithm Between Proof of Stake (POS) and Delegated Proof of Stake (DPOS). International Journal of Innovative Computing, 10(2). doi: 10.11113/ijic.v10n2.272 A, S., Vairavasundaram, S., Kotecha, K., V, I., Ravi, L., Selvachandran, G., & Abraham, A. (2023). Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things. Future Generation Computer Systems, 141, 16-27. doi: https://doi.org/10.1016/j.future.2022.11.002 Wood, G. Ethereum white paper., GitHub repository 1 (2013), 22-23. Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., & Wang, F.-Y. (2019). Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49(11), 2266-2277. Benet, J. (2014). Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561. Lin, C. L., Tsai, J. H., Chu, Y. H., & Chang, R. I. (2014, 2-5 Nov. 2014). Concept of bounded error to improve wireless sensor network data compression. Paper presented at the SENSORS, 2014 IEEE. Li, M.-H., Lin, C.-C., Chuang, C.-C., & Chang, R.-I. (2010). Error-bounded data compression using data, temporal and spatial correlations in wireless sensor networks. Paper presented at the 2010 International Conference on Multimedia Information Networking and Security. Chen, Y.-H., Huang, N.-Y., Chu, Y.-H., Li, M.-H., Chang, R.-I., & Wang, C.-H. (2012). Dynamic bounded-error data compression and aggregation in wireless sensor network. Paper presented at the SENSORS, 2012 IEEE. Azar, J., Makhoul, A., Barhamgi, M., & Couturier, R. (2019). An energy efficient IoT data compression approach for edge machine learning. Future Generation Computer Systems, 96, 168-175. doi: https://doi.org/10.1016/j.future.2019.02.005 Agarwal, S., Mozafari, B., Panda, A., Milner, H., Madden, S., & Stoica, I. (2013). BlinkDB: queries with bounded errors and bounded response times on very large data. Paper presented at the Proceedings of the 8th ACM European conference on computer systems. Hellerstein, J. M., Haas, P. J., & Wang, H. J. (1997). Online aggregation. Paper presented at the Proceedings of the 1997 ACM SIGMOD international conference on Management of data. Di, S., & Cappello, F. (2016). Fast error-bounded lossy HPC data compression with SZ. Paper presented at the 2016 ieee international parallel and distributed processing symposium (ipdps). Hauck, E. L. (1986). Data compression using run length encoding and statistical encoding: Google Patents. | - |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/89992 | - |
dc.description.abstract | 得益於媒體壓縮技術的進步和寬頻網際網路的普及,多樣化多媒體網路應用的蓬勃發展,透過同儕網路(P2P)架構進行部署的IPTV服務興起。然而P2P IPTV所散布的多媒體內容大都具有智慧財產權(IPR),必須考慮如何有效地進行數位版權管理(DRM)。
此外,網際網路上多樣化的資訊服務持續發展,大量的用戶服務資料(包括了物聯網資料)也應運而生,處理和分析這些資料能為用戶提供更好的應用體驗。然而,這也帶來了資料傳輸與儲存的資源消耗與資料隱私問題。我們首先基於開放移動聯盟(OMA)的標準,提出了一個具有成本效益密鑰分配機制的P2P IPTV DRM架構,以改善投機性群播覆蓋網路(Opportunistic Multicast Overlays)上同儕節點的離開和加入對於P2P IPTV服務品質(QoS)與體驗品質(QoE)的影響。 為了解決傳輸與儲存大量用戶服務資料的資源消耗與資料隱私問題,本論文進一步提出了一個基於區塊鏈的資料市集平台。由於用戶服務資料在實際應用中有一定的誤差容忍範圍,因此,我們透過了有限誤差的資料壓縮與隱私保護的解決方案,利用區塊鏈的智能合約為用戶提供在不同服務層級下資料隱私的保護服務。並透過P2P星際檔案系統技術來提供安全的資料儲存和共享。在資料傳輸與儲存時,結合有限誤差資料壓縮技術,將能有效減少能源消耗。 實驗結果顯示所提出的P2P DRM方法在保護P2P IPTV電子商務服務系統的智慧財產權和用戶的QoS/QoE方面具有成本效益。此外,實驗結果也顯示在有限誤差1%下,感測資料約可達到40%的壓縮率。故透過區塊鏈與有限誤差技術可以有效實現建構節能與隱私保護的資料市集。 | zh_TW |
dc.description.abstract | Thanks to the advancements in media compression technology and the widespread availability of broadband internet, diverse multimedia network applications have flourished. IPTV services deployed through Peer-to-Peer (P2P) architectures have emerged as a result. However, most multimedia content distributed through P2P IPTV is protected by intellectual property rights (IPR), necessitating effective Digital Rights Management (DRM) strategies.
Furthermore, the continuous development of diversified information services on the internet has led to the generation of large volumes of user service data, including data from the Internet of Things (IoT). Processing and analyzing this data can enhance user application experiences. However, this also brings about concerns regarding resource consumption for data transmission and storage, as well as data privacy. We first propose a P2P IPTV DRM framework with a cost-effective key distribution mechanism based on the Open Mobile Alliance (OMA) standard. This aims to mitigate the impact of node departures and additions on Quality of Service (QoS) and Quality of Experience (QoE) in P2P IPTV services on Opportunistic Multicast Overlays (OMO) networks. To address the issues of resource consumption and data privacy in transmitting and storing large volumes of user service data, this paper further introduces a blockchain-based data marketplace platform. Recognizing the acceptable range of errors in user service data in practical applications, we present a solution for bounded-error data compression and privacy protection. By utilizing blockchain smart contracts, we offer users privacy protection services at different service levels. Additionally, secure data storage and sharing are facilitated through P2P InterPlanetary File System (IPFS) technology. Combining bounded-error data compression techniques during data transmission and storage can effectively reduce energy consumption. Experimental results demonstrate that the proposed P2P DRM method offers cost-effective protection for intellectual property rights and user QoS/QoE in P2P IPTV e-commerce service systems. Furthermore, the results show that with a bounded-error of 1%, sensor data can achieve a compression rate of approximately 40%. Thus, the combination of blockchain and bounded-error techniques can effectively realize the construction of an energy-efficient and privacy-protective data marketplace. | en |
dc.description.provenance | Submitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-09-22T16:58:21Z No. of bitstreams: 0 | en |
dc.description.provenance | Made available in DSpace on 2023-09-22T16:58:21Z (GMT). No. of bitstreams: 0 | en |
dc.description.tableofcontents | 中文摘要 i
ABSTRACT iii 目錄 v 圖目錄 vii 表目錄 ix 第一章 簡介 1 1.1 研究動機 1 1.2 研究貢獻 4 1.3 論文架構 5 第二章 文獻探討 6 2.1 P2P IPTV DRM 架構 7 2.1.1 應用於P2P IPTV的OMA DRM架構中的元件 8 2.1.2 非對稱密碼編碼家族(Asymmetric-cryptogram-family; ACF) 10 2.1.3 私鑰加密 (Privat-key-encryption; PKE) 金鑰分發 15 2.2 資料壓縮演算法 20 2.2.1 變動長度編碼 (Round-Length Encoding) 22 2.2.2 霍夫曼編碼 (Huffman Coding) 25 2.3 區塊鏈及智能合約相關技術 27 2.3.1 區塊鏈 27 2.3.2 共識演算法 31 2.3.3 以太坊(Ethereum) 37 2.3.4 智能合約(Smart Contract) 41 2.3.5 星際檔案系統 44 第三章 區塊鏈架構的IPTV DRM PKE 金鑰方案 47 3.1 區塊鏈架構的IPTV DRM PKE 金鑰運作原理 49 第四章 有限誤差壓縮的方法研究 52 4.1 有限誤差感測器資料壓縮 54 4.2 有限誤差變動長度編碼 59 4.3 有限誤差霍夫曼編碼 61 4.4 空間相關壓縮 63 第五章 有限誤差資料隱私保護系統架構 65 5.1 有限誤差內容優化框架 67 5.2 基於區塊鏈的有限誤差資料市集 70 5.2.1 基於區塊鏈的有限誤差資料市集(BEDMoB)流程 72 5.2.2 分層有限誤差運行長度編碼壓縮演算法 75 第六章 實驗結果與分析 78 6.1 有限誤差內容優化框架(BECOF)效能評估 80 6.2 基於區塊鏈的有限誤差資料市集(BEDMOB) 效能評估 84 第七章 結論與未來展望 91 參考文獻 93 | - |
dc.language.iso | zh_TW | - |
dc.title | 具節能及私密防護的區塊鏈物聯網大數據市集 | zh_TW |
dc.title | Blockchain of IoT Big Data Market with Energy Saving and Privacy Protection | en |
dc.type | Thesis | - |
dc.date.schoolyear | 111-2 | - |
dc.description.degree | 博士 | - |
dc.contributor.oralexamcommittee | 丁肇隆;陳俊良;王家輝;張信宏 | zh_TW |
dc.contributor.oralexamcommittee | Chao-Lung Ting;Chun-Liang Chen;Chia-Hui Wang;Shin-Hung Chang | en |
dc.subject.keyword | P2P IPTV數位版權管理,資料隱私,有限誤差,區塊鏈,智能合約,星際檔案系統, | zh_TW |
dc.subject.keyword | P2P IPTV DRM,data privacy,bounded-error,blockchain,smart contracts,InterPlanetary File System (IPFS), | en |
dc.relation.page | 97 | - |
dc.identifier.doi | 10.6342/NTU202303985 | - |
dc.rights.note | 未授權 | - |
dc.date.accepted | 2023-08-12 | - |
dc.contributor.author-college | 工學院 | - |
dc.contributor.author-dept | 工程科學及海洋工程學系 | - |
顯示於系所單位: | 工程科學及海洋工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-111-2.pdf 目前未授權公開取用 | 4.18 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。