Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30848
Internet Optimization by Negotiating Traffic Times

Authors: Carlos Gonzalez


This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.

Keywords: secure storage, internet optimization, video download, future demands

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 153


[1] Wang in “Sistema y método para distribución de documentos.”, España patent ES2265826 T3, March-01-2007
[2] Sakhartov et al., “Systems and methods for generating interactive video content”, USA Patent 8,166,500 , Apr-24-2012
[3] Harrang; Jeffrey et al., “Pre-Delivery Of Content To A User Device”, U.S. Pub No. 2015/0039601 A 1, Feb-05-2015
[4] Amit Sahai and Brent Waters. (2013). “How to Use Indistinguishability Obfuscation: Deniable Encryption, and More”,
[5] Amit Sahai, et al., (2013). “Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits”, 2013/451.pdf
[6] Aucsmith D., (1996). “Tamper Resistant Software: An Implementation”, Proc. 1st International Information Hiding Workshop (IHW), Cambridge, U.K. Springer LNCS 1174, pp. 317-333.
[7] Barak B., O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, K. Yang, (1997). “On the Impossibility of Obfuscating Programs”, pp. 1–18, Advances in Cryptology– Crypto 2001, Springer LNCS 2139 (2001).
[8] Collberg C., C. Thomborson, D. Low, (1997) “A Taxonomy of Obfuscating Transformations”, Technical Report 148, Dept. Computer Science, University of Auckland (July 1997).
[9] Collberg C., C. Thomborson, D. Low, (1998). “Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs”, Proc. Symp. Principles of Programming Languages (POPL’98), Jan. 1998
[10] Kevin A. Roundy and Barton P. Miller, (2011). “Binary-Code Obfuscations in Prevalent Packer Tools”, paradyn/papers/Roundy12Packers.pdf, September 2011
[11] Toshio Ogiso, Sakabe Yusuke, Soshi Masakazu, Miyaji Atsuko. (2003). “Software Obfuscation on a Theoretical Basis and its Implementation”, IEEE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, January 2003, 176-186.
[12] Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119–131.
[13] Scarfone, Karen; Mell, Peter. "Guide to Intrusion Detection and Prevention Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and Technology) (800–94) (February 2007).
[14] Mukherjee B., Heberlein L.T, Levitt K. N.,” Network Intrusion Detection”, IEEE Network May 1994
[15] Scarfone Karen, Mell Peter., "Guide to Intrusion Detection and Prevention Systems (IDPS)", Computer Security Resource Center (National Institute of Standards and Technology), February 2007
[16] Gonzalez C., “User Detection in Military Software”, The Journal of Cyber Security and Information Systems, submitted Nov 2018.