Abstract
Massive Internet media distribution demands prolonged continuous consumption of networking and disk bandwidths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability and performance issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without copyright protection, content providers are hesitant to use proxy-based fast distribution techniques. Second, little has been done to protect client privacy during content accesses on the Internet. Straightforward solutions to address these two issues independently lead to conflicts. For example, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this article, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms in a cooperative proxy environment where our proposed scheme works efficiently and practically. Simulation-based experiments are conducted to extensively evaluate the proposed system. Preliminary results demonstrate the effectiveness of our proposed strategy.
- an dI. Visconti, P. P. 2000. User privacy issues regarding certificates and the tls protocol. In Proceedings of Conference on Computer and Communications Security. Athens, Greece.]] Google Scholar
Digital Library
- Bao, F., Deng, R., and Feng, P. 2000. An efficient and practical scheme for privacy protection in the e-commerce of digital goods. In Proceedings of the 3rd International Conference on Information Security and Cryptology.]] Google Scholar
Digital Library
- Bao, F., Deng, R., Feng, P., Guo, Y., and Wu, H. 2001. Secure and private distribution of online video and several related cryptographic issues. In Proceedings of the 6th Australia Conference on Information Security and Privacy. Sidney, Australia.]] Google Scholar
Digital Library
- Bonatti, P. A. and Samarati, P. 2002. A uniform framework for regulating service access and information release on the web. In J. Comput. Secur. 10, 3.]] Google Scholar
Digital Library
- Boneh, D., Ding, X., Tsudik, G., and Wong, C. 2001. A method for fast revocation of public key certificates and security capabilities. In Proceedings of USENIX Security. Washington, D.C.]] Google Scholar
Digital Library
- Brands, S. 2000. Rethinking public key infrastructures and digital certificates: Building in privacy. In Rethinking Public Key Infrastructures and Digital Certificates. MIT Press.]] Google Scholar
Digital Library
- Camenisch, J. and Herreweghen, E. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]] Google Scholar
Digital Library
- Chae, Y., Guo, K., Buddhikot, M., Suri, S., and Zegura, E. 2002. Silo, rainbow, and caching token: Schemes for scalable fault tolerant stream caching. In IEEE J. Select. Areas Comm.]] Google Scholar
Digital Library
- Chaum, D. 1985. Security without identification: Transactions system to make big brother obsolete. In Comm. ACM. 24, 2.]] Google Scholar
Digital Library
- Chen, S., Chen, S., Guo, H., Shen, B., and Jajodia, S. 2006. Efficient proxy-based internet media distribution control and privacy protection infrastructure. In Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS '06). New Haven, CT.]]Google Scholar
- Chiu, M. Y. and Yeung, K. H. 1997. Partial video sequence caching scheme for vod systems with heteroeneous clients. In Proceedings of the 13th International Conference on Data Engineering. Birmingham, UK.]] Google Scholar
Digital Library
- Chor, B. and Gilboa, N. 1997. Computational private information retrieval. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing.]] Google Scholar
Digital Library
- Coron, J., Naccache, D., and Stern, J. 1999. On the security of rsa padding. In Proceedings of Crypto. Santa Barbara, CA.]] Google Scholar
Digital Library
- Diffie, W. and Hellman, M. 1976. New directions in cryptography. In IEEE Trans. Inform. Theory. 22, 6, 644--654.]]Google Scholar
Digital Library
- Dingledine, R., Mathewson, N., and Syverson, P. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium.]] Google Scholar
Digital Library
- Freedman, M. J. and Morris, R. 2002. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). Washington, DC.]] Google Scholar
Digital Library
- Gamal, T. 1985. A public key cryptosystem and signature scheme based on the discrete logarithm. IEEE Trans. Inform. Theory 4.]]Google Scholar
- Gertner, Y., Ishai, Y., Kushilevita, E., and Malkin, T. 1998. Protecting data privacy in private information retrieval schemes. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing.]] Google Scholar
Digital Library
- Golle, P. and Juels, A. 2004. Parallel mixing. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]] Google Scholar
Digital Library
- Griwodz, C., Merkel, O., Dittmann, J., and Steinmetz, R. 1998. Protecting vod the easier way. In Proceedings of the 6th ACM Multimedia Conference. Bristol, UK.]] Google Scholar
Digital Library
- Holt, J., Bradshaw, R., Seamons, K., and Orman, H. 2003. Hidden credentials. In Proceedings of the ACM Workshop on Privacy in the Electronic Society. Washington, DC.]] Google Scholar
Digital Library
- Kangasharju, J., Hartanto, F., Reisslein, M., and Ross, K. W. 2001. Distributing layered encoded video through caches. In Proceedings of IEEE Inforcom. Anchorage, AK.]]Google Scholar
- Mediacom. http://www.mediacomcc.com/.]]Google Scholar
- Miao, Z. and Ortega, A. 2002. Scalable proxy caching of video under storage constraints. In IEEE J. Select. Areas Comm.]] Google Scholar
Digital Library
- Park, J. and Sandhu, R. 1999. Extending x.509 for secure attribute services on the web. In Proceedings of the 22nd National Information Systems and Security Conference. Crystal City, VA.]]Google Scholar
- Reiter, M. K. and Rubin, A. D. 1999. Anonymous web transactions with crowds. In Comm. ACM. 42, 2, 32--48.]] Google Scholar
Digital Library
- Reiter, M. K. and Wang, X. 2004. Fragile mixing. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]] Google Scholar
Digital Library
- Rejaie, R., H. Yu, M. H., and Estrin, D. 2000. Multimedia proxy caching mechanism for quality adaptive streaming applications in the internet. In Proceedings of IEEE INFOCOM. Tel-Aviv, Israel.]]Google Scholar
- Roy, S., Shen, B., Chen, S., and Zhang, X. 2004. An empirical study of a segment-based streaming proxy in an enterprise environment. In Proceedings of the 9th International Workshop on Web Content Caching and Distribution. Beijing, China.]]Google Scholar
- RSA Laboratories. 2002. PKCS 1 v2.1: RSA cryptography standard.]]Google Scholar
- Schojer, P., Boszormenyi, L., Hellwagner, H., Penz, B., and Podlipnig, S. 2003. Architecture of a quality based intelligient proxy (qbix) for mpeg-4 videos. In Proceedings of WWW. Budapest, Hungary.]] Google Scholar
Digital Library
- Sen, S., Rexford, J., and Towsley, D. 1999. Proxy prefix caching for multimedia streams. In Proceedings of IEEE INFOCOM. New York, NY.]]Google Scholar
- Shi, C. and Bhargava, B. 1998. A fast mpeg video encryption algorithm. In Proceedings of the 6th ACM Multimedia Conference. Bristol, UK.]] Google Scholar
Digital Library
- Stallings, W. 1998. Cryptography and Network Security: Principles and Practice. Prentice Hall.]] Google Scholar
Digital Library
- Tosun, A. S. and Feng, W. C. 2002. Secure video transmission using proxies. Tech. rep., Computer and Information Science, Ohio State University.]]Google Scholar
- Wen, J., Severa, M., Zeng, W., Luttrell, M., and Jin, W. 2002. A format compliant configurable encryption framework for access control of video. In IEEE Trans. Circ. Syst. Video Tech. (Special Issue on Wireless Video), 545--557.]] Google Scholar
Digital Library
- Winsborough, W. and Li, N. 2002a. Protecting sensitive atributes in automated trust negotiation. In Proceedings of the ACM Workshop on Privacy in the Electronic Society. Washington, DC.]] Google Scholar
Digital Library
- Winsborough, W. and Li, N. 2002b. Towards practical autmated trust negeotiation. In Proceedings of the 3rd Workshop on Policies for Distributed Systems and Networks. Monterey, CA.]] Google Scholar
Digital Library
- Wu, K., Yu, P. S., and Wolf, J. 2001. Segment-based proxy caching of multimedia streams. In Proceedings of WWW. Hongkong, China.]] Google Scholar
Digital Library
- Wu, Y. and Bao, F. 2004. Collusion attack on a multi-key secure video proxy scheme. In Proceedings of the ACM Multimedia Conference. New York, NY.]] Google Scholar
Digital Library
- Yang, H. and Lu, S. 2004. Commutative cipher based en-route filtering in wireless sensor networks. In Proceedings of IEEE VTC Wireless Security Symposium. Los Angeles, CA.]]Google Scholar
- Yeung, S., Lui, J., and Yau, D. 2002. A case for multi-key secure video proxy: Theory, design, and implementation. In Proceedings of the ACM Multimedia Conference. Juan-les-Pins, France.]] Google Scholar
Digital Library
- Yeung, S., Lui, J. C., and Yau, D. K. 2005. A multi-key secure multimedia proxy using asymmetric reversible parametric sequences: Theory, design, and implementation. In IEEE Trans. Multimedia. 7.]] Google Scholar
Digital Library
- Zhang, Z., Wang, Y., Du, D., and Su, D. 2000. Video staging: A proxy-server based approach to end-to-end video delivery over wide-area networks. IEEE Trans. Netw. 8. 429--442.]] Google Scholar
Digital Library
Index Terms
Achieving simultaneous distribution control and privacy protection for Internet media delivery
Recommendations
Achieving k-anonymity privacy protection using generalization and suppression
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a way that the identities of the individuals who are the subjects of the data cannot be determined. One way to achieve this is to have the released records ...
Trust-aware privacy control for social media
CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing SystemsDue to the huge exposure of personal information in social media, a challenge now is to design effective privacy mechanisms that protect against unauthorized access to social data. In this paper, a trust model for social media is first presented. Based ...
A distributed integrated request processing algorithm for QoS assurance in large-scale media-based systems
In this paper, we discuss a comprehensive mechanism for distributed media request processing to achieve performance improvement and QoS enhancement in media-based application systems. The approach makes use of the proxy infrastructure to handle media ...






Comments