skip to main content
research-article

Achieving simultaneous distribution control and privacy protection for Internet media delivery

Published:16 May 2008Publication History
Skip Abstract Section

Abstract

Massive Internet media distribution demands prolonged continuous consumption of networking and disk bandwidths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability and performance issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without copyright protection, content providers are hesitant to use proxy-based fast distribution techniques. Second, little has been done to protect client privacy during content accesses on the Internet. Straightforward solutions to address these two issues independently lead to conflicts. For example, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this article, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms in a cooperative proxy environment where our proposed scheme works efficiently and practically. Simulation-based experiments are conducted to extensively evaluate the proposed system. Preliminary results demonstrate the effectiveness of our proposed strategy.

References

  1. an dI. Visconti, P. P. 2000. User privacy issues regarding certificates and the tls protocol. In Proceedings of Conference on Computer and Communications Security. Athens, Greece.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bao, F., Deng, R., and Feng, P. 2000. An efficient and practical scheme for privacy protection in the e-commerce of digital goods. In Proceedings of the 3rd International Conference on Information Security and Cryptology.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bao, F., Deng, R., Feng, P., Guo, Y., and Wu, H. 2001. Secure and private distribution of online video and several related cryptographic issues. In Proceedings of the 6th Australia Conference on Information Security and Privacy. Sidney, Australia.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bonatti, P. A. and Samarati, P. 2002. A uniform framework for regulating service access and information release on the web. In J. Comput. Secur. 10, 3.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Boneh, D., Ding, X., Tsudik, G., and Wong, C. 2001. A method for fast revocation of public key certificates and security capabilities. In Proceedings of USENIX Security. Washington, D.C.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Brands, S. 2000. Rethinking public key infrastructures and digital certificates: Building in privacy. In Rethinking Public Key Infrastructures and Digital Certificates. MIT Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Camenisch, J. and Herreweghen, E. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chae, Y., Guo, K., Buddhikot, M., Suri, S., and Zegura, E. 2002. Silo, rainbow, and caching token: Schemes for scalable fault tolerant stream caching. In IEEE J. Select. Areas Comm.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chaum, D. 1985. Security without identification: Transactions system to make big brother obsolete. In Comm. ACM. 24, 2.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chen, S., Chen, S., Guo, H., Shen, B., and Jajodia, S. 2006. Efficient proxy-based internet media distribution control and privacy protection infrastructure. In Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS '06). New Haven, CT.]]Google ScholarGoogle Scholar
  11. Chiu, M. Y. and Yeung, K. H. 1997. Partial video sequence caching scheme for vod systems with heteroeneous clients. In Proceedings of the 13th International Conference on Data Engineering. Birmingham, UK.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Chor, B. and Gilboa, N. 1997. Computational private information retrieval. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Coron, J., Naccache, D., and Stern, J. 1999. On the security of rsa padding. In Proceedings of Crypto. Santa Barbara, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Diffie, W. and Hellman, M. 1976. New directions in cryptography. In IEEE Trans. Inform. Theory. 22, 6, 644--654.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Dingledine, R., Mathewson, N., and Syverson, P. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Freedman, M. J. and Morris, R. 2002. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). Washington, DC.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Gamal, T. 1985. A public key cryptosystem and signature scheme based on the discrete logarithm. IEEE Trans. Inform. Theory 4.]]Google ScholarGoogle Scholar
  18. Gertner, Y., Ishai, Y., Kushilevita, E., and Malkin, T. 1998. Protecting data privacy in private information retrieval schemes. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Golle, P. and Juels, A. 2004. Parallel mixing. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Griwodz, C., Merkel, O., Dittmann, J., and Steinmetz, R. 1998. Protecting vod the easier way. In Proceedings of the 6th ACM Multimedia Conference. Bristol, UK.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Holt, J., Bradshaw, R., Seamons, K., and Orman, H. 2003. Hidden credentials. In Proceedings of the ACM Workshop on Privacy in the Electronic Society. Washington, DC.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kangasharju, J., Hartanto, F., Reisslein, M., and Ross, K. W. 2001. Distributing layered encoded video through caches. In Proceedings of IEEE Inforcom. Anchorage, AK.]]Google ScholarGoogle Scholar
  23. Mediacom. http://www.mediacomcc.com/.]]Google ScholarGoogle Scholar
  24. Miao, Z. and Ortega, A. 2002. Scalable proxy caching of video under storage constraints. In IEEE J. Select. Areas Comm.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Park, J. and Sandhu, R. 1999. Extending x.509 for secure attribute services on the web. In Proceedings of the 22nd National Information Systems and Security Conference. Crystal City, VA.]]Google ScholarGoogle Scholar
  26. Reiter, M. K. and Rubin, A. D. 1999. Anonymous web transactions with crowds. In Comm. ACM. 42, 2, 32--48.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Reiter, M. K. and Wang, X. 2004. Fragile mixing. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Rejaie, R., H. Yu, M. H., and Estrin, D. 2000. Multimedia proxy caching mechanism for quality adaptive streaming applications in the internet. In Proceedings of IEEE INFOCOM. Tel-Aviv, Israel.]]Google ScholarGoogle Scholar
  29. Roy, S., Shen, B., Chen, S., and Zhang, X. 2004. An empirical study of a segment-based streaming proxy in an enterprise environment. In Proceedings of the 9th International Workshop on Web Content Caching and Distribution. Beijing, China.]]Google ScholarGoogle Scholar
  30. RSA Laboratories. 2002. PKCS 1 v2.1: RSA cryptography standard.]]Google ScholarGoogle Scholar
  31. Schojer, P., Boszormenyi, L., Hellwagner, H., Penz, B., and Podlipnig, S. 2003. Architecture of a quality based intelligient proxy (qbix) for mpeg-4 videos. In Proceedings of WWW. Budapest, Hungary.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Sen, S., Rexford, J., and Towsley, D. 1999. Proxy prefix caching for multimedia streams. In Proceedings of IEEE INFOCOM. New York, NY.]]Google ScholarGoogle Scholar
  33. Shi, C. and Bhargava, B. 1998. A fast mpeg video encryption algorithm. In Proceedings of the 6th ACM Multimedia Conference. Bristol, UK.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Stallings, W. 1998. Cryptography and Network Security: Principles and Practice. Prentice Hall.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Tosun, A. S. and Feng, W. C. 2002. Secure video transmission using proxies. Tech. rep., Computer and Information Science, Ohio State University.]]Google ScholarGoogle Scholar
  36. Wen, J., Severa, M., Zeng, W., Luttrell, M., and Jin, W. 2002. A format compliant configurable encryption framework for access control of video. In IEEE Trans. Circ. Syst. Video Tech. (Special Issue on Wireless Video), 545--557.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Winsborough, W. and Li, N. 2002a. Protecting sensitive atributes in automated trust negotiation. In Proceedings of the ACM Workshop on Privacy in the Electronic Society. Washington, DC.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Winsborough, W. and Li, N. 2002b. Towards practical autmated trust negeotiation. In Proceedings of the 3rd Workshop on Policies for Distributed Systems and Networks. Monterey, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Wu, K., Yu, P. S., and Wolf, J. 2001. Segment-based proxy caching of multimedia streams. In Proceedings of WWW. Hongkong, China.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wu, Y. and Bao, F. 2004. Collusion attack on a multi-key secure video proxy scheme. In Proceedings of the ACM Multimedia Conference. New York, NY.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Yang, H. and Lu, S. 2004. Commutative cipher based en-route filtering in wireless sensor networks. In Proceedings of IEEE VTC Wireless Security Symposium. Los Angeles, CA.]]Google ScholarGoogle Scholar
  42. Yeung, S., Lui, J., and Yau, D. 2002. A case for multi-key secure video proxy: Theory, design, and implementation. In Proceedings of the ACM Multimedia Conference. Juan-les-Pins, France.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Yeung, S., Lui, J. C., and Yau, D. K. 2005. A multi-key secure multimedia proxy using asymmetric reversible parametric sequences: Theory, design, and implementation. In IEEE Trans. Multimedia. 7.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Zhang, Z., Wang, Y., Du, D., and Su, D. 2000. Video staging: A proxy-server based approach to end-to-end video delivery over wide-area networks. IEEE Trans. Netw. 8. 429--442.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Achieving simultaneous distribution control and privacy protection for Internet media delivery

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!