Abstract
The emerging multimedia social networks (MSN) services have significantly improved and enriched consumers’ experiences on multimedia digital contents, and further spurred the misuse and malicious dissemination of digital media (rights) among users. Thus, Digital Rights Management (DRM) issue is becoming more prominent. The theories and methods for security, trustworthiness, controllability of DRM systems available do not meet the needs of the novel Internet application, which is an urgent problem to solve. This paper analyzed traditional access control technologies and social network properties, and made a survey on related home and abroad research progresses on DRM security technologies, multimedia social networks access control and media contents copyrights protection. Finally, several main research directions were addressed on the key technologies of DRM, from three layers of cloud media services, media networks admission and user social networks, respectively, that is media content access control, media terminal trusted admission and media rights secure distribution.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhang, Z.Y.: Digital Rights Management Ecosystem and its Usage Controls: A Survey. International Journal of Digital Content Technology & Its Applications 5(3), 255–272 (2011)
Zhang, Z.Y.: Security, Trust and Risk in Digital Rights Management Ecosystem. Science Press, China (2012)
Zhu, W.W., Luo, C., Wang, J.F., Li, S.P.: Multimedia cloud computing. IEEE Signal Processing Magazine 28(3), 59–69 (2011)
Gadea, C., Solomon, B., Ionescu, B., et al.: A collaborative cloud-based multimedia sharing platform for social networking environments. In: Proc. of International Conference on Computer Communications and Networks, Maui, HI, USA, pp. 1–6 (August 2011)
Diaz-Sanchez, D., Almenarez, F., Marin, A., Proserpio, D., Cabarcos, P.A.: Media cloud: An open cloud computing middleware for content management. IEEE Transactions on Consumer Electronics 57(2), 970–978 (2011)
Huang, T., Zhang, Z.Y., Chen, Q.L., et al.: A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing. International Journal of Digital Content Technology & Its Applications 7(4), 795–802 (2013)
Pretschner, A., Hilty, M., Schütz, F., et al.: Usage Control Enforcement: Present and Future. IEEE Security & Privacy 6(4), 44–53 (2008)
Koushanfar, F.: Provably secure active IC metering techniques for piracy avoidance and digital rights management. IEEE Transactions on Information Forensics and Security 7(1), 51–63 (2012)
Yan, X.X., Ma, J.F., Yang, Y.F., et al.: Identity-based domain key distribution protocol in the E-document security management. Journal of Communications 33(5), 12–20 (2012)
Lee, S., Lee, H.R., Lee, S.K.: DRMFS: A file system layer for transparent access semantics of DRM-protected contents. The Journal of Systems and Software 85(5), 1058–1066 (2012)
Zhang, G., Zhu, Z., Wang, P., Song, B.: A TCM-enabled access control scheme. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. (eds.) ICA3PP 2011, Part II. LNCS, vol. 7017, pp. 312–320. Springer, Heidelberg (2011)
Thomas, T., Emmanuel, S., Subramanyam, A.V.: Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture. IEEE Transactions on Information Forensics and Security 4(4), 758–767 (2009)
Bhatt, S., Sion, R., Carbunar, B.: A Personal Mobile DRM Manager for Smartphones. Computers & Security 28(6), 327–340 (2009)
Lee, S., Kim, J., Hong, S.J.: Redistributing Time-based Rights between Consumer Devices for Content Sharing in DRM System. International Journal of Information Security 8(4), 263–273 (2009)
Feng, X., Tang, Z., Yu, Y.Y.: An Efficient Contents Sharing Method for DRM. In: Proc. of 2009 Consumer Communications and Networking Conference. 5th IEEE Workshop on DRM, Las Vegas, NV, pp. 1–5 (2009)
Win, L.L., Thomas, T., Emmanuel, S.: Secure interoperable digital content distribution mechanisms in a multi-domain architecture. Multimedia Tools and Applications 60(1), 97–128 (2012)
Villegas, W.: A trust-based access control scheme for social networks. School of Computer Science, McGill University, Montreal (2008)
Gates, C.: Access Control Requirements for Web 2.0 Security and Privacy. Position paper accepted to the Workshop on Web 2.0 Security and Privacy, Oakland, California, United States (2007)
Hart, M., Johnson, R., Stent, A.: More content – less control: access control in the web 2.0. In: Proc. of the Web 2.0 Security and Privacy Workshop on Online Social Networks, WOSN (2007)
Barbara, C., Elena, F., Raymond, H., Murat, K.: Semantic web-based social network access control. Computers and Security 30(2), 108–115 (2011)
Park, J., Sandhu, R., Cheng, Y.: A User-Activity-Centric Framework for Access Control in Online Social Networks. IEEE Internet Computing 15(5), 62–65 (2011)
Ali, B., Villegas, W., Maheswaran, M.: A trust based approach for protecting user data in social networks. In: Proc. of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, Richmond Hill, Ontario, Canada, pp. 288–293 (2007)
Kruk, S.R., Grzonkowski, S., Gzella, A., Woroniecki, T., Choi, H.-C.: D-FOAF: Distributed Identity Management with Access Rights Delegation. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 140–154. Springer, Heidelberg (2006)
Wang, H., Sun, L.L.: Trust-involved access control in collaborative open social networks. In: Proc. of the 2010 4th International Conference on Network and System Security (NSS), Melbourne, VIC, pp. 239–246 (2010)
Sachan, A., Emmanuel, S., Kankanhalli, M.: An efficient access control method for multimedia social networks. In: Proc. of the 2nd ACM SIGMM Workshop on Social Media, Firenze, Italy, pp. 33–38 (October 2010)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of the 28th International Conference on Very Large Data Bases, pp. 143–154 (2002)
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting disclosure in Hippocratic databases. In: Proc. of the 13th Very Large Data Bases, pp. 108–119 (2004)
Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-aware role based access control. IEEE Security and Privacy 7(4), 35–43 (2009)
Tian, L.Q.: A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network. Chinese Journal of Computers 30(11), 1930–1938 (2007)
Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1734–1744. Springer, Heidelberg (2006)
Wang, Z., Sun, L.F., Chen, X.W., et al.: Propagation-based social-aware replication for social video contents. In: Proc. of the 20th ACM International Conference on Multimedia, Nara, Japan, pp. 29–38 (2012)
Ye, C.H., Ling, H.F., Zou, F.H., Liu, C.: Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain. In: Proc. of the 20th ACM International Conference on Multimedia, Nara, Japan, pp. 1117–1120 (October 2012)
Lian, S.Q., Chen, X., Wang, J.W.: Content distribution and copyright authentication based on combined indexing and watermarking. Multimedia Tools and Applications 57(1), 49–66 (2012)
Chung, M.B., Ko, I.J.: Intelligent copyright protection system using a matching video retrieval algorithm. Multimedia Tools and Applications 59(1), 383–401 (2012)
Yeh, L.Y., Huang, Y.L., et al.: A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks. IEEE Transactions on Vehicular Technology 61(4), 1907–1924 (2012)
Ren, Y.Z., Li, M.C., Sakurai, K.: FineTrust: A fine-grained trust model for peer-to-peer networks. Security and Communication Networks 4(1), 61–69 (2011)
Zhang, Z.Y., Wang, K.L.: A Trust Model for Multimedia Social Networks. Social Networks Analysis and Mining, 1–11 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, E., Liu, Z., Shao, F. (2014). Digital Rights Management and Access Control in Multimedia Social Networks. In: Pan, JS., Krömer, P., Snášel, V. (eds) Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, vol 238. Springer, Cham. https://doi.org/10.1007/978-3-319-01796-9_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-01796-9_27
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01795-2
Online ISBN: 978-3-319-01796-9
eBook Packages: EngineeringEngineering (R0)