Abstract
Multimedia applications have made their way to the wireless/mobile world and this is not likely to change. However, people have not stopped using multimedia services through wired networks and this is also something that is not foreseen to change. What really is changing in the coming networks is the separation of network and service providers; this separation is creating new security challenges since the end user does not have the same trust relationships with all these providers. This paper proposes an architecture for protecting end users from untrusted and unreliable multimedia service providers in Next Generation Networks (NGNs) that utilize the IP Multimedia Subsystem (IMS) for multimedia delivery. Our proposal is based on the Usage Control (UCON) model for monitoring continuously the multimedia content delivered to the end user and ensure that it is the proper content requested by the user.
This work was carried out during the tenure of an ERCIM "Alain Bensoussan" Fellowship Programme. Work partially supported by EU FP7-ICT project NESSoS (Network of Excellence on Engineering Secure Future Internet Software Services and Systems) under the grant agreement n. 256980.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
The International Telecommunication Union (ITU), http://www.itu.int/ITU-T/studygroups/com13/ngn2004/working_definition.html
3GPP TS 23.228: IP multimedia subsystem (IMS). Version 10.2.0, Release 10 (2010)
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261 (2002)
Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter Base Protocol. RFC 3588 (2003)
ITU-T Recommendation Y.2011: General principles and general reference model for next generation network (2004)
Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. on Information and System Security (TISSEC) 7(1), 128–174 (2004)
ISO/IEC JTC1/SC29/WG11/N6828: MPEG-7 Overview V.10 (2004)
Moses, T.: eXtensible Access Control Markup Language (XACML). Version 2.0, Technical report, OASIS Standard (2005)
3GPP TS 33.107: 3G Security; Lawful interception architecture and functions. Version 10.1.1, Release 10 (2010)
Vollbrecht, J., Farrell, S., Gommans, L., Gross, G., de Bruijn, B., de Laat, C., Holdrege, M., Spence, D.: AAA Authorization Framework. RFC 2904 (2000)
Rosenberg, J., Jennings, C.: The Session Initiation Protocol and Spam. RFC 5039 (2008)
Ali, T., Nauman, M., Hadi, F., bin Muhaya, F.: On Usage Control of Multimedia Content in and through Cloud Computing Paradigm. In: 5th International Conference on Future Information Technology (FutureTech), Busan, South Korea, pp. 1–5 (2010)
Ding, Y., Zou, J.: DRM Application in UCONABC. In: Advanced Software Engineering and Its Applications, Hainan Island, China, pp. 182–185 (2008)
Martinelli, F., Mori, P.: On usage control for GRID systems. Future Generation Computer Systems 26(7), 1032–1042 (2010)
Wu, J., Shimamoto, S.: Usage Control Based Security Access Scheme for Wireless Sensor Networks. In: IEEE Intern. Conf. on Communications (ICC), Cape Town, pp. 1–5 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karopoulos, G., Martinelli, F. (2011). IMS Session Management Based on Usage Control. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-22339-6_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22338-9
Online ISBN: 978-3-642-22339-6
eBook Packages: Computer ScienceComputer Science (R0)