Skip to main content
Log in

Media Gateway: bringing privacy to private multimedia cloud connections

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The growing interest in media sharing combined with the explosion of social applications have opened an opportunity window for cloud based applications for media management as Media Cloud, described in this article, that has brought the concept of Cloud Computing to home environments. Media Cloud provides a comprehensive and efficient solution for managing content among federated home environments. As part of the purpose of empowering the user role as well as to improve user experience, we placed significant efforts on interoperability and privacy protection when it comes to accessing cloud resources from other networks. This article describes a solution that enables limited devices to access contents located in private clouds, as Media Cloud, with the cooperation of network providers,

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. Let it rise: a special report on corporate it. The Economist (2008).

  2. Netflix http://www.netflix.com.

  3. Ultraviolet www.uvvu.com.

  4. iCloud, http://www.icloud.

  5. DropBox, https://www.dropbox.com.

  6. Pogoplug www.pogoplug.com.

  7. Tonido http://www.tonido.com/.

  8. Zumo Drive http://www.zumodrive.com.

  9. inXtron http://www.inxtron.com.

  10. W3C Privacy Dashboard http://code.w3.org/privacy-dashboard/wiki.

References

  1. Content protection and copy management specification; part 2: Cpcm reference model (Tech. Rep. ETSI TS 102 825-2 V1.1.1). European Telecommunications Standards Institute (2008).

  2. Content protection and copy management specification; part 3: Cpcm usage state information (Tech. Rep. ETSI TS 102 825-3 V1.1.1). European Telecommunications Standards Institute (2008).

  3. P1817 standard for consumer-ownable digital personal property, initial technical description of the p1817 standar (Tech. Rep. P1817). IEEE (2011). Available at http://grouper.ieee.org/groups/1817/pub_docs/TechDescription_095.pdf.

  4. Androutsellis-Theotokis, S., & Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36, 335–371. doi:10.1145/1041680.1041681.

    Article  Google Scholar 

  5. Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., & Lilien, L. (2010). An entity-centric approach for privacy and identity management in cloud computing. In 29th IEEE symposium on reliable distributed systems, 2010 (pp. 177–183). doi:10.1109/SRDS.2010.28.

    Chapter  Google Scholar 

  6. Arias, P., Almenares, F., Sánchez, R., Marín, A., & Díaz-Sánchez, D. (2012). Multi-device single sign-on for cloud service continuity. In Proc. IEEE int. conference on consumer electronics (pp. 1–2). New York: IEEE Press.

    Google Scholar 

  7. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., & Zaharia, M. (2009). Above the clouds: a Berkeley view of cloud computing. (Tech. Rep. UCB/EECS-2009-28). EECS Department, University of California, Berkeley. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.

  8. Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13, 422–426. doi:10.1145/362686.362692.

    Article  Google Scholar 

  9. Bonneau, J. (2009). Attack of the zombie photos. http://www.lightbluetouchpaper.org/2009/05/20/attack-of-the-zombie-photos/. Accessed 12 January 2012.

  10. Breitman, K., Endler, M., Pereira, R., & Azambuja, M. (2010). When tv dies, will it go to the cloud? Computer, 43(4), 81–83. doi:10.1109/MC.2010.118.

    Article  Google Scholar 

  11. Broder, A., & Mitzenmacher, M. (2002). Network applications of bloom filters: a survey. In Internet mathematics (pp. 636–646).

    Google Scholar 

  12. Cameron, K., Posch, R., & Rannenberg, K. (2008). Proposal for a common identity framework: a user-centric identity metasystem.

  13. Cavoukian, A. (2008). Privacy in the clouds. Identity in the Information Society, 1(1), 89–108. doi:10.1007/s12394-008-0005-z.

    Article  Google Scholar 

  14. Chen, H., Jin, H., Chen, L., Liu, Y., & Ni, L. (2011). Optimizing bloom filter settings in peer-to-peer multi-keyword searching. IEEE Transactions on Knowledge and Data Engineering, PP(99), 1. doi:10.1109/TKDE.2011.14.

    Article  Google Scholar 

  15. Chen, Y., Paxson, V., & Katz, R. H. (2010). Whats new about cloud computing security? Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley.

  16. Díaz-Sánchez, D., Marín López, A., Almenárez Mendoza, F., Campo Vázquez, C., & García-Rubio, C. (2007). Context awareness in network selection for dynamic environments. Telecommunication Systems, 36, 49–60. doi:10.1007/s11235-007-9058-9.

    Article  Google Scholar 

  17. Díaz-Sánchez, D., Almenárez, F., Marín, A., Arias, P., Sanchez-Guerrero, R., & Sanvido, F. (2011). A privacy aware media gateway for connecting private multimedia clouds to limited devices. In Wireless and mobile networking conference (WMNC), 2011 4th joint IFIP (pp. 1–8). doi:10.1109/WMNC.2011.6097259.

    Chapter  Google Scholar 

  18. Díaz-Sánchez, D., Almenárez, F., Marín, A., Proserpio, D., & Arias, P. (2011). Media cloud: an open cloud computing middleware for content management. IEEE Transactions on Consumer Electronics, 57(2), 970–978. doi:10.1109/TCE.2011.5955247.

    Article  Google Scholar 

  19. Erdogmus, H. (2009). Cloud computing: does nirvana hide behind the nebula? IEEE Software, 26(2), 4–6. doi:10.1109/MS.2009.31.

    Article  Google Scholar 

  20. Erickson, J., Spence, S., Rhodes, M., Banks, D., Rutherford, J., Simpson, E., Belrose, G., & Perry, R. (2009). Content-centered collaboration spaces in the cloud. IEEE Internet Computing, 13(5), 34–42. doi:10.1109/MIC.2009.93.

    Article  Google Scholar 

  21. Filipovic, P. (2008). The future of home networks—a global perspective (Tech. rep.). The Diffusion Group.

  22. Geambasu, R., Kohno, T., Levy, A. A., Levy, H. M. (2009). Vanish: increasing data privacy with self-destructing data.

  23. Gellman, R. (2009). Privacy in the Clouds: risks to privacy and confidentiality from Cloud Computing (Tech. rep.).

  24. Goodrich, M. T., & Mitzenmacher, M. (2011). Invertible bloom lookup tables. CoRR, 1101.2245.

  25. Gray, J. (2008). Distributed computing economics. Queue, 6(3), 63–68. doi:10.1145/1394127.1394131.

    Article  Google Scholar 

  26. Grzonkowski, S., Corcoran, P., & Coughlin, T. (2011). Security analysis of authentication protocols for next-generation mobile and ce cloud services. In IEEE international conference on consumer electronics-Berlin (ICCE-Berlin) (pp. 83–87). doi:10.1109/ICCE-Berlin.2011.6031855.

    Google Scholar 

  27. Hammer-Lahav, E. (2010)). The OAuth 1.0 Protocol. RFC 5849 (Informational). http://www.ietf.org/rfc/rfc5849.txt.

  28. Hardt, D. (2005). Identity 2.0. Keynote Talk at OSCON 2005.

  29. Heynen, J. (2011). Home networking devices. Tech. rep., Infonetics Research.

  30. Hirsch, F., Philpott, R., & Maler, E. (2005). Security and privacy considerations for the oasis security assertion markup language (saml) v2.0. Tech. rep., OASIS Standard.

  31. Kahl, C., Böttcher, K., Tschersich, M., Heim, S., & Rannenberg, K. (2010). How to enhance privacy and identity management for mobile communities: approach and user driven concepts of the picos project. In K. Rannenberg, V. Varadharajan, & C. Weber (Eds.), Security and privacy silver linings in the cloud: Vol. 330. IFIP advances in information and communication technology, pp. 277–288). Boston: Springer.

    Google Scholar 

  32. Ko, R. K. L., Jagadpramana, P., & Lee, B. S. (2011). Flogger: a file-centric logger for monitoring file access and transfers within cloud computing environments. International Joint Conference of IEEE TrustCom/IEEE ICESS/FCST (pp. 765–771). doi:10.1109/TrustCom.2011.100.

  33. Lampropoulos, K., Diaz-Sanchez, D., Almenares, F., Weik, P., & Denazis, S. (2010). Introducing a cross federation identity solution for converged network environments. In Principles, systems and applications of IP telecommunications, IPTComm ’10 (pp. 1–11). New York: ACM. doi:10.1145/1941530.1941532.

    Chapter  Google Scholar 

  34. Massonet, P., Naqvi, S., Ponsard, C., Latanicki, J., Rochwerger, B., & Villari, M. (2011). A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures. In IEEE international symposium on parallel and distributed processing workshops and Phd forum (IPDPSW), 2011 (pp. 1510–1517). doi:10.1109/IPDPS.2011.304.

    Chapter  Google Scholar 

  35. Nauman, M., Ali, T., & Rauf, A. (2013). Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommunication Systems, 52, 1–13. doi:10.1007/s11235-011-9538-9.

    Article  Google Scholar 

  36. Palfrey, J., & Gasser, U. (2008). Born digital: understanding the first generation of digital natives/John Palfrey and Urs Gasser. New York: Basic Books.

    Google Scholar 

  37. Parkhill, D. F. (1966). The challenge of the computer utility by Parkhill, D. F. Reading: Addison-Wesley.

    Google Scholar 

  38. Pearson, S. (2009). Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE workshop on software engineering challenges of cloud computing, CLOUD ’09 (pp. 44–52). Washington: IEEE Comput. Soc. doi:10.1109/CLOUD.2009.5071532.

    Chapter  Google Scholar 

  39. Presser, A., Farrell, L., Kemp, D., Lupton, W., Tsuruyama, S., & Albright, S. (2008). Upnp device architecture (Tech. Rep. V1.1). UPnP Forum.

  40. Shah, M. A., Baker, M., Mogul, J. C., & Swaminathan, R. (2007). Auditing to keep online storage services honest. In Proceedings of the 11th USENIX workshop on hot topics in operating systems (pp. 11:1–11:6). Berkeley: USENIX Association. http://dl.acm.org/citation.cfm?id=1361397.1361408.

    Google Scholar 

  41. Simoes, J., & Magedanz, T. (2011). Contextualized user-centric multimedia delivery system for next generation networks. Telecommunication Systems, 48, 301–316. doi:10.1007/s11235-010-9345-8.

    Article  Google Scholar 

  42. Sánchez, R., Arias, P., Almenares, F., & Díaz-Sánchez, D. (2012). Trust-aware federated idm in consumer cloud computing. In Proc. IEEE int. conference on consumer electronics (pp. 1–2). New York: IEEE Press.

    Google Scholar 

  43. Sánchez-Guerrero, R., Almenarez, F., Díaz-Sánchez, D., Marín, A., & Arias, P. (2010). Improving privacy in identity management systems for healthcare scenarios. In Third international symposium on ubiquitous computing and ambient intelligence (Ucami2011) (pp. 1–5).

    Google Scholar 

  44. Tang, Y., Lee, P. P. C., Lui, J. C. S., & Perlman, R. (2010). FADE: secure overlay cloud storage with file assured deletion security and privacy in communication networks (Vol. 22, pp. 380–397). Berlin: Springer. doi:10.1007/978-3-642-16161-2_22.

    Google Scholar 

  45. Tian, Y., Song, B., & Huh, E. N. (2011). Towards the development of personal cloud computing for mobile thin-clients. In International conference on information science and applications (ICISA), 2011 (pp. 1–5). doi:10.1109/ICISA.2011.5772368.

    Chapter  Google Scholar 

  46. Velte, T., Velte, A., & Elsenpeter, R. (2010). Cloud computing, a practical approach (1st ed.). New York: McGraw-Hill.

    Google Scholar 

  47. Voas, J., & Zhang, J. (2009). Cloud computing: new wine or just a new bottle? IT Professional, 11(2), 15–17. doi:10.1109/MITP.2009.23.

    Article  Google Scholar 

  48. Wang, C., Wang, Q., Ren, K., & Lou, W. (2009). Ensuring data storage security in cloud computing. In 17th international workshop on quality of service, 2009, IWQoS (pp. 1–9). doi:10.1109/IWQoS.2009.5201385.

    Google Scholar 

  49. Wehrle, K., & Steinmetz, R. (2005). Peer-to-peer-based applications. In Peer-to-peer systems and applications (pp. 1–5).

    Chapter  Google Scholar 

  50. Weiss, A. (2007). Computing in the clouds. Networker, 11, 16–25.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Díaz-Sánchez.

Additional information

This work has been partially supported by the State of Madrid (CAM), Spain under the contract number S2009/TIC-1650, project E-Madrid.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Díaz-Sánchez, D., Almenarez, F., Marín, A. et al. Media Gateway: bringing privacy to private multimedia cloud connections. Telecommun Syst 55, 315–330 (2014). https://doi.org/10.1007/s11235-013-9783-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-013-9783-1

Keywords

Navigation