Skip to main content
Log in

CyVOD: a novel trinity multimedia social network scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

How to comprehensively explore, improve and deploy multimedia social networks (MSNs) has become a hot topic in the era of emerging pervasive mobile multimedia. More and more MSNs offer a great number of convenient tools, services, and applications for multimedia contents including video and audio that users share willingly and on demand. However, concerns with digital rights management (DRM)-oriented multimedia security, as well as the efficiency of multimedia usage and sharing are meanwhile intensified due to easier distribution and reproduction of multimedia content in a wide range of social networks. The paper proposes a comprehensive framework for multimedia social network, and realized a cross-platform MSN prototype system, named as CyVOD, to support two kinds of DRM modes. The proposed framework effectively protects copyrighted multimedia contents against piracy, and supports a more efficient recommendation system for its better handling of the tradeoff between multimedia security and ease of use.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Alsmirat MA, Jararweh Y, Al-Ayyoub M, Shehab MA, Gupta BB (2016) Accelerating compute intensive medical imaging segmentation algorithms using GPUs. Multimed Tools Appl. Springer

  2. Alsmirat MA, Jararweh Y, Obaidat I, Gupta BB (2016) Automated wireless video surveillance: an evaluation framework. J Real-Time Image Process. Springer

  3. Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta BB (2016) Secure and imperceptible digital image Steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl. Springer

  4. Chen S, Wang G, Jia W (2015) Kappa-fuzzy trust: efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph. Inf Sci 318:123–143

    Article  Google Scholar 

  5. Fatemeh R, Davarpanah JM, Ali M (2015) PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability. IET Inf Secur 9(1):73–80

    Article  Google Scholar 

  6. Feng W, Zhang Z, Wang J, Han L (2016) A novel authorization delegation for multimedia social networks by using proxy re-encryption. Multimed Tools Appl 75(21):13995–14014

    Article  Google Scholar 

  7. Fogues R, Such JM, Espinosa A, Garcia-Fornes A (2015) Open challenges in relationship-based privacy mechanisms for social network services. Int J Hum Comput Interact 31(5):350–370

    Article  Google Scholar 

  8. Gupta BB, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, USA

    Book  Google Scholar 

  9. Hu H, Ahn GJ, Jorgensen J (2013) Multiparty access control for online social networks: model and mechanisms. IEEE Trans Knowl Data Eng 25(7):1614–1627

    Article  Google Scholar 

  10. Huang J, Nie F, Huang H, Tu YC, Lei Y (2013) Social trust prediction using heterogeneous networks. ACM Trans Knowl Discov Data 7(4):1–21

    Article  Google Scholar 

  11. Jung Y, Joshi JBD (2014) CPBAC: property-based access control model for secure cooperation in online social networks. Comput Secur 41:19–39

    Article  Google Scholar 

  12. Nepal S, Bista SK, Paris C (2015) Behavior-based propagation of trust in social networks with restricted and anonymous participation. Comput Intell 31(4):642–668

    Article  MathSciNet  Google Scholar 

  13. Pasquale DM, Emilio F, Domenico R, Sarné GML (2015) Trust and compactness in social network groups. IEEE Trans Cybern 45(2):205–216

    Article  Google Scholar 

  14. Santa A, Pasquale DM, Emilio F, Sebastiano P, Alessandro P (2015) Trust networks topology, dynamics, and measurements. IEEE Internet Comput 19(6):26–35

    Article  Google Scholar 

  15. Sohn JS, Bae UB, Chung IJ (2013) Content recommendation method using social network analysis. Wirel Pers Commun 73(4):1529–1546

    Article  Google Scholar 

  16. Tang J, Gao H, Sarma AD, Bi Y, Liu H (2015) Trust evolution: modeling and its applications. IEEE Trans Knowl Data Eng 27(6):1724–1738

    Article  Google Scholar 

  17. Viejo A, Sánchez D (2015) Enforcing transparent access to private content in social networks by means of automatic sanitization. Expert Syst Appl 42(23):9366–9378

    Article  Google Scholar 

  18. Xu Y, Guo X, Hao J, Ma J, Lau RYK, Xu W (2012) Combining social network and semantic concept analysis for personalized academic researcher recommendation. Decis Support Syst 54(1):564–573

    Article  Google Scholar 

  19. Yu SJ (2012) The dynamic competitive recommendation algorithm in social network services. Inf Sci 187(1):1–14

    Article  Google Scholar 

  20. Zhang Z (2011) Digital rights management ecosystem and its usage controls: a survey. Int J Digit Content Technol Appl 5(3):255–272

    Article  Google Scholar 

  21. Zhang Z, Gupta BB (2016) Social media security and trustworthiness: overview and new direction. Futur Gener Comput Syst. doi:10.1016/j.future.2016.10.007

    Google Scholar 

  22. Zhang Z, Wang K (2013) A trust model for multimedia social networks. Soc Netw Anal Min 3(4):969–979

    Article  Google Scholar 

  23. Zhang Z, Wang Z, Niu D, Novel A (2015) Approach to rights sharing-enabling digital rights management for mobile multimedia. Multimed Tools Appl 74(16):6255–6271

    Article  Google Scholar 

  24. Zhang Z, Wang K, Formal A (2015) Analytic approach to credible potential path and mining algorithms for multimedia social networks. Comput J 58(4):668–678

    Article  Google Scholar 

Download references

Acknowledgements

The work was sponsored by National Natural Science Foundation of China Grant No.61370220, Plan For Scientific Innovation Talent of Henan Province Grant No.2017JR0011, Program for Innovative Research Team (in Science and Technology) in University of Henan Province Grant No.15IRTSTHN010, Program for Henan Province Science and Technology Grant No.142102210425, Project of the Cultivation Fund of Science and Technology Achievements of Henan University of Science and Technology Grant No.2015BZCG01. We give thanks to Xiaoxue Wang, Fangyun Liu, Cheng Li and Peining Shi for their technical assistance on CyVOD MSN prototype, and also would like to thank the reviewers and editor for their valuable comments, questions, and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiyong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Z., Sun, R., Zhao, C. et al. CyVOD: a novel trinity multimedia social network scheme. Multimed Tools Appl 76, 18513–18529 (2017). https://doi.org/10.1007/s11042-016-4162-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4162-z

Keywords

Navigation