skip to main content
research-article

Achieving simultaneous distribution control and privacy protection for Internet media delivery

Published: 16 May 2008 Publication History

Abstract

Massive Internet media distribution demands prolonged continuous consumption of networking and disk bandwidths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability and performance issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without copyright protection, content providers are hesitant to use proxy-based fast distribution techniques. Second, little has been done to protect client privacy during content accesses on the Internet. Straightforward solutions to address these two issues independently lead to conflicts. For example, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this article, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms in a cooperative proxy environment where our proposed scheme works efficiently and practically. Simulation-based experiments are conducted to extensively evaluate the proposed system. Preliminary results demonstrate the effectiveness of our proposed strategy.

References

[1]
an dI. Visconti, P. P. 2000. User privacy issues regarding certificates and the tls protocol. In Proceedings of Conference on Computer and Communications Security. Athens, Greece.]]
[2]
Bao, F., Deng, R., and Feng, P. 2000. An efficient and practical scheme for privacy protection in the e-commerce of digital goods. In Proceedings of the 3rd International Conference on Information Security and Cryptology.]]
[3]
Bao, F., Deng, R., Feng, P., Guo, Y., and Wu, H. 2001. Secure and private distribution of online video and several related cryptographic issues. In Proceedings of the 6th Australia Conference on Information Security and Privacy. Sidney, Australia.]]
[4]
Bonatti, P. A. and Samarati, P. 2002. A uniform framework for regulating service access and information release on the web. In J. Comput. Secur. 10, 3.]]
[5]
Boneh, D., Ding, X., Tsudik, G., and Wong, C. 2001. A method for fast revocation of public key certificates and security capabilities. In Proceedings of USENIX Security. Washington, D.C.]]
[6]
Brands, S. 2000. Rethinking public key infrastructures and digital certificates: Building in privacy. In Rethinking Public Key Infrastructures and Digital Certificates. MIT Press.]]
[7]
Camenisch, J. and Herreweghen, E. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]]
[8]
Chae, Y., Guo, K., Buddhikot, M., Suri, S., and Zegura, E. 2002. Silo, rainbow, and caching token: Schemes for scalable fault tolerant stream caching. In IEEE J. Select. Areas Comm.]]
[9]
Chaum, D. 1985. Security without identification: Transactions system to make big brother obsolete. In Comm. ACM. 24, 2.]]
[10]
Chen, S., Chen, S., Guo, H., Shen, B., and Jajodia, S. 2006. Efficient proxy-based internet media distribution control and privacy protection infrastructure. In Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS '06). New Haven, CT.]]
[11]
Chiu, M. Y. and Yeung, K. H. 1997. Partial video sequence caching scheme for vod systems with heteroeneous clients. In Proceedings of the 13th International Conference on Data Engineering. Birmingham, UK.]]
[12]
Chor, B. and Gilboa, N. 1997. Computational private information retrieval. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing.]]
[13]
Coron, J., Naccache, D., and Stern, J. 1999. On the security of rsa padding. In Proceedings of Crypto. Santa Barbara, CA.]]
[14]
Diffie, W. and Hellman, M. 1976. New directions in cryptography. In IEEE Trans. Inform. Theory. 22, 6, 644--654.]]
[15]
Dingledine, R., Mathewson, N., and Syverson, P. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium.]]
[16]
Freedman, M. J. and Morris, R. 2002. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). Washington, DC.]]
[17]
Gamal, T. 1985. A public key cryptosystem and signature scheme based on the discrete logarithm. IEEE Trans. Inform. Theory 4.]]
[18]
Gertner, Y., Ishai, Y., Kushilevita, E., and Malkin, T. 1998. Protecting data privacy in private information retrieval schemes. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing.]]
[19]
Golle, P. and Juels, A. 2004. Parallel mixing. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]]
[20]
Griwodz, C., Merkel, O., Dittmann, J., and Steinmetz, R. 1998. Protecting vod the easier way. In Proceedings of the 6th ACM Multimedia Conference. Bristol, UK.]]
[21]
Holt, J., Bradshaw, R., Seamons, K., and Orman, H. 2003. Hidden credentials. In Proceedings of the ACM Workshop on Privacy in the Electronic Society. Washington, DC.]]
[22]
Kangasharju, J., Hartanto, F., Reisslein, M., and Ross, K. W. 2001. Distributing layered encoded video through caches. In Proceedings of IEEE Inforcom. Anchorage, AK.]]
[23]
Mediacom. http://www.mediacomcc.com/.]]
[24]
Miao, Z. and Ortega, A. 2002. Scalable proxy caching of video under storage constraints. In IEEE J. Select. Areas Comm.]]
[25]
Park, J. and Sandhu, R. 1999. Extending x.509 for secure attribute services on the web. In Proceedings of the 22nd National Information Systems and Security Conference. Crystal City, VA.]]
[26]
Reiter, M. K. and Rubin, A. D. 1999. Anonymous web transactions with crowds. In Comm. ACM. 42, 2, 32--48.]]
[27]
Reiter, M. K. and Wang, X. 2004. Fragile mixing. In Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC.]]
[28]
Rejaie, R., H. Yu, M. H., and Estrin, D. 2000. Multimedia proxy caching mechanism for quality adaptive streaming applications in the internet. In Proceedings of IEEE INFOCOM. Tel-Aviv, Israel.]]
[29]
Roy, S., Shen, B., Chen, S., and Zhang, X. 2004. An empirical study of a segment-based streaming proxy in an enterprise environment. In Proceedings of the 9th International Workshop on Web Content Caching and Distribution. Beijing, China.]]
[30]
RSA Laboratories. 2002. PKCS 1 v2.1: RSA cryptography standard.]]
[31]
Schojer, P., Boszormenyi, L., Hellwagner, H., Penz, B., and Podlipnig, S. 2003. Architecture of a quality based intelligient proxy (qbix) for mpeg-4 videos. In Proceedings of WWW. Budapest, Hungary.]]
[32]
Sen, S., Rexford, J., and Towsley, D. 1999. Proxy prefix caching for multimedia streams. In Proceedings of IEEE INFOCOM. New York, NY.]]
[33]
Shi, C. and Bhargava, B. 1998. A fast mpeg video encryption algorithm. In Proceedings of the 6th ACM Multimedia Conference. Bristol, UK.]]
[34]
Stallings, W. 1998. Cryptography and Network Security: Principles and Practice. Prentice Hall.]]
[35]
Tosun, A. S. and Feng, W. C. 2002. Secure video transmission using proxies. Tech. rep., Computer and Information Science, Ohio State University.]]
[36]
Wen, J., Severa, M., Zeng, W., Luttrell, M., and Jin, W. 2002. A format compliant configurable encryption framework for access control of video. In IEEE Trans. Circ. Syst. Video Tech. (Special Issue on Wireless Video), 545--557.]]
[37]
Winsborough, W. and Li, N. 2002a. Protecting sensitive atributes in automated trust negotiation. In Proceedings of the ACM Workshop on Privacy in the Electronic Society. Washington, DC.]]
[38]
Winsborough, W. and Li, N. 2002b. Towards practical autmated trust negeotiation. In Proceedings of the 3rd Workshop on Policies for Distributed Systems and Networks. Monterey, CA.]]
[39]
Wu, K., Yu, P. S., and Wolf, J. 2001. Segment-based proxy caching of multimedia streams. In Proceedings of WWW. Hongkong, China.]]
[40]
Wu, Y. and Bao, F. 2004. Collusion attack on a multi-key secure video proxy scheme. In Proceedings of the ACM Multimedia Conference. New York, NY.]]
[41]
Yang, H. and Lu, S. 2004. Commutative cipher based en-route filtering in wireless sensor networks. In Proceedings of IEEE VTC Wireless Security Symposium. Los Angeles, CA.]]
[42]
Yeung, S., Lui, J., and Yau, D. 2002. A case for multi-key secure video proxy: Theory, design, and implementation. In Proceedings of the ACM Multimedia Conference. Juan-les-Pins, France.]]
[43]
Yeung, S., Lui, J. C., and Yau, D. K. 2005. A multi-key secure multimedia proxy using asymmetric reversible parametric sequences: Theory, design, and implementation. In IEEE Trans. Multimedia. 7.]]
[44]
Zhang, Z., Wang, Y., Du, D., and Su, D. 2000. Video staging: A proxy-server based approach to end-to-end video delivery over wide-area networks. IEEE Trans. Netw. 8. 429--442.]]

Cited By

View all
  • (2015)The Data Quality Evaluation that Under the Background of Wisdom CityRevised Selected Papers, Part II, of the 5th International Conference on Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques - Volume 924310.1007/978-3-319-23862-3_61(612-621)Online publication date: 14-Jun-2015
  • (2012)A fully private video on-Demand service2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)10.1109/CCECE.2012.6334991(1-4)Online publication date: Apr-2012

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 4, Issue 2
May 2008
197 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/1352012
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 May 2008
Accepted: 01 September 2007
Revised: 01 May 2007
Received: 01 January 2007
Published in TOMM Volume 4, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Distribution control
  2. cooperative proxy
  3. distribution control
  4. media delivery
  5. privacy
  6. proxy caching

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2015)The Data Quality Evaluation that Under the Background of Wisdom CityRevised Selected Papers, Part II, of the 5th International Conference on Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques - Volume 924310.1007/978-3-319-23862-3_61(612-621)Online publication date: 14-Jun-2015
  • (2012)A fully private video on-Demand service2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)10.1109/CCECE.2012.6334991(1-4)Online publication date: Apr-2012

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media