Trust Issues and Solutions in Multimedia Content Distribution

Shiguo Lian
{"title":"Trust Issues and Solutions in Multimedia Content Distribution","authors":"Shiguo Lian","doi":"10.4018/jdtis.2010070103","DOIUrl":null,"url":null,"abstract":"Multimedia content distribution is a key technique for multimedia services, which transmits multimedia content from a sender to certain receiver(s). With the popularity of multimedia services, the trust issues in content distribution becomes urgent, including the authorized access, privacy protection, trusted payment, piracy surveillance, and so forth. This chapter introduces the trust issues in multimedia content distribution (e.g., authorization, authentication, privacy, payment, ownership, illegal distribution, forgery, etc.), reviews the latest research progress of the solutions, and presents some open issues and promising research topics. It is expected to provide valuable information to researchers or engineers in this field. DOI: 10.4018/978-1-61520-682-7.ch005 International Journal of Dependable and Trustworthy Information Systems, 1(3), 32-54, July-September 2010 33 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. an important topic (Kelton, et al., 2008). And, many discussions of trust in this environment focus on issues like security or technical reliability. Specially, in security engineering, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy (Taipale, 2005). As such, a trusted system is one whose failure may break a specified security policy. It is often defined from four aspects, i.e., classified information, trusted computing, policy analysis and information theory. In classified information, trusted systems are used for the processing, storage and retrieval of sensitive or classified information. In trusted computing, trust is used by the Trusted Computing Group (TCG, 2009) mainly in the sense of authorization that defines whether a user is authorized to do something. In policy analysis, trusted systems in the context of national or homeland security, law enforcement, or social control policy are systems in which some conditional prediction about the behavior of people or objects within the system has been determined prior to authorizing access to system resources. In information theory, a trusted system is based on the definition of ‘Trust is that which is essential to a communication channel but cannot be transferred from a source to a destination using that channel’ (Gerck, 1998). This chapter will focus on the trust in security engineering. Multimedia content distribution (e.g., digital TV, mobile TV, IPTV, online music, etc.) is a kind of digital information system (Lian & Zhang, 2009), which becomes more and more popular with the rapid development of network technology and multimedia technology. Thus, the trust in multimedia content distribution is urgent, especially the security aspects. Generally, a multimedia distribution system, composed of the sender (and device), receiver (and device), transmission channel, storage device, etc., distributes the multimedia content from the sender(s) to receiver(s) through various communication manners. Multimedia content’s properties, such as large volumes, worthy commerce value, real time interaction, etc., make multimedia distribution systems different from traditional information systems. Till now, some means to confirm the trust in multimedia distribution have been proposed (Lian, 2009). However, few works has been done to show the progress of trust issues and solutions in this field. This chapter aims to review the latest research results in trust issues and solutions for multimedia distribution, and provide valuable information to researchers or engineers. The rest of the chapter is organized as follows. Section 2 reviews related work. A number of trust issues in multimedia content distribution are discussed in Section 3. In Section 4, solutions to ensure trust are introduced in detail. Furthermore, we propose some open issues and hot topics in Section 5. Finally, conclusions are drawn in the last section.","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Dependable Trust. Inf. Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/jdtis.2010070103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Multimedia content distribution is a key technique for multimedia services, which transmits multimedia content from a sender to certain receiver(s). With the popularity of multimedia services, the trust issues in content distribution becomes urgent, including the authorized access, privacy protection, trusted payment, piracy surveillance, and so forth. This chapter introduces the trust issues in multimedia content distribution (e.g., authorization, authentication, privacy, payment, ownership, illegal distribution, forgery, etc.), reviews the latest research progress of the solutions, and presents some open issues and promising research topics. It is expected to provide valuable information to researchers or engineers in this field. DOI: 10.4018/978-1-61520-682-7.ch005 International Journal of Dependable and Trustworthy Information Systems, 1(3), 32-54, July-September 2010 33 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. an important topic (Kelton, et al., 2008). And, many discussions of trust in this environment focus on issues like security or technical reliability. Specially, in security engineering, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy (Taipale, 2005). As such, a trusted system is one whose failure may break a specified security policy. It is often defined from four aspects, i.e., classified information, trusted computing, policy analysis and information theory. In classified information, trusted systems are used for the processing, storage and retrieval of sensitive or classified information. In trusted computing, trust is used by the Trusted Computing Group (TCG, 2009) mainly in the sense of authorization that defines whether a user is authorized to do something. In policy analysis, trusted systems in the context of national or homeland security, law enforcement, or social control policy are systems in which some conditional prediction about the behavior of people or objects within the system has been determined prior to authorizing access to system resources. In information theory, a trusted system is based on the definition of ‘Trust is that which is essential to a communication channel but cannot be transferred from a source to a destination using that channel’ (Gerck, 1998). This chapter will focus on the trust in security engineering. Multimedia content distribution (e.g., digital TV, mobile TV, IPTV, online music, etc.) is a kind of digital information system (Lian & Zhang, 2009), which becomes more and more popular with the rapid development of network technology and multimedia technology. Thus, the trust in multimedia content distribution is urgent, especially the security aspects. Generally, a multimedia distribution system, composed of the sender (and device), receiver (and device), transmission channel, storage device, etc., distributes the multimedia content from the sender(s) to receiver(s) through various communication manners. Multimedia content’s properties, such as large volumes, worthy commerce value, real time interaction, etc., make multimedia distribution systems different from traditional information systems. Till now, some means to confirm the trust in multimedia distribution have been proposed (Lian, 2009). However, few works has been done to show the progress of trust issues and solutions in this field. This chapter aims to review the latest research results in trust issues and solutions for multimedia distribution, and provide valuable information to researchers or engineers. The rest of the chapter is organized as follows. Section 2 reviews related work. A number of trust issues in multimedia content distribution are discussed in Section 3. In Section 4, solutions to ensure trust are introduced in detail. Furthermore, we propose some open issues and hot topics in Section 5. Finally, conclusions are drawn in the last section.
多媒体内容分发中的信任问题及解决方案
多媒体内容分发是多媒体业务的一项关键技术,它将多媒体内容从发送者传送到特定的接收者。随着多媒体服务的普及,内容分发中的信任问题日益突出,包括授权访问、隐私保护、可信支付、盗版监控等。本章介绍了多媒体内容分发中的信任问题(如授权、认证、隐私、支付、所有权、非法分发、伪造等),综述了解决方案的最新研究进展,并提出了一些有待解决的问题和有前景的研究课题。期望为该领域的研究人员或工程师提供有价值的信息。DOI: 10.4018 / 978-1-61520-682-7。33版权所有©2010,IGI Global. ch005国际可靠与可信信息系统学报,1(3),32- 54,2010年7 - 9月未经IGI Global书面许可,禁止以印刷或电子形式复制或分发。一个重要的话题(Kelton, et al., 2008)。而且,在这种环境中,许多关于信任的讨论都集中在安全性或技术可靠性等问题上。特别地,在安全工程中,可信系统是在一定程度上依赖于执行特定安全策略的系统(Taipale, 2005)。因此,可信系统是其故障可能破坏指定安全策略的系统。通常从机密信息、可信计算、策略分析和信息论四个方面对其进行定义。在机密信息中,可信系统用于处理、存储和检索敏感或机密信息。在可信计算中,可信计算组(TCG, 2009)主要在授权意义上使用信任,即定义用户是否被授权做某事。在策略分析中,国家或国土安全、执法或社会控制政策环境中的可信系统是这样的系统:在授权访问系统资源之前,已经对系统内的人或对象的行为进行了一些条件预测。在信息论中,可信系统是基于这样的定义:“信任是对通信渠道至关重要的东西,但不能通过该渠道从源头转移到目的地”(Gerck, 1998)。本章将重点讨论安全工程中的信任。多媒体内容分发(如数字电视、移动电视、IPTV、在线音乐等)是一种数字信息系统(Lian & Zhang, 2009),随着网络技术和多媒体技术的快速发展,多媒体内容分发越来越受欢迎。因此,多媒体内容分发中的信任问题,尤其是安全问题,刻不容缓。多媒体分发系统一般由发送方(及设备)、接收方(及设备)、传输信道、存储设备等组成,通过各种通信方式将多媒体内容从发送方分发给接收方。多媒体内容量大、商业价值高、互动性强等特性使多媒体发布系统有别于传统的信息系统。到目前为止,已经提出了一些确认多媒体分发信任的方法(Lian, 2009)。然而,很少有工作表明信任问题和解决方案在这一领域的进展。本章旨在回顾多媒体分发信任问题和解决方案的最新研究成果,为研究人员或工程师提供有价值的信息。本章的其余部分组织如下。第二节回顾了相关工作。第3节将讨论多媒体内容分发中的一些信任问题。在第4节中,详细介绍了确保信任的解决方案。此外,我们在第5节提出了一些开放问题和热点问题。最后,在最后一节得出结论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信