Skip to main content
Log in

Service and P2P based secure media sharing in mobile commerce environments

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

Service technology is slowly evolving to be a promising technology for developing applications in open, loosely coupled and distributed computing environments, e.g., in mobile commerce (m-commerce). Services technology can shield the heterogeneous platforms and is suitable for m-commerce applications. Peer-to-Peer (P2P) technology becomes more and more popular for mobile commerce applications. For secure media distribution in m-commerce applications, the security and P2P rights management become more and more urgent. New schemas and architectures for secure P2P based m-commerce applications, which are expected to function automatically or semi-automatically, are expected. In this paper, a secure media service system is presented, which can trace illegal distributors in m-commerce applications. In this scheme, the decryption operation and fingerprint embedding operation are combined together, which avoids the leakage of clear media content in mobile transfer. Additionally, these operations are implemented by the peer, which makes the scheme compliant with existing Peer-to-Peer Digital Rights Management (DRM) systems and very proper for secure media distribution in m-commerce applications. The architectures and modes of secure media distribution in m-commerce environment are presented and discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Milojicic, D. S., Kalogeraki, V., Lukose, R., et al. (2002). Peer-to-Peer computing (Technical Report HPL-2002-57). HP Labs.

  2. Padmavathi, G., & Annadurai, S. (2006). A security framework for content-based publish–subscribe system. Electronic Commerce Research and Applications, 5(1), 78–90.

    Article  Google Scholar 

  3. Oram, A., et al. (2001). Peer to peer: harnessing the benefits of a disruptive technology. Sebastopol: O’Reilly & Associates.

    Google Scholar 

  4. OMA. Open Mobile Alliance Specification Version 2.0. http://www.openmobilealliance.org.

  5. ISMA (2005). Internet Streaming Media Alliance Implementation Specification 2.0. http://www.isma.tv.

  6. AACS (2004). Advanced Access Content System (AACS) technical overview. http://www.aacsla.com.

  7. Iwata, T., Abe, T., Ueda, K., & Sunaga, H. (2003). A DRM system suitable for P2P content delivery and the study on its implementation. In Proceedings of the 9th Asia-Pacific conference on communications (APCC) (Vol. 2, pp. 806–811).

    Google Scholar 

  8. Kwok, S. H., & Lui, S. M. (2001). A license management model to support B2C and C2C music sharing. In Proceedings international WWW conference, Hong-Kong (pp. 136–137).

    Google Scholar 

  9. Kalker, T., Epema, D. H. J., Hartel, P. H., Lagendijk, R. L., & Vansteen, M. (2004). Music2Share—copyright-compliant music sharing in P2P systems. In Proceedings of the IEEE (pp. 961–970).

    Google Scholar 

  10. Sung, J. Y., Jeong, J. Y., & Yoon, K. S. (2006). DRM enabled P2P architecture. In Proceedings of the 8th international conference of advanced communication technology (ICACT) (Vol. 1, pp. 487–490).

    Chapter  Google Scholar 

  11. Zhang, Y., Yuan, C., & Zhong, Y. Z. (2007). Implementing DRM over Peer-to-Peer networks with broadcast encryption. In Lecture notes in computer science: Vol. 4810. Proceedings of the 8th Pacific Rim conference on multimedia (PCM) (pp. 236–245). Berlin: Springer.

    Google Scholar 

  12. Wu, M., Trappe, W., Wang, Z. J., & Liu, K. J. R. (2004). Collusion resistant multimedia fingerprinting: a unified framework. In Security, steganography, and watermarking of multimedia contents (Vol. 5306, pp. 748–759).

    Google Scholar 

  13. Kundur, D., & Karthik, K. (2004). Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE, 92(6), 918–932.

    Article  Google Scholar 

  14. Cox, I. J., Miller, M. L., & Bloom, J. A. (2002). Digital watermarking. San Mateo: Morgan Kaufmann.

    Google Scholar 

  15. Brown, I., Perkins, C., & Crowcroft, J. (1999). Watercasting: distributed watermarking of multicast media. In Lecture notes in computer science: Vol. 1736. Proceedings of international workshop on networked group communication (pp. 286–300). Berlin: Springer.

    Google Scholar 

  16. Lian, S., & Chen, X. Lightweight secure multimedia distribution based on homomorphic operations. Telecommunications System. doi:10.1007/s11235-010-9367-2.

  17. Lian, S., Liu, Z., Ren, Z., & Wang, H. (2006). Secure distribution scheme for compressed data streams. In Proceedings of 2006 IEEE conference on image processing (ICIP 2006) (pp. 1953–1956).

    Google Scholar 

  18. Lian, S., & Chen, X. (2010). Secure and traceable multimedia distribution for convergent mobile TV services. Computer Communications, 33(14), 1664–1673.

    Article  Google Scholar 

  19. Lian, S., Kanellopoulos, D., & Ruffo, G. (2009). Recent advances in multimedia information system security. Informatica, 33(1), 3–24.

    Google Scholar 

  20. Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in compressed video data. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774–778.

    Article  Google Scholar 

  21. Lian, S., & Wang, Z. (2008). Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Transactions on Circuits and Systems for Video Technology, 18(10), 1462–1467.

    Article  Google Scholar 

  22. Lian, S. (2008). Digital rights management for the home TV based on scalable video coding. IEEE Transactions on Consumer Electronics, 54(3), 1287–1293.

    Article  Google Scholar 

  23. Lian, S., & Liu, Z. (2008). Secure media content distribution based on the improved set-top box in IPTV. IEEE Transactions on Consumer Electronics, 54(2), 560–566.

    Article  Google Scholar 

  24. Lian, S. (2008). Multimedia content encryption: techniques and applications. London: Auerbach Publication, Taylor & Francis Group.

    Google Scholar 

  25. Lian, S., & Zhang, Y. (2009). Handbook of research on secure multimedia distribution. IGI Global (formerly Idea Group, Inc), March 2009.

  26. Lian, S., Chen, G., Cheung, A., & Wang, Z. (2004). A chaotic-neural-network based encryption algorithm for JPEG2000 encoded images. In Lecture notes in computer science: Vol. 3174. International symposium on neural network (ISNN2004), Dalian, China, May 2004 (pp. 627–632). Berlin: Springer.

    Google Scholar 

  27. Pilioura, T., Tsalgatidou, A., & Hadjiefthymiades, S. (2003). Scenarios of using web services in m-commerce. ACM SIGecom Exchanges, 3(4), 28–36.

    Article  Google Scholar 

  28. Kim, Y. K., & Ramjee, P. (2006). 4G roadmap and emerging communication technologies (pp. 12–13). Norwood: Artech House.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xi Chen.

Additional information

This work was partially supported by the National Natural Science Foundation of China under Grant Nos. 70901039 and 70732002, National Postdoctoral Science Foundation of China under Grant No. 20090450144, and by Jiangsu Postdoctoral Science Foundation under Grant No. 0901104C.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, X., Lian, S. Service and P2P based secure media sharing in mobile commerce environments. Electron Commer Res 11, 91–101 (2011). https://doi.org/10.1007/s10660-010-9069-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-010-9069-6

Keywords

Navigation