Skip to main content

Digital Rights Management and Access Control in Multimedia Social Networks

  • Conference paper
Genetic and Evolutionary Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 238))

Abstract

The emerging multimedia social networks (MSN) services have significantly improved and enriched consumers’ experiences on multimedia digital contents, and further spurred the misuse and malicious dissemination of digital media (rights) among users. Thus, Digital Rights Management (DRM) issue is becoming more prominent. The theories and methods for security, trustworthiness, controllability of DRM systems available do not meet the needs of the novel Internet application, which is an urgent problem to solve. This paper analyzed traditional access control technologies and social network properties, and made a survey on related home and abroad research progresses on DRM security technologies, multimedia social networks access control and media contents copyrights protection. Finally, several main research directions were addressed on the key technologies of DRM, from three layers of cloud media services, media networks admission and user social networks, respectively, that is media content access control, media terminal trusted admission and media rights secure distribution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhang, Z.Y.: Digital Rights Management Ecosystem and its Usage Controls: A Survey. International Journal of Digital Content Technology & Its Applications 5(3), 255–272 (2011)

    Article  Google Scholar 

  2. Zhang, Z.Y.: Security, Trust and Risk in Digital Rights Management Ecosystem. Science Press, China (2012)

    Google Scholar 

  3. Zhu, W.W., Luo, C., Wang, J.F., Li, S.P.: Multimedia cloud computing. IEEE Signal Processing Magazine 28(3), 59–69 (2011)

    Article  Google Scholar 

  4. Gadea, C., Solomon, B., Ionescu, B., et al.: A collaborative cloud-based multimedia sharing platform for social networking environments. In: Proc. of International Conference on Computer Communications and Networks, Maui, HI, USA, pp. 1–6 (August 2011)

    Google Scholar 

  5. Diaz-Sanchez, D., Almenarez, F., Marin, A., Proserpio, D., Cabarcos, P.A.: Media cloud: An open cloud computing middleware for content management. IEEE Transactions on Consumer Electronics 57(2), 970–978 (2011)

    Article  Google Scholar 

  6. Huang, T., Zhang, Z.Y., Chen, Q.L., et al.: A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing. International Journal of Digital Content Technology & Its Applications 7(4), 795–802 (2013)

    Article  MathSciNet  Google Scholar 

  7. Pretschner, A., Hilty, M., Schütz, F., et al.: Usage Control Enforcement: Present and Future. IEEE Security & Privacy 6(4), 44–53 (2008)

    Article  Google Scholar 

  8. Koushanfar, F.: Provably secure active IC metering techniques for piracy avoidance and digital rights management. IEEE Transactions on Information Forensics and Security 7(1), 51–63 (2012)

    Article  Google Scholar 

  9. Yan, X.X., Ma, J.F., Yang, Y.F., et al.: Identity-based domain key distribution protocol in the E-document security management. Journal of Communications 33(5), 12–20 (2012)

    Google Scholar 

  10. Lee, S., Lee, H.R., Lee, S.K.: DRMFS: A file system layer for transparent access semantics of DRM-protected contents. The Journal of Systems and Software 85(5), 1058–1066 (2012)

    Article  Google Scholar 

  11. Zhang, G., Zhu, Z., Wang, P., Song, B.: A TCM-enabled access control scheme. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. (eds.) ICA3PP 2011, Part II. LNCS, vol. 7017, pp. 312–320. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Thomas, T., Emmanuel, S., Subramanyam, A.V.: Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture. IEEE Transactions on Information Forensics and Security 4(4), 758–767 (2009)

    Article  Google Scholar 

  13. Bhatt, S., Sion, R., Carbunar, B.: A Personal Mobile DRM Manager for Smartphones. Computers & Security 28(6), 327–340 (2009)

    Article  Google Scholar 

  14. Lee, S., Kim, J., Hong, S.J.: Redistributing Time-based Rights between Consumer Devices for Content Sharing in DRM System. International Journal of Information Security 8(4), 263–273 (2009)

    Article  MathSciNet  Google Scholar 

  15. Feng, X., Tang, Z., Yu, Y.Y.: An Efficient Contents Sharing Method for DRM. In: Proc. of 2009 Consumer Communications and Networking Conference. 5th IEEE Workshop on DRM, Las Vegas, NV, pp. 1–5 (2009)

    Google Scholar 

  16. Win, L.L., Thomas, T., Emmanuel, S.: Secure interoperable digital content distribution mechanisms in a multi-domain architecture. Multimedia Tools and Applications 60(1), 97–128 (2012)

    Article  Google Scholar 

  17. Villegas, W.: A trust-based access control scheme for social networks. School of Computer Science, McGill University, Montreal (2008)

    Google Scholar 

  18. Gates, C.: Access Control Requirements for Web 2.0 Security and Privacy. Position paper accepted to the Workshop on Web 2.0 Security and Privacy, Oakland, California, United States (2007)

    Google Scholar 

  19. Hart, M., Johnson, R., Stent, A.: More content – less control: access control in the web 2.0. In: Proc. of the Web 2.0 Security and Privacy Workshop on Online Social Networks, WOSN (2007)

    Google Scholar 

  20. Barbara, C., Elena, F., Raymond, H., Murat, K.: Semantic web-based social network access control. Computers and Security 30(2), 108–115 (2011)

    Google Scholar 

  21. Park, J., Sandhu, R., Cheng, Y.: A User-Activity-Centric Framework for Access Control in Online Social Networks. IEEE Internet Computing 15(5), 62–65 (2011)

    Article  Google Scholar 

  22. Ali, B., Villegas, W., Maheswaran, M.: A trust based approach for protecting user data in social networks. In: Proc. of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, Richmond Hill, Ontario, Canada, pp. 288–293 (2007)

    Google Scholar 

  23. Kruk, S.R., Grzonkowski, S., Gzella, A., Woroniecki, T., Choi, H.-C.: D-FOAF: Distributed Identity Management with Access Rights Delegation. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 140–154. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  24. Wang, H., Sun, L.L.: Trust-involved access control in collaborative open social networks. In: Proc. of the 2010 4th International Conference on Network and System Security (NSS), Melbourne, VIC, pp. 239–246 (2010)

    Google Scholar 

  25. Sachan, A., Emmanuel, S., Kankanhalli, M.: An efficient access control method for multimedia social networks. In: Proc. of the 2nd ACM SIGMM Workshop on Social Media, Firenze, Italy, pp. 33–38 (October 2010)

    Google Scholar 

  26. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of the 28th International Conference on Very Large Data Bases, pp. 143–154 (2002)

    Google Scholar 

  27. LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting disclosure in Hippocratic databases. In: Proc. of the 13th Very Large Data Bases, pp. 108–119 (2004)

    Google Scholar 

  28. Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-aware role based access control. IEEE Security and Privacy 7(4), 35–43 (2009)

    Article  Google Scholar 

  29. Tian, L.Q.: A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network. Chinese Journal of Computers 30(11), 1930–1938 (2007)

    Google Scholar 

  30. Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1734–1744. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  31. Wang, Z., Sun, L.F., Chen, X.W., et al.: Propagation-based social-aware replication for social video contents. In: Proc. of the 20th ACM International Conference on Multimedia, Nara, Japan, pp. 29–38 (2012)

    Google Scholar 

  32. Ye, C.H., Ling, H.F., Zou, F.H., Liu, C.: Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain. In: Proc. of the 20th ACM International Conference on Multimedia, Nara, Japan, pp. 1117–1120 (October 2012)

    Google Scholar 

  33. Lian, S.Q., Chen, X., Wang, J.W.: Content distribution and copyright authentication based on combined indexing and watermarking. Multimedia Tools and Applications 57(1), 49–66 (2012)

    Article  Google Scholar 

  34. Chung, M.B., Ko, I.J.: Intelligent copyright protection system using a matching video retrieval algorithm. Multimedia Tools and Applications 59(1), 383–401 (2012)

    Article  Google Scholar 

  35. Yeh, L.Y., Huang, Y.L., et al.: A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks. IEEE Transactions on Vehicular Technology 61(4), 1907–1924 (2012)

    Article  Google Scholar 

  36. Ren, Y.Z., Li, M.C., Sakurai, K.: FineTrust: A fine-grained trust model for peer-to-peer networks. Security and Communication Networks 4(1), 61–69 (2011)

    Article  Google Scholar 

  37. Zhang, Z.Y., Wang, K.L.: A Trust Model for Multimedia Social Networks. Social Networks Analysis and Mining, 1–11 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Enqiang Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, E., Liu, Z., Shao, F. (2014). Digital Rights Management and Access Control in Multimedia Social Networks. In: Pan, JS., Krömer, P., Snášel, V. (eds) Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, vol 238. Springer, Cham. https://doi.org/10.1007/978-3-319-01796-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01796-9_27

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01795-2

  • Online ISBN: 978-3-319-01796-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics