Skip to main content
Erschienen in: Electronic Commerce Research 1/2015

01.03.2015

A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systems

verfasst von: Ray-I Chang, Tsao-Ta Wei, Chia-Hui Wang

Erschienen in: Electronic Commerce Research | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Thanks to media compression advance and prevalence of broadband Internet, diversified multimedia network applications in e-commerce systems are more vigorously developing than ever. The most attractive IPTV services are emerging to be deployed by peer-to-peer (P2P) architecture to achieve scalability over Internet. However, the intellectual property rights (IPR) of valuable IPTV content distributed over P2P networks are more needed to be considered. To effectively apply digital rights management (DRM) for the P2P IPTV services is definitely an important issue. In this paper, we propose an effective P2P IPTV DRM architecture for e-commerce systems based on the standards from Open Mobile Alliance (OMA). A cost-effective key distribution mechanism with leverage between DRM protection strength and system/network loading is further proposed to improve OMA DRM frameworks for P2P IPTV applications on the opportunistic multicast overlay to overcome the peer churns of leaving and joining. The simulations and experimental results demonstrate that the cost-effectiveness of proposed P2P DRM schemes in preserving both of IPR protections and QoS/QoE for P2P IPTV services for e-commerce systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Blasco-Arcas, L., Hernandez-Ortega, B., & Jimenez-Martinez, J. (2013). Adopting television as a new channel for e-commerce. The influence of interactive technologies on consumer behavior. Electronic Commerce Research, 13(4), 457–475. Blasco-Arcas, L., Hernandez-Ortega, B., & Jimenez-Martinez, J. (2013). Adopting television as a new channel for e-commerce. The influence of interactive technologies on consumer behavior. Electronic Commerce Research, 13(4), 457–475.
2.
Zurück zum Zitat Zghaibeh, Manaf, & Harmantzis, Fotios C. (2007). An “S-string” scheme for business-oriented peer-to-peer networks. Electronic Commerce Research, 7(3–4), 381–398.CrossRef Zghaibeh, Manaf, & Harmantzis, Fotios C. (2007). An “S-string” scheme for business-oriented peer-to-peer networks. Electronic Commerce Research, 7(3–4), 381–398.CrossRef
3.
Zurück zum Zitat Wang, F., Xiong, Y., & Liu, J. (2010). mTreebone: A collaborative tree-mesh overlay network for multicast video streaming. IEEE Transactions on Parallel and Distributed Systems, 21(3), 379–392.CrossRef Wang, F., Xiong, Y., & Liu, J. (2010). mTreebone: A collaborative tree-mesh overlay network for multicast video streaming. IEEE Transactions on Parallel and Distributed Systems, 21(3), 379–392.CrossRef
4.
Zurück zum Zitat Kobayashi, M., Nakayama, H., Ansari, N., & Kato, N. (2009). Reliable application layer multicast over combined wired and wireless networks. IEEE Transactions on Multimedia, 11(8), 1466–1477.CrossRef Kobayashi, M., Nakayama, H., Ansari, N., & Kato, N. (2009). Reliable application layer multicast over combined wired and wireless networks. IEEE Transactions on Multimedia, 11(8), 1466–1477.CrossRef
5.
Zurück zum Zitat Hei, X., Liang, C., Liang, J., Liu, Y., & Ross, K. W. (2007). A measurement study of a large-scale P2P IPTV system. IEEE Transactions on Multimedia, 9(8), 1672–1687.CrossRef Hei, X., Liang, C., Liang, J., Liu, Y., & Ross, K. W. (2007). A measurement study of a large-scale P2P IPTV system. IEEE Transactions on Multimedia, 9(8), 1672–1687.CrossRef
6.
Zurück zum Zitat Hei, X., Liu, Y., & Ross, K. W. (2008). IPTV over P2P Streaming networks: The mesh pull approach. IEEE Communications Magazine, 46, 86–92.CrossRef Hei, X., Liu, Y., & Ross, K. W. (2008). IPTV over P2P Streaming networks: The mesh pull approach. IEEE Communications Magazine, 46, 86–92.CrossRef
7.
Zurück zum Zitat Lan, X., Zheng, N., Xue, J., Chen, W., Wang, B., & Ma, W. (2008). Manageable peer-to-peer architecture for video-on-demand. Parallel and distributed processing, 2008. IPDPS 2008. In IEEE International Symposium (pp. 1–7) 14–18 April 2008. Lan, X., Zheng, N., Xue, J., Chen, W., Wang, B., & Ma, W. (2008). Manageable peer-to-peer architecture for video-on-demand. Parallel and distributed processing, 2008. IPDPS 2008. In IEEE International Symposium (pp. 1–7) 14–18 April 2008.
12.
Zurück zum Zitat Ciulo, D., et al. (2010). Network awareness of P2P live streaming applications: A measurement study. IEEE Transactions on Multimedia, 12(1), 54–63.CrossRef Ciulo, D., et al. (2010). Network awareness of P2P live streaming applications: A measurement study. IEEE Transactions on Multimedia, 12(1), 54–63.CrossRef
14.
Zurück zum Zitat Androutsellis-Theotokis, S., & Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4), 335–371.CrossRef Androutsellis-Theotokis, S., & Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4), 335–371.CrossRef
15.
Zurück zum Zitat Chen, X., & Lian, S. (2011). Service and P2P based secure media sharing in mobile commerce environments. Electronic Commerce Research, 11(1), 91–101.CrossRef Chen, X., & Lian, S. (2011). Service and P2P based secure media sharing in mobile commerce environments. Electronic Commerce Research, 11(1), 91–101.CrossRef
16.
Zurück zum Zitat Iwata, T., et al. (2003). A DRM system suitable for P2P content delivery and the study on its implementation, Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference IEEE (Vol. 2). Iwata, T., et al. (2003). A DRM system suitable for P2P content delivery and the study on its implementation, Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference IEEE (Vol. 2).
17.
Zurück zum Zitat OMA DRM Architecture Approved Version 2.0.1, 26 Feb 2008, Open Mobile Alliance\(^{{\rm TM}}\). OMA DRM Architecture Approved Version 2.0.1, 26 Feb 2008, Open Mobile Alliance\(^{{\rm TM}}\).
18.
Zurück zum Zitat Popescu, Bogdan C., Crispo, B., Tanenbaum, Andrew S., & Kamperman, Frank L. A. J. (2004). A DRM security architecture for home networks. In Proceedings of the 4th ACM workshop on digital rights management. ACM DRM ’04. Popescu, Bogdan C., Crispo, B., Tanenbaum, Andrew S., & Kamperman, Frank L. A. J. (2004). A DRM security architecture for home networks. In Proceedings of the 4th ACM workshop on digital rights management. ACM DRM ’04.
19.
Zurück zum Zitat Xu, C., & Li, S. (2010). Digital rights management solutions based on IPTV DRM. In International conference on networking and digital society (ICNDS), (pp. 43–46). Wenzhou, China, May 2010. Xu, C., & Li, S. (2010). Digital rights management solutions based on IPTV DRM. In International conference on networking and digital society (ICNDS), (pp. 43–46). Wenzhou, China, May 2010.
20.
Zurück zum Zitat Nishimoto, Y., Baba, A., Kurioka, T., & Namba, S. (2006). A digital rights management system for digital broadcasting based on home servers. IEEE Transactions on Broadcasting, 52(2), 167–172.CrossRef Nishimoto, Y., Baba, A., Kurioka, T., & Namba, S. (2006). A digital rights management system for digital broadcasting based on home servers. IEEE Transactions on Broadcasting, 52(2), 167–172.CrossRef
21.
Zurück zum Zitat Padmavathi, G., & Annadurai, S. (2006). A security framework for content-based publish-subscribe system. Electronic Commerce Research and Applications, 5(1), 78–90.CrossRef Padmavathi, G., & Annadurai, S. (2006). A security framework for content-based publish-subscribe system. Electronic Commerce Research and Applications, 5(1), 78–90.CrossRef
22.
Zurück zum Zitat Rosenberg, J., Schulzrinne, H., et al. (2002) Session initiation protocol (SIP), IETF, RFC 3261, June 2002. Rosenberg, J., Schulzrinne, H., et al. (2002) Session initiation protocol (SIP), IETF, RFC 3261, June 2002.
23.
Zurück zum Zitat Li, Jin, Cui, Yi, & Chang, Bin. (2007). Peerstreaming: Design and implementation of an on-demand distributed streaming system with digital rights management capabilities. Multimedia Systems, 13(3), 173–190.CrossRef Li, Jin, Cui, Yi, & Chang, Bin. (2007). Peerstreaming: Design and implementation of an on-demand distributed streaming system with digital rights management capabilities. Multimedia Systems, 13(3), 173–190.CrossRef
24.
Zurück zum Zitat Wei, T.-T., Wang, C.-H., Chang, R.-I., Hsu, W.-H., & Yeh, S.-C. (2012). An effective DRM for scalable IPTV over multicast overlay network. In The 5th IET international conference on Ubi-media computing (U-Media 2012). Xining, China, 16–18 August 2012. Wei, T.-T., Wang, C.-H., Chang, R.-I., Hsu, W.-H., & Yeh, S.-C. (2012). An effective DRM for scalable IPTV over multicast overlay network. In The 5th IET international conference on Ubi-media computing (U-Media 2012). Xining, China, 16–18 August 2012.
25.
Zurück zum Zitat Lan, X., Xue, J., Tian, L., Hu, W., Xu, T., & Zheng, N. (2009). A peer-to-peer architecture for live streaming with DRM. In Consumer communications and networking conference, 2009. CCNC 2009. In 6th IEEE consumer communications and networking conference (pp. 1–5) 10–13 Jan 2009. Lan, X., Xue, J., Tian, L., Hu, W., Xu, T., & Zheng, N. (2009). A peer-to-peer architecture for live streaming with DRM. In Consumer communications and networking conference, 2009. CCNC 2009. In 6th IEEE consumer communications and networking conference (pp. 1–5) 10–13 Jan 2009.
26.
Zurück zum Zitat Venkataraman, M., & Chatterjee, M. (2011). Inferring video QoE in real time. IEEE Network, 25, 4–13.CrossRef Venkataraman, M., & Chatterjee, M. (2011). Inferring video QoE in real time. IEEE Network, 25, 4–13.CrossRef
28.
Zurück zum Zitat Tan, G., & Jarvis, S. A. (2007). Improving the fault resilience of overlay multicast for media streaming. IEEE Transactions on Parallel and Distributed Systems, 18, 721–734.CrossRef Tan, G., & Jarvis, S. A. (2007). Improving the fault resilience of overlay multicast for media streaming. IEEE Transactions on Parallel and Distributed Systems, 18, 721–734.CrossRef
29.
Zurück zum Zitat Sripanidkulchai, K., Ganjam, A., Maggs, B., & Chang, H. (2004). The feasibility of supporting large-scale live streaming applications with dynamic application end-points. In Proceedings of the ACM SIGCOMM 2004. Portland, Oregon. Sripanidkulchai, K., Ganjam, A., Maggs, B., & Chang, H. (2004). The feasibility of supporting large-scale live streaming applications with dynamic application end-points. In Proceedings of the ACM SIGCOMM 2004. Portland, Oregon.
30.
Zurück zum Zitat Chang, R. I., Wang, T.-C., Wang, C.-H., Liu, J.-C., & Ho, J.-M. (2012). Effective distributed service architecture for ubiquitous video surveillance. Journal of Information Systems Frontiers, 14(3), 499–515. Chang, R. I., Wang, T.-C., Wang, C.-H., Liu, J.-C., & Ho, J.-M. (2012). Effective distributed service architecture for ubiquitous video surveillance. Journal of Information Systems Frontiers, 14(3), 499–515.
31.
Zurück zum Zitat Wang, Chia-Hui, & Liu, Yu-Shun. (2011). A dependable privacy protection for end-to-end VoIP via elliptic-curve Diffie-Hellman and dynamic key changes. Journal of Network and Computer Applications, 34(5), 1545–1556.CrossRef Wang, Chia-Hui, & Liu, Yu-Shun. (2011). A dependable privacy protection for end-to-end VoIP via elliptic-curve Diffie-Hellman and dynamic key changes. Journal of Network and Computer Applications, 34(5), 1545–1556.CrossRef
32.
Zurück zum Zitat Malhotra, K., Gardner, S., & Patz, R. (2007) Implementation of elliptic-curve cryptography on mobile healthcare devices. In Proceeding of the 2007 IEEE international conference on networking, sensing and control, (pp. 239–244). London, 15–17 April 2007. Malhotra, K., Gardner, S., & Patz, R. (2007) Implementation of elliptic-curve cryptography on mobile healthcare devices. In Proceeding of the 2007 IEEE international conference on networking, sensing and control, (pp. 239–244). London, 15–17 April 2007.
33.
Zurück zum Zitat Tan, Zuowen. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, 12(4), 505–518.CrossRef Tan, Zuowen. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, 12(4), 505–518.CrossRef
36.
Zurück zum Zitat Celik, A., Holliday, J., & Ramavarjula, B. (2003). I-DG and HI-DG: Scalable and efficient techniques for subscription-based data dissemination via IP multicasting. Electronic Commerce Research, 3(1–2), 143–165.CrossRef Celik, A., Holliday, J., & Ramavarjula, B. (2003). I-DG and HI-DG: Scalable and efficient techniques for subscription-based data dissemination via IP multicasting. Electronic Commerce Research, 3(1–2), 143–165.CrossRef
37.
Zurück zum Zitat OMA DRM Specification Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\). OMA DRM Specification Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\).
38.
Zurück zum Zitat OMA DRM Rights Expression Language Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\). OMA DRM Rights Expression Language Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\).
40.
Zurück zum Zitat OMA DRM Content Format Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\). OMA DRM Content Format Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\).
41.
Zurück zum Zitat RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP. RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP.
42.
Zurück zum Zitat Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203–209.CrossRef Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203–209.CrossRef
43.
Zurück zum Zitat Vincent, Olufunke R., Folorunso, Olusegun, & Akinde, A. D. (2010). Improving e-payment security using elliptic curve cryptosystem. Electronic Commerce Research, 10(1), 27–41.CrossRef Vincent, Olufunke R., Folorunso, Olusegun, & Akinde, A. D. (2010). Improving e-payment security using elliptic curve cryptosystem. Electronic Commerce Research, 10(1), 27–41.CrossRef
45.
Zurück zum Zitat Löytynoja, M., Koskela, T., Brockman, M., & Seppänen, T. (2006). Mobile DRM-enabled multimedia platform for peer-to-peer applications. In Proceedings of the 8th IEEE international symposium on multimedia (ISM’06). Löytynoja, M., Koskela, T., Brockman, M., & Seppänen, T. (2006). Mobile DRM-enabled multimedia platform for peer-to-peer applications. In Proceedings of the 8th IEEE international symposium on multimedia (ISM’06).
46.
Zurück zum Zitat Löytynoja, M., & Seppänen, T. (2005). Hash-based counter scheme for digital rights management. In IEEE international conference on multimedia and expo, 2005. ICME 2005. Löytynoja, M., & Seppänen, T. (2005). Hash-based counter scheme for digital rights management. In IEEE international conference on multimedia and expo, 2005. ICME 2005.
47.
Zurück zum Zitat Löytynoja, M., Cvejic, N., & Seppänen, T. (2005). Audio encryption using fragile watermarking. In Fifth international conference on information, communications and signal processing, Bangkok. Löytynoja, M., Cvejic, N., & Seppänen, T. (2005). Audio encryption using fragile watermarking. In Fifth international conference on information, communications and signal processing, Bangkok.
Metadaten
Titel
A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systems
verfasst von
Ray-I Chang
Tsao-Ta Wei
Chia-Hui Wang
Publikationsdatum
01.03.2015
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 1/2015
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-015-9176-5

Weitere Artikel der Ausgabe 1/2015

Electronic Commerce Research 1/2015 Zur Ausgabe