Skip to main content
Top
Published in: Electronic Commerce Research 1/2015

01-03-2015

A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systems

Authors: Ray-I Chang, Tsao-Ta Wei, Chia-Hui Wang

Published in: Electronic Commerce Research | Issue 1/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Thanks to media compression advance and prevalence of broadband Internet, diversified multimedia network applications in e-commerce systems are more vigorously developing than ever. The most attractive IPTV services are emerging to be deployed by peer-to-peer (P2P) architecture to achieve scalability over Internet. However, the intellectual property rights (IPR) of valuable IPTV content distributed over P2P networks are more needed to be considered. To effectively apply digital rights management (DRM) for the P2P IPTV services is definitely an important issue. In this paper, we propose an effective P2P IPTV DRM architecture for e-commerce systems based on the standards from Open Mobile Alliance (OMA). A cost-effective key distribution mechanism with leverage between DRM protection strength and system/network loading is further proposed to improve OMA DRM frameworks for P2P IPTV applications on the opportunistic multicast overlay to overcome the peer churns of leaving and joining. The simulations and experimental results demonstrate that the cost-effectiveness of proposed P2P DRM schemes in preserving both of IPR protections and QoS/QoE for P2P IPTV services for e-commerce systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Blasco-Arcas, L., Hernandez-Ortega, B., & Jimenez-Martinez, J. (2013). Adopting television as a new channel for e-commerce. The influence of interactive technologies on consumer behavior. Electronic Commerce Research, 13(4), 457–475. Blasco-Arcas, L., Hernandez-Ortega, B., & Jimenez-Martinez, J. (2013). Adopting television as a new channel for e-commerce. The influence of interactive technologies on consumer behavior. Electronic Commerce Research, 13(4), 457–475.
2.
go back to reference Zghaibeh, Manaf, & Harmantzis, Fotios C. (2007). An “S-string” scheme for business-oriented peer-to-peer networks. Electronic Commerce Research, 7(3–4), 381–398.CrossRef Zghaibeh, Manaf, & Harmantzis, Fotios C. (2007). An “S-string” scheme for business-oriented peer-to-peer networks. Electronic Commerce Research, 7(3–4), 381–398.CrossRef
3.
go back to reference Wang, F., Xiong, Y., & Liu, J. (2010). mTreebone: A collaborative tree-mesh overlay network for multicast video streaming. IEEE Transactions on Parallel and Distributed Systems, 21(3), 379–392.CrossRef Wang, F., Xiong, Y., & Liu, J. (2010). mTreebone: A collaborative tree-mesh overlay network for multicast video streaming. IEEE Transactions on Parallel and Distributed Systems, 21(3), 379–392.CrossRef
4.
go back to reference Kobayashi, M., Nakayama, H., Ansari, N., & Kato, N. (2009). Reliable application layer multicast over combined wired and wireless networks. IEEE Transactions on Multimedia, 11(8), 1466–1477.CrossRef Kobayashi, M., Nakayama, H., Ansari, N., & Kato, N. (2009). Reliable application layer multicast over combined wired and wireless networks. IEEE Transactions on Multimedia, 11(8), 1466–1477.CrossRef
5.
go back to reference Hei, X., Liang, C., Liang, J., Liu, Y., & Ross, K. W. (2007). A measurement study of a large-scale P2P IPTV system. IEEE Transactions on Multimedia, 9(8), 1672–1687.CrossRef Hei, X., Liang, C., Liang, J., Liu, Y., & Ross, K. W. (2007). A measurement study of a large-scale P2P IPTV system. IEEE Transactions on Multimedia, 9(8), 1672–1687.CrossRef
6.
go back to reference Hei, X., Liu, Y., & Ross, K. W. (2008). IPTV over P2P Streaming networks: The mesh pull approach. IEEE Communications Magazine, 46, 86–92.CrossRef Hei, X., Liu, Y., & Ross, K. W. (2008). IPTV over P2P Streaming networks: The mesh pull approach. IEEE Communications Magazine, 46, 86–92.CrossRef
7.
go back to reference Lan, X., Zheng, N., Xue, J., Chen, W., Wang, B., & Ma, W. (2008). Manageable peer-to-peer architecture for video-on-demand. Parallel and distributed processing, 2008. IPDPS 2008. In IEEE International Symposium (pp. 1–7) 14–18 April 2008. Lan, X., Zheng, N., Xue, J., Chen, W., Wang, B., & Ma, W. (2008). Manageable peer-to-peer architecture for video-on-demand. Parallel and distributed processing, 2008. IPDPS 2008. In IEEE International Symposium (pp. 1–7) 14–18 April 2008.
12.
go back to reference Ciulo, D., et al. (2010). Network awareness of P2P live streaming applications: A measurement study. IEEE Transactions on Multimedia, 12(1), 54–63.CrossRef Ciulo, D., et al. (2010). Network awareness of P2P live streaming applications: A measurement study. IEEE Transactions on Multimedia, 12(1), 54–63.CrossRef
14.
go back to reference Androutsellis-Theotokis, S., & Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4), 335–371.CrossRef Androutsellis-Theotokis, S., & Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4), 335–371.CrossRef
15.
go back to reference Chen, X., & Lian, S. (2011). Service and P2P based secure media sharing in mobile commerce environments. Electronic Commerce Research, 11(1), 91–101.CrossRef Chen, X., & Lian, S. (2011). Service and P2P based secure media sharing in mobile commerce environments. Electronic Commerce Research, 11(1), 91–101.CrossRef
16.
go back to reference Iwata, T., et al. (2003). A DRM system suitable for P2P content delivery and the study on its implementation, Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference IEEE (Vol. 2). Iwata, T., et al. (2003). A DRM system suitable for P2P content delivery and the study on its implementation, Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference IEEE (Vol. 2).
17.
go back to reference OMA DRM Architecture Approved Version 2.0.1, 26 Feb 2008, Open Mobile Alliance\(^{{\rm TM}}\). OMA DRM Architecture Approved Version 2.0.1, 26 Feb 2008, Open Mobile Alliance\(^{{\rm TM}}\).
18.
go back to reference Popescu, Bogdan C., Crispo, B., Tanenbaum, Andrew S., & Kamperman, Frank L. A. J. (2004). A DRM security architecture for home networks. In Proceedings of the 4th ACM workshop on digital rights management. ACM DRM ’04. Popescu, Bogdan C., Crispo, B., Tanenbaum, Andrew S., & Kamperman, Frank L. A. J. (2004). A DRM security architecture for home networks. In Proceedings of the 4th ACM workshop on digital rights management. ACM DRM ’04.
19.
go back to reference Xu, C., & Li, S. (2010). Digital rights management solutions based on IPTV DRM. In International conference on networking and digital society (ICNDS), (pp. 43–46). Wenzhou, China, May 2010. Xu, C., & Li, S. (2010). Digital rights management solutions based on IPTV DRM. In International conference on networking and digital society (ICNDS), (pp. 43–46). Wenzhou, China, May 2010.
20.
go back to reference Nishimoto, Y., Baba, A., Kurioka, T., & Namba, S. (2006). A digital rights management system for digital broadcasting based on home servers. IEEE Transactions on Broadcasting, 52(2), 167–172.CrossRef Nishimoto, Y., Baba, A., Kurioka, T., & Namba, S. (2006). A digital rights management system for digital broadcasting based on home servers. IEEE Transactions on Broadcasting, 52(2), 167–172.CrossRef
21.
go back to reference Padmavathi, G., & Annadurai, S. (2006). A security framework for content-based publish-subscribe system. Electronic Commerce Research and Applications, 5(1), 78–90.CrossRef Padmavathi, G., & Annadurai, S. (2006). A security framework for content-based publish-subscribe system. Electronic Commerce Research and Applications, 5(1), 78–90.CrossRef
22.
go back to reference Rosenberg, J., Schulzrinne, H., et al. (2002) Session initiation protocol (SIP), IETF, RFC 3261, June 2002. Rosenberg, J., Schulzrinne, H., et al. (2002) Session initiation protocol (SIP), IETF, RFC 3261, June 2002.
23.
go back to reference Li, Jin, Cui, Yi, & Chang, Bin. (2007). Peerstreaming: Design and implementation of an on-demand distributed streaming system with digital rights management capabilities. Multimedia Systems, 13(3), 173–190.CrossRef Li, Jin, Cui, Yi, & Chang, Bin. (2007). Peerstreaming: Design and implementation of an on-demand distributed streaming system with digital rights management capabilities. Multimedia Systems, 13(3), 173–190.CrossRef
24.
go back to reference Wei, T.-T., Wang, C.-H., Chang, R.-I., Hsu, W.-H., & Yeh, S.-C. (2012). An effective DRM for scalable IPTV over multicast overlay network. In The 5th IET international conference on Ubi-media computing (U-Media 2012). Xining, China, 16–18 August 2012. Wei, T.-T., Wang, C.-H., Chang, R.-I., Hsu, W.-H., & Yeh, S.-C. (2012). An effective DRM for scalable IPTV over multicast overlay network. In The 5th IET international conference on Ubi-media computing (U-Media 2012). Xining, China, 16–18 August 2012.
25.
go back to reference Lan, X., Xue, J., Tian, L., Hu, W., Xu, T., & Zheng, N. (2009). A peer-to-peer architecture for live streaming with DRM. In Consumer communications and networking conference, 2009. CCNC 2009. In 6th IEEE consumer communications and networking conference (pp. 1–5) 10–13 Jan 2009. Lan, X., Xue, J., Tian, L., Hu, W., Xu, T., & Zheng, N. (2009). A peer-to-peer architecture for live streaming with DRM. In Consumer communications and networking conference, 2009. CCNC 2009. In 6th IEEE consumer communications and networking conference (pp. 1–5) 10–13 Jan 2009.
26.
go back to reference Venkataraman, M., & Chatterjee, M. (2011). Inferring video QoE in real time. IEEE Network, 25, 4–13.CrossRef Venkataraman, M., & Chatterjee, M. (2011). Inferring video QoE in real time. IEEE Network, 25, 4–13.CrossRef
28.
go back to reference Tan, G., & Jarvis, S. A. (2007). Improving the fault resilience of overlay multicast for media streaming. IEEE Transactions on Parallel and Distributed Systems, 18, 721–734.CrossRef Tan, G., & Jarvis, S. A. (2007). Improving the fault resilience of overlay multicast for media streaming. IEEE Transactions on Parallel and Distributed Systems, 18, 721–734.CrossRef
29.
go back to reference Sripanidkulchai, K., Ganjam, A., Maggs, B., & Chang, H. (2004). The feasibility of supporting large-scale live streaming applications with dynamic application end-points. In Proceedings of the ACM SIGCOMM 2004. Portland, Oregon. Sripanidkulchai, K., Ganjam, A., Maggs, B., & Chang, H. (2004). The feasibility of supporting large-scale live streaming applications with dynamic application end-points. In Proceedings of the ACM SIGCOMM 2004. Portland, Oregon.
30.
go back to reference Chang, R. I., Wang, T.-C., Wang, C.-H., Liu, J.-C., & Ho, J.-M. (2012). Effective distributed service architecture for ubiquitous video surveillance. Journal of Information Systems Frontiers, 14(3), 499–515. Chang, R. I., Wang, T.-C., Wang, C.-H., Liu, J.-C., & Ho, J.-M. (2012). Effective distributed service architecture for ubiquitous video surveillance. Journal of Information Systems Frontiers, 14(3), 499–515.
31.
go back to reference Wang, Chia-Hui, & Liu, Yu-Shun. (2011). A dependable privacy protection for end-to-end VoIP via elliptic-curve Diffie-Hellman and dynamic key changes. Journal of Network and Computer Applications, 34(5), 1545–1556.CrossRef Wang, Chia-Hui, & Liu, Yu-Shun. (2011). A dependable privacy protection for end-to-end VoIP via elliptic-curve Diffie-Hellman and dynamic key changes. Journal of Network and Computer Applications, 34(5), 1545–1556.CrossRef
32.
go back to reference Malhotra, K., Gardner, S., & Patz, R. (2007) Implementation of elliptic-curve cryptography on mobile healthcare devices. In Proceeding of the 2007 IEEE international conference on networking, sensing and control, (pp. 239–244). London, 15–17 April 2007. Malhotra, K., Gardner, S., & Patz, R. (2007) Implementation of elliptic-curve cryptography on mobile healthcare devices. In Proceeding of the 2007 IEEE international conference on networking, sensing and control, (pp. 239–244). London, 15–17 April 2007.
33.
go back to reference Tan, Zuowen. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, 12(4), 505–518.CrossRef Tan, Zuowen. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, 12(4), 505–518.CrossRef
36.
go back to reference Celik, A., Holliday, J., & Ramavarjula, B. (2003). I-DG and HI-DG: Scalable and efficient techniques for subscription-based data dissemination via IP multicasting. Electronic Commerce Research, 3(1–2), 143–165.CrossRef Celik, A., Holliday, J., & Ramavarjula, B. (2003). I-DG and HI-DG: Scalable and efficient techniques for subscription-based data dissemination via IP multicasting. Electronic Commerce Research, 3(1–2), 143–165.CrossRef
37.
go back to reference OMA DRM Specification Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\). OMA DRM Specification Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\).
38.
go back to reference OMA DRM Rights Expression Language Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\). OMA DRM Rights Expression Language Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\).
40.
go back to reference OMA DRM Content Format Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\). OMA DRM Content Format Approved Version 2.0.2, 23 Jul 2008, Open Mobile Alliance\(^{{\rm TM}}\).
41.
go back to reference RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP. RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP.
42.
go back to reference Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203–209.CrossRef Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203–209.CrossRef
43.
go back to reference Vincent, Olufunke R., Folorunso, Olusegun, & Akinde, A. D. (2010). Improving e-payment security using elliptic curve cryptosystem. Electronic Commerce Research, 10(1), 27–41.CrossRef Vincent, Olufunke R., Folorunso, Olusegun, & Akinde, A. D. (2010). Improving e-payment security using elliptic curve cryptosystem. Electronic Commerce Research, 10(1), 27–41.CrossRef
45.
go back to reference Löytynoja, M., Koskela, T., Brockman, M., & Seppänen, T. (2006). Mobile DRM-enabled multimedia platform for peer-to-peer applications. In Proceedings of the 8th IEEE international symposium on multimedia (ISM’06). Löytynoja, M., Koskela, T., Brockman, M., & Seppänen, T. (2006). Mobile DRM-enabled multimedia platform for peer-to-peer applications. In Proceedings of the 8th IEEE international symposium on multimedia (ISM’06).
46.
go back to reference Löytynoja, M., & Seppänen, T. (2005). Hash-based counter scheme for digital rights management. In IEEE international conference on multimedia and expo, 2005. ICME 2005. Löytynoja, M., & Seppänen, T. (2005). Hash-based counter scheme for digital rights management. In IEEE international conference on multimedia and expo, 2005. ICME 2005.
47.
go back to reference Löytynoja, M., Cvejic, N., & Seppänen, T. (2005). Audio encryption using fragile watermarking. In Fifth international conference on information, communications and signal processing, Bangkok. Löytynoja, M., Cvejic, N., & Seppänen, T. (2005). Audio encryption using fragile watermarking. In Fifth international conference on information, communications and signal processing, Bangkok.
Metadata
Title
A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systems
Authors
Ray-I Chang
Tsao-Ta Wei
Chia-Hui Wang
Publication date
01-03-2015
Publisher
Springer US
Published in
Electronic Commerce Research / Issue 1/2015
Print ISSN: 1389-5753
Electronic ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-015-9176-5

Other articles of this Issue 1/2015

Electronic Commerce Research 1/2015 Go to the issue