Trust Management for Mobile Media Distribution

Abstract

Multimedia content delivery to capable smart phones with high-speed next-generation Internet connectivity is becoming commonplace. However, the openness of delivery demands adaptive and robust management of intellectual property rights. The purpose of this article is to describe a framework to address the central issues in content delivery: a scalable peer-to-peer-based content delivery model. Our method pairs the delivery with a secure access control model that enables data providers to secure a return from making their original content available. Our work resulted in a prototype implementation written in Java that includes a client for the Android mobile platform. Adding robust trust management to scalable peer-to-peer content delivery is the major significance of our work.

Share and Cite:

R. Ege, "Trust Management for Mobile Media Distribution," Engineering, Vol. 5 No. 12, 2013, pp. 919-927. doi: 10.4236/eng.2013.512112.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Y. Atif, “Building Trust in E-Commerce,” IEEE Internet Computing, Vol. 6, No. 1, 2002, pp. 18-24.
http://dx.doi.org/10.1109/4236.978365
[2] P. Resnick, K. Kuwabara, R. Zeckhauser and E. Friedman, “Reputation Systems,” Communications of the ACM, Vol. 43, No. 12, 2000, pp. 45-48.
http://dx.doi.org/10.1145/355112.355122
[3] E. Bertino, B. Catania, E. Ferrari and P. Perlasca, “A Logical Framework for Reasoning about Access Control Models,” Proceedings of the 6th ACM symposium on Access Control Models and Technologies, Chantilly, 3-4 May 2001, pp. 41-52.
http://dx.doi.org/10.1145/373256.373261
[4] S. Jajodia, P. Samarati, M. L. Sapino and V. S. Subrahmanian, “Flexible Support for Multiple Access Control Policies,” ACM Transaction Database System, Vol. 26, No. 2, 2001, pp. 214-260.
http://dx.doi.org/10.1145/383891.383894
[5] L. Yang and R. Ege, “Integrating Trust Management into Usage Control in P2P Multimedia Delivery,” Proceedings of 20th International Conference on Software Engineering and Knowledge Engineering, Redwood City, 1-3 July 2008, pp. 411-416.
[6] R. K. Ege, Y. Li and R. Whittaker, “Extracting Value from P2P Content Delivery,” Proceedings of the 4th International Conference on Systems, Cancun, 1-6 March 2009, pp. 102-108.
[7] R. K. Ege, “OghmaSip: Peer-to-Peer Multimedia for Mobile Devices,” The 1st International Conference on Mobile Services, Resources, and Users, Barcelona, 23-29 October 2011, pp. 1-6.
[8] R. K. Ege, L. Yang, Q. Kharma and X. Ni, “Three-Layered Mediator Architecture Based on DHT,” Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms, and Networks, Hong Kong, 10-12 May 2004, pp. 317-318.
[9] C. Wu and B. C. Li, “R-Stream: Resilient Peer-to-Peer Streaming with Rateless Codes,” Proceedings of the 13th ACM International Conference on Multimedia, Singapore, 6-11 November 2005 pp. 307-310.
http://dx.doi.org/10.1145/1101149.1101211
[10] P. Gutmann, “The Design of a Cryptographic Security Architecture,” Proceedings of the 8th USENIX Security Symposium, Washington DC, 23-26 August 1999, pp. 153-168.
[11] Network Working Group, “Diffie-Hellman Key Agreement Method, Request for Comments: 2631,” RTFM Inc., 1999.
[12] Open Handset Alliance, 2010.
http://www.openhandsetalliance.com/
[13] Sip2Peer, SIP-Based API for Robust Connection and Communication among Peers, 2011.
http://code.google.com/p/sip2peer/
[14] java.net—The Source for Java Technology Collaboration, The JDK 7 Project, 2010. http://jdk7. java.net/
[15] R. Stewart, “Stream Control Transmission Protocol, Request for Comments: 4960,” IETF Network Working Group, 2010. http://tools.ietf.org/html/rfc4960
[16] OpenID, 2012. http://www.openid.net
[17] OAuth, OAuth Community Site, 2012.
http://www.oauth.net/

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.