Digital Rights Management and Access Control in Multimedia Social Networks

The emerging multimedia social networks (MSN) services have significantly improved and enriched consumers’ experiences on multimedia digital contents, and further spurred the misuse and malicious dissemination of digital media (rights) among users. Thus, Digital Rights Management (DRM) issue is becoming more prominent. The theories and methods for security, trustworthiness, controllability of DRM systems available do not meet the needs of the novel Internet application, which is an urgent problem to solve. This paper analyzed traditional access control technologies and social network properties, and made a survey on related home and abroad research progresses on DRM security technologies, multimedia social networks access control and media contents copyrights protection. Finally, several main research directions were addressed on the key technologies of DRM, from three layers of cloud media services, media networks admission and user social networks, respectively, that is media content access control, media terminal trusted admission and media rights secure distribution.

[1]  Lifeng Sun,et al.  Propagation-based social-aware replication for social video contents , 2012, ACM Multimedia.

[2]  Farinaz Koushanfar,et al.  Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Yuan Cheng,et al.  A User-Activity-Centric Framework for Access Control in Online Social Networks , 2011, IEEE Internet Computing.

[4]  David J. DeWitt,et al.  Limiting Disclosure in Hippocratic Databases , 2004, VLDB.

[5]  Christian Schaefer,et al.  Usage Control Enforcement: Present and Future , 2008, IEEE Security & Privacy.

[6]  Andrés Marín López,et al.  Media cloud: an open cloud computing middleware for content management , 2011, IEEE Transactions on Consumer Electronics.

[7]  Hefei Ling,et al.  Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain , 2012, ACM Multimedia.

[8]  Chong Luo,et al.  Multimedia Cloud Computing , 2011, IEEE Signal Processing Magazine.

[9]  María Bárbara Álvarez Torres,et al.  On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops , 2004, Lecture Notes in Computer Science.

[10]  Radu Sion,et al.  A personal mobile DRM manager for smartphones , 2009, Comput. Secur..

[11]  Barbara Carminati,et al.  Rule-Based Access Control for Social Networks , 2006, OTM Workshops.

[12]  Mingchu Li,et al.  FineTrust: a fine-grained trust model for peer-to-peer networks , 2011, Secur. Commun. Networks.

[13]  Mohan S. Kankanhalli,et al.  An efficient access control method for multimedia social networks , 2010, WSM@MM.

[14]  Zhiyong Zhang,et al.  A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing , 2013 .

[15]  Tian Li,et al.  A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network , 2007 .

[16]  Sebastian Ryszard Kruk,et al.  D-FOAF: Distributed Identity Management with Access Rights Delegation , 2006, ASWC.

[17]  Wilfred Villegas A trust-based access control scheme for social networks , 2008 .

[18]  Bin Song,et al.  A TCM-Enabled Access Control Scheme , 2011, ICA3PP.

[19]  Dan Ionescu,et al.  A Collaborative Cloud-Based Multimedia Sharing Platform for Social Networking Environments , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[20]  Fausto Giunchiglia,et al.  The Semantic Web - ASWC 2006, First Asian Semantic Web Conference, Beijing, China, September 3-7, 2006, Proceedings , 2006, ASWC.

[21]  MyoungBeom Chung,et al.  Intelligent copyright protection system using a matching video retrieval algorithm , 2011, Multimedia Tools and Applications.

[22]  Tony Thomas,et al.  Secure interoperable digital content distribution mechanisms in a multi-domain architecture , 2011, Multimedia Tools and Applications.

[23]  Jong Kim,et al.  DRMFS: A file system layer for transparent access semantics of DRM-protected contents , 2012, J. Syst. Softw..

[24]  Jong Kim,et al.  Redistributing time-based rights between consumer devices for content sharing in DRM system , 2009, International Journal of Information Security.

[25]  Zhi Tang,et al.  An Efficient Contents Sharing Method for DRM , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[26]  Bhavani M. Thuraisingham,et al.  Semantic web-based social network access control , 2011, Comput. Secur..

[27]  Kanliang Wang,et al.  A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.

[28]  Niu Xin-xin Identity-based domain key distribution protocol in the E-document security management , 2012 .

[29]  Ramakrishnan Srikant,et al.  Hippocratic Databases , 2002, VLDB.

[30]  Zhiyong Zhang,et al.  Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .

[31]  Xi Chen,et al.  Content distribution and copyright authentication based on combined indexing and watermarking , 2010, Multimedia Tools and Applications.

[32]  Jorge Lobo,et al.  Privacy-aware role based access control , 2009, SACMAT '07.

[33]  Shiuh-Pyng Shieh,et al.  A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks , 2012, IEEE Transactions on Vehicular Technology.

[34]  Zhiyong Zhang Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.

[35]  Mohan S. Kankanhalli,et al.  Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture , 2009, IEEE Transactions on Information Forensics and Security.

[36]  Hua Wang,et al.  Trust-Involved Access Control in Collaborative Open Social Networks , 2010, 2010 Fourth International Conference on Network and System Security.

[37]  Muthucumaru Maheswaran,et al.  A trust based approach for protecting user data in social networks , 2007, CASCON.

[38]  Rob Johnson,et al.  More Content - Less Control: Access Control in the Web 2.0 , 2006 .