Media Gateway: bringing privacy to private multimedia cloud connections

The growing interest in media sharing combined with the explosion of social applications have opened an opportunity window for cloud based applications for media management as Media Cloud, described in this article, that has brought the concept of Cloud Computing to home environments. Media Cloud provides a comprehensive and efficient solution for managing content among federated home environments. As part of the purpose of empowering the user role as well as to improve user experience, we placed significant efforts on interoperability and privacy protection when it comes to accessing cloud resources from other networks. This article describes a solution that enables limited devices to access contents located in private clouds, as Media Cloud, with the cooperation of network providers,

[1]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[2]  Andrés Marín López,et al.  Multi-device Single Sign-on for cloud service continuity , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).

[3]  Klaus Wehrle,et al.  Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.

[4]  Jeffrey M. Voas,et al.  Cloud Computing: New Wine or Just a New Bottle? , 2009, IT Professional.

[5]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[6]  Yunhao Liu,et al.  Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching , 2012, IEEE Transactions on Knowledge and Data Engineering.

[7]  Spyros G. Denazis,et al.  Introducing a cross federation identity solution for converged network environments , 2010, IPTComm.

[8]  Russell Perry,et al.  Content-Centered Collaboration Spaces in the Cloud , 2009, IEEE Internet Computing.

[9]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[10]  Yang Tang,et al.  FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.

[11]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[12]  Kyung Sup Kwak,et al.  Preamble-based improved channel estimation for multiband UWB system in presence of interferences , 2013, Telecommun. Syst..

[13]  Andrés Marín López,et al.  A privacy aware media gateway for connecting private multimedia clouds to limited devices , 2011, 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011).

[14]  Les Labuschagne,et al.  Cognitive Approaches for Digital Forensic Readiness Planning , 2013, IFIP Int. Conf. Digital Forensics.

[15]  Jim Gray,et al.  Distributed Computing Economics , 2004, ACM Queue.

[16]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[17]  Nicholas J Carson Born Digital: Understanding the First Generation of Digital Natives, John Palfrey, Urs Gasser. Basic Books, New York (2008), 375 pp, $25.95 (hardcover) , 2010 .

[18]  Bharat K. Bhargava,et al.  An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[19]  Thomas Magedanz,et al.  Contextualized User-Centric Multimedia Delivery System for Next Generation Networks , 2011, Telecommun. Syst..

[20]  Michael T. Goodrich,et al.  Invertible bloom lookup tables , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[21]  Eran Hammer-Lahav,et al.  The OAuth 1.0 Protocol , 2010, RFC.

[22]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[23]  David K. Chiabi European Telecommunications Standards Institute , 2015 .

[24]  Benny Rochwerger,et al.  A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[25]  Ann Cavoukian,et al.  Privacy in the clouds , 2008 .

[26]  Karin K. Breitman,et al.  When TV Dies, Will It Go to the Cloud? , 2010, Computer.

[27]  Andrés Marín López,et al.  Media cloud: an open cloud computing middleware for content management , 2011, IEEE Transactions on Consumer Electronics.

[28]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[29]  Mohammad Nauman,et al.  Using trusted computing for privacy preserving keystroke-based authentication in smartphones , 2013, Telecommun. Syst..

[30]  Hakan Erdogmus A Process That Is Not , 2009, IEEE Software.

[31]  Doug Johnson,et al.  Computing in the Clouds. , 2010 .

[32]  Thomas Coughlin,et al.  Security analysis of authentication protocols for next-generation mobile and CE cloud services , 2011, 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin).

[33]  Hong Cheng,et al.  Clustering Large Attributed Graphs: A Balance between Structural and Attribute Similarities , 2011, TKDD.

[34]  Kai Rannenberg,et al.  How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project , 2010, SEC.

[35]  Hakan Erdogmus,et al.  Cloud Computing: Does Nirvana Hide behind the Nebula? , 2009, IEEE Softw..

[36]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[37]  Andrés Marín López,et al.  Context awareness in network selection for dynamic environments , 2006, PWC.

[38]  Galen C. Hunt Proceedings of the 11th USENIX workshop on Hot topics in operating systems , 2007 .

[39]  Eui-Nam Huh,et al.  Towards the Development of Personal Cloud Computing for Mobile Thin-Clients , 2011, 2011 International Conference on Information Science and Applications.

[40]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[41]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[42]  Daniel Díaz Sánchez,et al.  Trust-aware federated IdM in consumer cloud computing , 2012, ICCE.

[43]  Bu-Sung Lee,et al.  Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[44]  Douglas F. Parkhill,et al.  The Challenge of the Computer Utility , 1966 .