Advanced secure multimedia services for digital homes

Our society is becoming increasingly more IT-oriented, and the images and sounds that reflect our daily life are being stored mainly in a digital form. This digital personal life can be part of the home multimedia contents, and users demand access and possibly share these contents (such as photographs, videos, and music) in an ubiquitous way: from any location and with any device. The purpose of this article is twofold. First, we introduce the Feel@Home system, whose main objective is to enable the previously mentioned vision of an ubiquitous digital personal life. Second, we describe the security architecture of Feel@Home, analyzing the security and privacy requirements that identify which threats and vulnerabilities must be considered, and deriving the security building blocks that can be used to protect both IMS-based and VPN-based solutions.

[1]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[2]  Marc Lacoste,et al.  Architecting Adaptable Security Infrastructures for Pervasive Networks through Components , 2009, FGIT-FGCN.

[3]  Jan Trobitius,et al.  Anwendung der "Common Criteria for Information Technology Security Evaluation" (CC) / ISO 15408 auf ein SOA Registry-Repository , 2007, Informatiktage.

[4]  Jan Camenisch,et al.  An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..

[5]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[6]  José M. Troya,et al.  Anonymous attribute certificates based on traceable signatures , 2006, Internet Res..

[7]  Sherman S. M. Chow Real Traceable Signatures , 2009, Selected Areas in Cryptography.

[8]  Moti Yung,et al.  Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication , 2007, CANS.

[9]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[10]  Lise Getoor,et al.  To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.

[11]  Martin Gilje Jaatun,et al.  Covering Your Assets in Software Engineering , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[12]  Paul C. van Oorschot,et al.  Privacy-enhanced sharing of personal content on the web , 2008, WWW.

[13]  Beth Kapes Covering Your Assets , 2003 .

[14]  Martin Gilje Jaatun,et al.  Security Requirements for the Rest of Us: A Survey , 2008, IEEE Software.

[15]  P. Sethu Ramalingam,et al.  Converged Services for Home Using a SIP/UPnP Software Bridge Solution , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[16]  Rittwik Jana,et al.  IMS-TV: An IMS-based architecture for interactive, personalized IPTV , 2008, IEEE Communications Magazine.

[17]  Abhilasha Bhargav-Spantzel,et al.  User centricity: a taxonomy and open issues , 2006, DIM '06.