CyVOD: a novel trinity multimedia social network scheme

How to comprehensively explore, improve and deploy multimedia social networks (MSNs) has become a hot topic in the era of emerging pervasive mobile multimedia. More and more MSNs offer a great number of convenient tools, services, and applications for multimedia contents including video and audio that users share willingly and on demand. However, concerns with digital rights management (DRM)-oriented multimedia security, as well as the efficiency of multimedia usage and sharing are meanwhile intensified due to easier distribution and reproduction of multimedia content in a wide range of social networks. The paper proposes a comprehensive framework for multimedia social network, and realized a cross-platform MSN prototype system, named as CyVOD, to support two kinds of DRM modes. The proposed framework effectively protects copyrighted multimedia contents against piracy, and supports a more efficient recommendation system for its better handling of the tradeoff between multimedia security and ease of use.

[1]  Brij B. Gupta,et al.  Social media security and trustworthiness: Overview and new direction , 2016, Future Gener. Comput. Syst..

[2]  Kanliang Wang,et al.  A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.

[3]  Zhiyong Zhang,et al.  Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .

[4]  Raymond Y. K. Lau,et al.  Combining social network and semantic concept analysis for personalized academic researcher recommendation , 2012, Decis. Support Syst..

[5]  Mahmoud Al-Ayyoub,et al.  Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations , 2017, Multimedia Tools and Applications.

[6]  Mohammad Davarpanah Jazi,et al.  PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability , 2015, IET Inf. Secur..

[7]  Jose M. Such,et al.  Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services , 2015, Int. J. Hum. Comput. Interact..

[8]  Huan Liu,et al.  Trust Evolution: Modeling and Its Applications , 2015, IEEE Transactions on Knowledge and Data Engineering.

[9]  David Sánchez,et al.  Enforcing transparent access to private content in social networks by means of automatic sanitization , 2015, Expert Syst. Appl..

[10]  Guojun Wang,et al.  κ-FuzzyTrust , 2015 .

[11]  Guojun Wang,et al.  κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph , 2015, Inf. Sci..

[12]  In-Jeong Chung,et al.  Contents Recommendation Method Using Social Network Analysis , 2013, Wireless Personal Communications.

[13]  Pasquale De Meo,et al.  Trust Networks: Topology, Dynamics, and Measurements , 2015, IEEE Internet Computing.

[14]  Yaser Jararweh,et al.  Automated wireless video surveillance: an evaluation framework , 2017, Journal of Real-Time Image Processing.

[15]  Jian Wang,et al.  A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption , 2015, Multimedia Tools and Applications.

[16]  Feiping Nie,et al.  Social trust prediction using heterogeneous networks , 2013, TKDD.

[17]  Cécile Paris,et al.  Behavior‐Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation , 2015, Comput. Intell..

[18]  Sai Ho Kwok,et al.  Digital Rights Management for Mobile Multimedia , 2003 .

[19]  Sajal K. Das,et al.  Multimodal Wearable Sensing for Fine-Grained Activity Recognition in Healthcare , 2015, IEEE Internet Computing.

[20]  James B. D. Joshi,et al.  CPBAC: Property-based access control model for secure cooperation in online social networks , 2014, Comput. Secur..

[21]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[22]  Gail-Joon Ahn,et al.  Multiparty Access Control for Online Social Networks: Model and Mechanisms , 2013, IEEE Transactions on Knowledge and Data Engineering.

[23]  Kanliang Wang,et al.  A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks , 2015, Comput. J..

[24]  Domenico Rosaci,et al.  Trust and Compactness in Social Network Groups , 2015, IEEE Transactions on Cybernetics.

[25]  Seok Jong Yu,et al.  The dynamic competitive recommendation algorithm in social network services , 2012, Inf. Sci..

[26]  Zhen Wang,et al.  A novel approach to rights sharing-enabling digital rights management for mobile multimedia , 2015, Multimedia Tools and Applications.

[27]  B. B. Gupta,et al.  Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.