ENG  Vol.5 No.12 , December 2013
Trust Management for Mobile Media Distribution
Author(s) Raimund K. Ege
Abstract

Multimedia content delivery to capable smart phones with high-speed next-generation Internet connectivity is becoming commonplace. However, the openness of delivery demands adaptive and robust management of intellectual property rights. The purpose of this article is to describe a framework to address the central issues in content delivery: a scalable peer-to-peer-based content delivery model. Our method pairs the delivery with a secure access control model that enables data providers to secure a return from making their original content available. Our work resulted in a prototype implementation written in Java that includes a client for the Android mobile platform. Adding robust trust management to scalable peer-to-peer content delivery is the major significance of our work.


Cite this paper
R. Ege, "Trust Management for Mobile Media Distribution," Engineering, Vol. 5 No. 12, 2013, pp. 919-927. doi: 10.4236/eng.2013.512112.
References

[1]   Y. Atif, “Building Trust in E-Commerce,” IEEE Internet Computing, Vol. 6, No. 1, 2002, pp. 18-24.
http://dx.doi.org/10.1109/4236.978365

[2]   P. Resnick, K. Kuwabara, R. Zeckhauser and E. Friedman, “Reputation Systems,” Communications of the ACM, Vol. 43, No. 12, 2000, pp. 45-48.
http://dx.doi.org/10.1145/355112.355122

[3]   E. Bertino, B. Catania, E. Ferrari and P. Perlasca, “A Logical Framework for Reasoning about Access Control Models,” Proceedings of the 6th ACM symposium on Access Control Models and Technologies, Chantilly, 3-4 May 2001, pp. 41-52.
http://dx.doi.org/10.1145/373256.373261

[4]   S. Jajodia, P. Samarati, M. L. Sapino and V. S. Subrahmanian, “Flexible Support for Multiple Access Control Policies,” ACM Transaction Database System, Vol. 26, No. 2, 2001, pp. 214-260.
http://dx.doi.org/10.1145/383891.383894

[5]   L. Yang and R. Ege, “Integrating Trust Management into Usage Control in P2P Multimedia Delivery,” Proceedings of 20th International Conference on Software Engineering and Knowledge Engineering, Redwood City, 1-3 July 2008, pp. 411-416.

[6]   R. K. Ege, Y. Li and R. Whittaker, “Extracting Value from P2P Content Delivery,” Proceedings of the 4th International Conference on Systems, Cancun, 1-6 March 2009, pp. 102-108.

[7]   R. K. Ege, “OghmaSip: Peer-to-Peer Multimedia for Mobile Devices,” The 1st International Conference on Mobile Services, Resources, and Users, Barcelona, 23-29 October 2011, pp. 1-6.

[8]   R. K. Ege, L. Yang, Q. Kharma and X. Ni, “Three-Layered Mediator Architecture Based on DHT,” Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms, and Networks, Hong Kong, 10-12 May 2004, pp. 317-318.

[9]   C. Wu and B. C. Li, “R-Stream: Resilient Peer-to-Peer Streaming with Rateless Codes,” Proceedings of the 13th ACM International Conference on Multimedia, Singapore, 6-11 November 2005 pp. 307-310.
http://dx.doi.org/10.1145/1101149.1101211

[10]   P. Gutmann, “The Design of a Cryptographic Security Architecture,” Proceedings of the 8th USENIX Security Symposium, Washington DC, 23-26 August 1999, pp. 153-168.

[11]   Network Working Group, “Diffie-Hellman Key Agreement Method, Request for Comments: 2631,” RTFM Inc., 1999.

[12]   Open Handset Alliance, 2010.
http://www.openhandsetalliance.com/

[13]   Sip2Peer, SIP-Based API for Robust Connection and Communication among Peers, 2011.
http://code.google.com/p/sip2peer/

[14]   java.net—The Source for Java Technology Collaboration, The JDK 7 Project, 2010. http://jdk7. java.net/

[15]   R. Stewart, “Stream Control Transmission Protocol, Request for Comments: 4960,” IETF Network Working Group, 2010. http://tools.ietf.org/html/rfc4960

[16]   OpenID, 2012. http://www.openid.net

[17]   OAuth, OAuth Community Site, 2012.
http://www.oauth.net/

 
 
Top