Abstract
The growing interest in media sharing combined with the explosion of social applications have opened an opportunity window for cloud based applications for media management as Media Cloud, described in this article, that has brought the concept of Cloud Computing to home environments. Media Cloud provides a comprehensive and efficient solution for managing content among federated home environments. As part of the purpose of empowering the user role as well as to improve user experience, we placed significant efforts on interoperability and privacy protection when it comes to accessing cloud resources from other networks. This article describes a solution that enables limited devices to access contents located in private clouds, as Media Cloud, with the cooperation of network providers,
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
Let it rise: a special report on corporate it. The Economist (2008).
Netflix http://www.netflix.com.
Ultraviolet www.uvvu.com.
iCloud, http://www.icloud.
DropBox, https://www.dropbox.com.
Pogoplug www.pogoplug.com.
Tonido http://www.tonido.com/.
Zumo Drive http://www.zumodrive.com.
inXtron http://www.inxtron.com.
W3C Privacy Dashboard http://code.w3.org/privacy-dashboard/wiki.
References
Content protection and copy management specification; part 2: Cpcm reference model (Tech. Rep. ETSI TS 102 825-2 V1.1.1). European Telecommunications Standards Institute (2008).
Content protection and copy management specification; part 3: Cpcm usage state information (Tech. Rep. ETSI TS 102 825-3 V1.1.1). European Telecommunications Standards Institute (2008).
P1817 standard for consumer-ownable digital personal property, initial technical description of the p1817 standar (Tech. Rep. P1817). IEEE (2011). Available at http://grouper.ieee.org/groups/1817/pub_docs/TechDescription_095.pdf.
Androutsellis-Theotokis, S., & Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36, 335–371. doi:10.1145/1041680.1041681.
Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., & Lilien, L. (2010). An entity-centric approach for privacy and identity management in cloud computing. In 29th IEEE symposium on reliable distributed systems, 2010 (pp. 177–183). doi:10.1109/SRDS.2010.28.
Arias, P., Almenares, F., Sánchez, R., Marín, A., & Díaz-Sánchez, D. (2012). Multi-device single sign-on for cloud service continuity. In Proc. IEEE int. conference on consumer electronics (pp. 1–2). New York: IEEE Press.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., & Zaharia, M. (2009). Above the clouds: a Berkeley view of cloud computing. (Tech. Rep. UCB/EECS-2009-28). EECS Department, University of California, Berkeley. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.
Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13, 422–426. doi:10.1145/362686.362692.
Bonneau, J. (2009). Attack of the zombie photos. http://www.lightbluetouchpaper.org/2009/05/20/attack-of-the-zombie-photos/. Accessed 12 January 2012.
Breitman, K., Endler, M., Pereira, R., & Azambuja, M. (2010). When tv dies, will it go to the cloud? Computer, 43(4), 81–83. doi:10.1109/MC.2010.118.
Broder, A., & Mitzenmacher, M. (2002). Network applications of bloom filters: a survey. In Internet mathematics (pp. 636–646).
Cameron, K., Posch, R., & Rannenberg, K. (2008). Proposal for a common identity framework: a user-centric identity metasystem.
Cavoukian, A. (2008). Privacy in the clouds. Identity in the Information Society, 1(1), 89–108. doi:10.1007/s12394-008-0005-z.
Chen, H., Jin, H., Chen, L., Liu, Y., & Ni, L. (2011). Optimizing bloom filter settings in peer-to-peer multi-keyword searching. IEEE Transactions on Knowledge and Data Engineering, PP(99), 1. doi:10.1109/TKDE.2011.14.
Chen, Y., Paxson, V., & Katz, R. H. (2010). Whats new about cloud computing security? Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley.
Díaz-Sánchez, D., Marín López, A., Almenárez Mendoza, F., Campo Vázquez, C., & García-Rubio, C. (2007). Context awareness in network selection for dynamic environments. Telecommunication Systems, 36, 49–60. doi:10.1007/s11235-007-9058-9.
Díaz-Sánchez, D., Almenárez, F., Marín, A., Arias, P., Sanchez-Guerrero, R., & Sanvido, F. (2011). A privacy aware media gateway for connecting private multimedia clouds to limited devices. In Wireless and mobile networking conference (WMNC), 2011 4th joint IFIP (pp. 1–8). doi:10.1109/WMNC.2011.6097259.
Díaz-Sánchez, D., Almenárez, F., Marín, A., Proserpio, D., & Arias, P. (2011). Media cloud: an open cloud computing middleware for content management. IEEE Transactions on Consumer Electronics, 57(2), 970–978. doi:10.1109/TCE.2011.5955247.
Erdogmus, H. (2009). Cloud computing: does nirvana hide behind the nebula? IEEE Software, 26(2), 4–6. doi:10.1109/MS.2009.31.
Erickson, J., Spence, S., Rhodes, M., Banks, D., Rutherford, J., Simpson, E., Belrose, G., & Perry, R. (2009). Content-centered collaboration spaces in the cloud. IEEE Internet Computing, 13(5), 34–42. doi:10.1109/MIC.2009.93.
Filipovic, P. (2008). The future of home networks—a global perspective (Tech. rep.). The Diffusion Group.
Geambasu, R., Kohno, T., Levy, A. A., Levy, H. M. (2009). Vanish: increasing data privacy with self-destructing data.
Gellman, R. (2009). Privacy in the Clouds: risks to privacy and confidentiality from Cloud Computing (Tech. rep.).
Goodrich, M. T., & Mitzenmacher, M. (2011). Invertible bloom lookup tables. CoRR, 1101.2245.
Gray, J. (2008). Distributed computing economics. Queue, 6(3), 63–68. doi:10.1145/1394127.1394131.
Grzonkowski, S., Corcoran, P., & Coughlin, T. (2011). Security analysis of authentication protocols for next-generation mobile and ce cloud services. In IEEE international conference on consumer electronics-Berlin (ICCE-Berlin) (pp. 83–87). doi:10.1109/ICCE-Berlin.2011.6031855.
Hammer-Lahav, E. (2010)). The OAuth 1.0 Protocol. RFC 5849 (Informational). http://www.ietf.org/rfc/rfc5849.txt.
Hardt, D. (2005). Identity 2.0. Keynote Talk at OSCON 2005.
Heynen, J. (2011). Home networking devices. Tech. rep., Infonetics Research.
Hirsch, F., Philpott, R., & Maler, E. (2005). Security and privacy considerations for the oasis security assertion markup language (saml) v2.0. Tech. rep., OASIS Standard.
Kahl, C., Böttcher, K., Tschersich, M., Heim, S., & Rannenberg, K. (2010). How to enhance privacy and identity management for mobile communities: approach and user driven concepts of the picos project. In K. Rannenberg, V. Varadharajan, & C. Weber (Eds.), Security and privacy silver linings in the cloud: Vol. 330. IFIP advances in information and communication technology, pp. 277–288). Boston: Springer.
Ko, R. K. L., Jagadpramana, P., & Lee, B. S. (2011). Flogger: a file-centric logger for monitoring file access and transfers within cloud computing environments. International Joint Conference of IEEE TrustCom/IEEE ICESS/FCST (pp. 765–771). doi:10.1109/TrustCom.2011.100.
Lampropoulos, K., Diaz-Sanchez, D., Almenares, F., Weik, P., & Denazis, S. (2010). Introducing a cross federation identity solution for converged network environments. In Principles, systems and applications of IP telecommunications, IPTComm ’10 (pp. 1–11). New York: ACM. doi:10.1145/1941530.1941532.
Massonet, P., Naqvi, S., Ponsard, C., Latanicki, J., Rochwerger, B., & Villari, M. (2011). A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures. In IEEE international symposium on parallel and distributed processing workshops and Phd forum (IPDPSW), 2011 (pp. 1510–1517). doi:10.1109/IPDPS.2011.304.
Nauman, M., Ali, T., & Rauf, A. (2013). Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommunication Systems, 52, 1–13. doi:10.1007/s11235-011-9538-9.
Palfrey, J., & Gasser, U. (2008). Born digital: understanding the first generation of digital natives/John Palfrey and Urs Gasser. New York: Basic Books.
Parkhill, D. F. (1966). The challenge of the computer utility by Parkhill, D. F. Reading: Addison-Wesley.
Pearson, S. (2009). Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE workshop on software engineering challenges of cloud computing, CLOUD ’09 (pp. 44–52). Washington: IEEE Comput. Soc. doi:10.1109/CLOUD.2009.5071532.
Presser, A., Farrell, L., Kemp, D., Lupton, W., Tsuruyama, S., & Albright, S. (2008). Upnp device architecture (Tech. Rep. V1.1). UPnP Forum.
Shah, M. A., Baker, M., Mogul, J. C., & Swaminathan, R. (2007). Auditing to keep online storage services honest. In Proceedings of the 11th USENIX workshop on hot topics in operating systems (pp. 11:1–11:6). Berkeley: USENIX Association. http://dl.acm.org/citation.cfm?id=1361397.1361408.
Simoes, J., & Magedanz, T. (2011). Contextualized user-centric multimedia delivery system for next generation networks. Telecommunication Systems, 48, 301–316. doi:10.1007/s11235-010-9345-8.
Sánchez, R., Arias, P., Almenares, F., & Díaz-Sánchez, D. (2012). Trust-aware federated idm in consumer cloud computing. In Proc. IEEE int. conference on consumer electronics (pp. 1–2). New York: IEEE Press.
Sánchez-Guerrero, R., Almenarez, F., Díaz-Sánchez, D., Marín, A., & Arias, P. (2010). Improving privacy in identity management systems for healthcare scenarios. In Third international symposium on ubiquitous computing and ambient intelligence (Ucami2011) (pp. 1–5).
Tang, Y., Lee, P. P. C., Lui, J. C. S., & Perlman, R. (2010). FADE: secure overlay cloud storage with file assured deletion security and privacy in communication networks (Vol. 22, pp. 380–397). Berlin: Springer. doi:10.1007/978-3-642-16161-2_22.
Tian, Y., Song, B., & Huh, E. N. (2011). Towards the development of personal cloud computing for mobile thin-clients. In International conference on information science and applications (ICISA), 2011 (pp. 1–5). doi:10.1109/ICISA.2011.5772368.
Velte, T., Velte, A., & Elsenpeter, R. (2010). Cloud computing, a practical approach (1st ed.). New York: McGraw-Hill.
Voas, J., & Zhang, J. (2009). Cloud computing: new wine or just a new bottle? IT Professional, 11(2), 15–17. doi:10.1109/MITP.2009.23.
Wang, C., Wang, Q., Ren, K., & Lou, W. (2009). Ensuring data storage security in cloud computing. In 17th international workshop on quality of service, 2009, IWQoS (pp. 1–9). doi:10.1109/IWQoS.2009.5201385.
Wehrle, K., & Steinmetz, R. (2005). Peer-to-peer-based applications. In Peer-to-peer systems and applications (pp. 1–5).
Weiss, A. (2007). Computing in the clouds. Networker, 11, 16–25.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work has been partially supported by the State of Madrid (CAM), Spain under the contract number S2009/TIC-1650, project E-Madrid.
Rights and permissions
About this article
Cite this article
Díaz-Sánchez, D., Almenarez, F., Marín, A. et al. Media Gateway: bringing privacy to private multimedia cloud connections. Telecommun Syst 55, 315–330 (2014). https://doi.org/10.1007/s11235-013-9783-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-013-9783-1