Securing Virtual Service Generation on the Network: Adapting Digital Rights Management to Cloud-Delivered Media

نویسنده

  • Alexandra Mikityuk
چکیده

This work introduces a novel content protection security framework within the virtual Set-Top Box (vSTB) concept. This concept presents a fundamental change in the creation and delivery of media services such as IP Television, by shifting most of the STB’s service execution environment to a network infrastructure. This shift enables a so-called cloud-based rendering of the User Interface and therefore poses new challenges for the classical IPTV security mechanism. After successful tests on the conventional network infrastructure (legacy network), the vSTB concept takes the consolidated and virtualized network approach as its target architecture for the implementation of the vSTB Security Framework. This work briefly introduces the vSTB concept, comparing overall system latency for locallyand cloud-rendered IPTV User Interface. It also presents the novel vSTB High Level Security Framework within the virtualized network infrastructure, analyzing potential system vulnerabilities and security threats. This work defines security challenges and open issues that may arise in the context of virtual service generation and its delivery to lightweight hardware. The paper herewith provides a review of this new research topic, on which research has not yet been published.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Communication-Aware Traffic Stream Optimization for Virtual Machine Placement in Cloud Datacenters with VL2 Topology

By pervasiveness of cloud computing, a colossal amount of applications from gigantic organizations increasingly tend to rely on cloud services. These demands caused a great number of applications in form of couple of virtual machines (VMs) requests to be executed on data centers’ servers. Some of applications are as big as not possible to be processed upon a single VM. Also, there exists severa...

متن کامل

A Conceptual Architecture for Securing public Cloud: Moving from Trust toward Security

Cloud computing is next generation era of IT enterprise, which provide services like resource pooling, on demand and metered service. It provides the burden free environment for the consumer, to get rid of resource management. It also shifts all digital assets (data and application) to the centralized large datacentre. These datacentre can be onpremise or off-premise cloud service provider, dep...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Virtual Resources & Blockchain for Configuration Management in IoT

Until now, most systems for Internet of Things (IoT) management, have been designed in a Cloud-centric manner, getting benefits from the unified platform that the Cloud offers. However, a Cloud-centric infrastructure mainly achieves static sensor and data streaming systems, which do not support the direct configuration management of IoT components. To address this issue, a virtualization of IoT...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014