{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:14Z","timestamp":1750307834318,"version":"3.41.0"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2008,5,1]],"date-time":"2008-05-01T00:00:00Z","timestamp":1209600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0509061CNS-0621631"],"award-info":[{"award-number":["CNS-0509061CNS-0621631"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2008,5]]},"abstract":"<jats:p>Massive Internet media distribution demands prolonged continuous consumption of networking and disk bandwidths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability and performance issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without copyright protection, content providers are hesitant to use proxy-based fast distribution techniques. Second, little has been done to protect client privacy during content accesses on the Internet. Straightforward solutions to address these two issues independently lead to conflicts. For example, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this article, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms in a cooperative proxy environment where our proposed scheme works efficiently and practically. Simulation-based experiments are conducted to extensively evaluate the proposed system. Preliminary results demonstrate the effectiveness of our proposed strategy.<\/jats:p>","DOI":"10.1145\/1352012.1352013","type":"journal-article","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T18:28:05Z","timestamp":1210876085000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Achieving simultaneous distribution control and privacy protection for Internet media delivery"],"prefix":"10.1145","volume":"4","author":[{"given":"Songqing","family":"Chen","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[{"name":"Sybase Inc., Dublin, CA"}]},{"given":"Huiping","family":"Guo","sequence":"additional","affiliation":[{"name":"California State University, Los Angeles, CA"}]},{"given":"Bo","family":"Shen","sequence":"additional","affiliation":[{"name":"HP Laboratories, Palo Alto, CA"}]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]}],"member":"320","published-online":{"date-parts":[[2008,5,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352609"},{"volume-title":"Proceedings of the 3rd International Conference on Information Security and Cryptology.]]","author":"Bao F.","key":"e_1_2_1_2_1","unstructured":"Bao , F. , Deng , R. , and Feng , P . 2000. An efficient and practical scheme for privacy protection in the e-commerce of digital goods . In Proceedings of the 3rd International Conference on Information Security and Cryptology.]] Bao, F., Deng, R., and Feng, P. 2000. An efficient and practical scheme for privacy protection in the e-commerce of digital goods. In Proceedings of the 3rd International Conference on Information Security and Cryptology.]]"},{"volume-title":"Proceedings of the 6th Australia Conference on Information Security and Privacy","author":"Bao F.","key":"e_1_2_1_3_1","unstructured":"Bao , F. , Deng , R. , Feng , P. , Guo , Y. , and Wu , H . 2001. Secure and private distribution of online video and several related cryptographic issues . In Proceedings of the 6th Australia Conference on Information Security and Privacy . Sidney, Australia.]] Bao, F., Deng, R., Feng, P., Guo, Y., and Wu, H. 2001. Secure and private distribution of online video and several related cryptographic issues. In Proceedings of the 6th Australia Conference on Information Security and Privacy. Sidney, Australia.]]"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/603404.603407"},{"volume-title":"Proceedings of USENIX Security. Washington, D.C.]]","author":"Boneh D.","key":"e_1_2_1_5_1","unstructured":"Boneh , D. , Ding , X. , Tsudik , G. , and Wong , C . 2001. A method for fast revocation of public key certificates and security capabilities . In Proceedings of USENIX Security. Washington, D.C.]] Boneh, D., Ding, X., Tsudik, G., and Wong, C. 2001. A method for fast revocation of public key certificates and security capabilities. In Proceedings of USENIX Security. Washington, D.C.]]"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/517876"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586114"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.802062"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"volume-title":"Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS '06)","author":"Chen S.","key":"e_1_2_1_10_1","unstructured":"Chen , S. , Chen , S. , Guo , H. , Shen , B. , and Jajodia , S . 2006. Efficient proxy-based internet media distribution control and privacy protection infrastructure . In Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS '06) . New Haven, CT.]] Chen, S., Chen, S., Guo, H., Shen, B., and Jajodia, S. 2006. Efficient proxy-based internet media distribution control and privacy protection infrastructure. In Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS '06). New Haven, CT.]]"},{"volume-title":"Proceedings of the 13th International Conference on Data Engineering","author":"Chiu M. Y.","key":"e_1_2_1_11_1","unstructured":"Chiu , M. Y. and Yeung , K. H . 1997. Partial video sequence caching scheme for vod systems with heteroeneous clients . In Proceedings of the 13th International Conference on Data Engineering . Birmingham, UK.]] Chiu, M. Y. and Yeung, K. H. 1997. Partial video sequence caching scheme for vod systems with heteroeneous clients. In Proceedings of the 13th International Conference on Data Engineering. Birmingham, UK.]]"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258609"},{"volume-title":"Proceedings of Crypto","author":"Coron J.","key":"e_1_2_1_13_1","unstructured":"Coron , J. , Naccache , D. , and Stern , J . 1999. On the security of rsa padding . In Proceedings of Crypto . Santa Barbara, CA.]] Coron, J., Naccache, D., and Stern, J. 1999. On the security of rsa padding. In Proceedings of Crypto. Santa Barbara, CA.]]"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"volume-title":"Proceedings of the 13th USENIX Security Symposium.]]","author":"Dingledine R.","key":"e_1_2_1_15_1","unstructured":"Dingledine , R. , Mathewson , N. , and Syverson , P . 2004. Tor: The second-generation onion router . In Proceedings of the 13th USENIX Security Symposium.]] Dingledine, R., Mathewson, N., and Syverson, P. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium.]]"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_2_1_17_1","article-title":"A public key cryptosystem and signature scheme based on the discrete logarithm","author":"Gamal T.","year":"1985","unstructured":"Gamal , T. 1985 . A public key cryptosystem and signature scheme based on the discrete logarithm . IEEE Trans. Inform. Theory 4.]] Gamal, T. 1985. A public key cryptosystem and signature scheme based on the discrete logarithm. IEEE Trans. Inform. Theory 4.]]","journal-title":"IEEE Trans. Inform. Theory 4.]]"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276723"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030113"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/290747.290751"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"volume-title":"Proceedings of IEEE Inforcom","author":"Kangasharju J.","key":"e_1_2_1_22_1","unstructured":"Kangasharju , J. , Hartanto , F. , Reisslein , M. , and Ross , K. W . 2001. Distributing layered encoded video through caches . In Proceedings of IEEE Inforcom . Anchorage, AK.]] Kangasharju, J., Hartanto, F., Reisslein, M., and Ross, K. W. 2001. Distributing layered encoded video through caches. In Proceedings of IEEE Inforcom. Anchorage, AK.]]"},{"key":"e_1_2_1_23_1","unstructured":"Mediacom. http:\/\/www.mediacomcc.com\/.]]  Mediacom. http:\/\/www.mediacomcc.com\/.]]"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.802061"},{"volume-title":"Proceedings of the 22nd National Information Systems and Security Conference","author":"Park J.","key":"e_1_2_1_25_1","unstructured":"Park , J. and Sandhu , R . 1999. Extending x.509 for secure attribute services on the web . In Proceedings of the 22nd National Information Systems and Security Conference . Crystal City, VA.]] Park, J. and Sandhu, R. 1999. Extending x.509 for secure attribute services on the web. In Proceedings of the 22nd National Information Systems and Security Conference. Crystal City, VA.]]"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293778"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030114"},{"volume-title":"Proceedings of IEEE INFOCOM. Tel-Aviv, Israel.]]","author":"Rejaie R., H.","key":"e_1_2_1_28_1","unstructured":"Rejaie , R., H. Yu , M. H. , and Estrin , D . 2000. Multimedia proxy caching mechanism for quality adaptive streaming applications in the internet . In Proceedings of IEEE INFOCOM. Tel-Aviv, Israel.]] Rejaie, R., H. Yu, M. H., and Estrin, D. 2000. Multimedia proxy caching mechanism for quality adaptive streaming applications in the internet. In Proceedings of IEEE INFOCOM. Tel-Aviv, Israel.]]"},{"volume-title":"Proceedings of the 9th International Workshop on Web Content Caching and Distribution","author":"Roy S.","key":"e_1_2_1_29_1","unstructured":"Roy , S. , Shen , B. , Chen , S. , and Zhang , X . 2004. An empirical study of a segment-based streaming proxy in an enterprise environment . In Proceedings of the 9th International Workshop on Web Content Caching and Distribution . Beijing, China.]] Roy, S., Shen, B., Chen, S., and Zhang, X. 2004. An empirical study of a segment-based streaming proxy in an enterprise environment. In Proceedings of the 9th International Workshop on Web Content Caching and Distribution. Beijing, China.]]"},{"key":"e_1_2_1_30_1","unstructured":"RSA Laboratories. 2002. PKCS 1 v2.1: RSA cryptography standard.]]  RSA Laboratories. 2002. PKCS 1 v2.1: RSA cryptography standard.]]"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775208"},{"volume-title":"Proceedings of IEEE INFOCOM","author":"Sen S.","key":"e_1_2_1_32_1","unstructured":"Sen , S. , Rexford , J. , and Towsley , D . 1999. Proxy prefix caching for multimedia streams . In Proceedings of IEEE INFOCOM . New York, NY.]] Sen, S., Rexford, J., and Towsley, D. 1999. Proxy prefix caching for multimedia streams. In Proceedings of IEEE INFOCOM. New York, NY.]]"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/290747.290758"},{"volume-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings W.","key":"e_1_2_1_34_1","unstructured":"Stallings , W. 1998. Cryptography and Network Security: Principles and Practice . Prentice Hall .]] Stallings, W. 1998. Cryptography and Network Security: Principles and Practice. Prentice Hall.]]"},{"key":"e_1_2_1_35_1","unstructured":"Tosun A. S. and Feng W. C. 2002. Secure video transmission using proxies. Tech. rep. Computer and Information Science Ohio State University.]]  Tosun A. S. and Feng W. C. 2002. Secure video transmission using proxies. Tech. rep. Computer and Information Science Ohio State University.]]"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2002.800321"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644532"},{"volume-title":"Proceedings of the 3rd Workshop on Policies for Distributed Systems and Networks","author":"Winsborough W.","key":"e_1_2_1_38_1","unstructured":"Winsborough , W. and Li , N . 2002b. Towards practical autmated trust negeotiation . In Proceedings of the 3rd Workshop on Policies for Distributed Systems and Networks . Monterey, CA.]] Winsborough, W. and Li, N. 2002b. Towards practical autmated trust negeotiation. In Proceedings of the 3rd Workshop on Policies for Distributed Systems and Networks. Monterey, CA.]]"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.371933"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027617"},{"volume-title":"Proceedings of IEEE VTC Wireless Security Symposium","author":"Yang H.","key":"e_1_2_1_41_1","unstructured":"Yang , H. and Lu , S . 2004. Commutative cipher based en-route filtering in wireless sensor networks . In Proceedings of IEEE VTC Wireless Security Symposium . Los Angeles, CA.]] Yang, H. and Lu, S. 2004. Commutative cipher based en-route filtering in wireless sensor networks. In Proceedings of IEEE VTC Wireless Security Symposium. Los Angeles, CA.]]"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/641007.641089"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.843361"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.865072"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352012.1352013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352012.1352013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:59Z","timestamp":1750255079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352012.1352013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,5]]}},"alternative-id":["10.1145\/1352012.1352013"],"URL":"https:\/\/doi.org\/10.1145\/1352012.1352013","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2008,5]]},"assertion":[{"value":"2007-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2007-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}