Trust Issues and Solutions in Multimedia Content Distribution

Trust Issues and Solutions in Multimedia Content Distribution

Shiguo Lian
DOI: 10.4018/978-1-61520-682-7.ch005
(Individual Chapters)
No Current Special Offers


Multimedia content distribution is a key technique for multimedia services, which transmits multimedia content from a sender to certain receiver(s). With the popularity of multimedia services, the trust issues in content distribution becomes urgent, including the authorized access, privacy protection, trusted payment, piracy surveillance, and so forth. This chapter introduces the trust issues in multimedia content distribution (e.g., authorization, authentication, privacy, payment, ownership, illegal distribution, forgery, etc.), reviews the latest research progress of the solutions, and presents some open issues and promising research topics. It is expected to provide valuable information to researchers or engineers in this field.
Chapter Preview


Trust (Trust, 2009) is a complicated term which has different explanations in different fields, including social science, law, digital information, finance, etc. For example, in social science, trust (Misztal, 1996) is a relationship of reliance. A trusted party is presumed to seek to fulfill policies, ethical codes, law and their previous promises. Trust does not need to involve belief in the good character, vices, or morals of the other party. Persons engaged in a criminal activity usually trust each other to some extent. Also, trust does not need to include an action that you and the other party are mutually engaged in. Trust is a prediction of reliance on an action, based on what a party knows about the other party. In sociology, the degree to which one party trusts another is a measure of belief in the honesty, benevolence and competence of the other party.

In common law legal systems, trust is an arrangement whereby property is managed by one person for the benefit of another (Hudson, 2003). A trust is created by a settlor, who entrusts some or all of his or her property to people of his choice, i.e., the trustees. The trustees hold legal title to the trust property, but they are obliged to hold the property for the benefit of one or more individuals or organizations, usually specified by the settlor, who hold equitable title. The trustees owe a fiduciary duty to the beneficiaries, who are the beneficial owners of the trust property. The trust is governed by the terms of the trust document, which is usually written and occasionally set out in deed form. The trustee is obliged to administer the trust in accordance with both the terms of the trust document and the governing law.

With the wide applications of digital information, trust in digital information is becoming an important topic (Kelton, et al., 2008). And, many discussions of trust in this environment focus on issues like security or technical reliability. Specially, in security engineering, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy (Taipale, 2005). As such, a trusted system is one whose failure may break a specified security policy. It is often defined from four aspects, i.e., classified information, trusted computing, policy analysis and information theory. In classified information, trusted systems are used for the processing, storage and retrieval of sensitive or classified information. In trusted computing, trust is used by the Trusted Computing Group (TCG, 2009) mainly in the sense of authorization that defines whether a user is authorized to do something. In policy analysis, trusted systems in the context of national or homeland security, law enforcement, or social control policy are systems in which some conditional prediction about the behavior of people or objects within the system has been determined prior to authorizing access to system resources. In information theory, a trusted system is based on the definition of 'Trust is that which is essential to a communication channel but cannot be transferred from a source to a destination using that channel' (Gerck, 1998). This chapter will focus on the trust in security engineering.

Multimedia content distribution (e.g., digital TV, mobile TV, IPTV, online music, etc.) is a kind of digital information system (Lian & Zhang, 2009), which becomes more and more popular with the rapid development of network technology and multimedia technology. Thus, the trust in multimedia content distribution is urgent, especially the security aspects. Generally, a multimedia distribution system, composed of the sender (and device), receiver (and device), transmission channel, storage device, etc., distributes the multimedia content from the sender(s) to receiver(s) through various communication manners. Multimedia content's properties, such as large volumes, worthy commerce value, real time interaction, etc., make multimedia distribution systems different from traditional information systems. Till now, some means to confirm the trust in multimedia distribution have been proposed (Lian, 2009). However, few works has been done to show the progress of trust issues and solutions in this field. This chapter aims to review the latest research results in trust issues and solutions for multimedia distribution, and provide valuable information to researchers or engineers.

Complete Chapter List

Search this Book: