Top Banner
指指指指 指指指 指指 指指 指指指 指指指 指指指 (M9856038) 指指指 (M9756025) 指指指 (M9856011) 指指指 (M9856021) 指指指 (M9756020) PROTECTED SEAMLESS CONTENT DELIVERY IN P2P WIRELESS AND WIRED NETWORKS
37

PROTECTED SEAMLESS CONTENT DELIVERY IN P2P WIRELESS AND WIRED NETWORKS

Feb 04, 2016

Download

Documents

zurina

PROTECTED SEAMLESS CONTENT DELIVERY IN P2P WIRELESS AND WIRED NETWORKS. 指導教授: 童曉儒 教授 組別:第二組 報告者:盧玉玲 (M9856038) 沈宗億 (M9756025) 歐宗明 (M9856011) 黃承晧 (M9856021) 買冠億 (M9756020). TECHNOLOGY PILLARS. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • (M9856038) (M9756025) (M9856011) (M9856021) (M9756020)PROTECTED SEAMLESS CONTENT DELIVERY IN P2P WIRELESS AND WIRED NETWORKS

  • TECHNOLOGY PILLARSAs mentioned before, the combination of all these technologies provides our system with novelty and appeal.These technology pillars are:Multilayered/multiview content codingMultisource/multinetwork streaming and adaptation architecturesThe content protection and lightweight assetmanagement system

  • MULTILAYERED/MULTIVIEWCONTENT CODINGFor the proposed architecture, we have considered H.264/MPEG4-SVC and H.264/MPEG4-MVC as the major content formats to be delivered over heterogeneous networks.

  • MULTISOURCE/MULTINETWORK STREAMING AND ADAPTATION ARCHITECTURESThe second technology pillar used is multisource/multinetwork streaming and adaptation.

    Although the system is prepared for mesh P2P logical overlay technologies, it can also be used in broadcasting networks, such as digital video broadcasting-terrestrial (DVB-T), DVB satellite (DVB-S), DVB cable (DVB-C), interactive/on demand bidirectional networks ( WiMAX), and mobile networks such as third/fourth generation (3G/4G) and DVB-H .

  • CONTENT PROTECTION AND LIGHTWEIGHT ASSET MANAGEMENT By this pillar, new business models for large-scale content distribution will be facilitated side by side with a proper content protection and asset management mechanism.

    On one hand, we provide encryption technologies to be embedded in the H.264/MPEG4-SVC/MVC encoder and decoder, extending content protection mechanisms based on ISMACryp for point-to-multipoint and P2P topologies.

  • CONTENT PROTECTION AND LIGHTWEIGHT ASSET MANAGEMENT

  • CONTENT PROTECTION AND LIGHTWEIGHT ASSET MANAGEMENTWe have designed the MANE nodes (sHMG and sNMG) as network-based components for architecture that support intelligent seamless content distribution.

    Moreover, as they have knowledge of the underlined networks, they provide information on the network conditions/features, which is utilized by the cross-layer control (CLC) mechanism, and adapt the multimedia streams to the next network in the delivery path.

  • CONTENT PROTECTION AND LIGHTWEIGHT ASSET MANAGEMENTsHMG is able to offer multimedia content adaptation and caching/storage functions to the service provider and the community.

    The storage capabilities of the sHMG are divided in two partitions.

    One partition is allocated to the user for his/her personal/private content. This content is distributed on user demand and under user permissions, by means of the P2P communications network.

  • CONTENT PROTECTION AND LIGHTWEIGHT ASSET MANAGEMENTThe second partition is allocated to the service provider and/or the community network, and is utilized as a temporal cache.

    As content protection and management are provided, network operators and service providers may offer value-added streaming services with remarkable PQoS.

  • CONTENT PROTECTIONWe aim to provide an end-to-end solution for content protection management for IP and P2P networks, I exploiting the full potential of content protection and creators rights maintenance.

    This ciphering technology is applied to each layer (in SVC) or view (in MVC) of an H.264/MPEG4-SVC/MVC video stream separately.

  • CONTENT PROTECTION (Cont)Especially for the P2P network architecture, a secure content protection technology is needed because the content passes a number of peer nodes that are not always trusted and can easily keep a copy of the content.When content encryption is applied at the server (which in the targeted architecture can be the terminal of any user), only entitled users can decrypt and view a specific layer or view certain content.

  • CONTENT PROTECTION (Cont)For the interface between the scrambler and the licensing system, we have followed the DVB SimulCrypt specification , which allows using the encrypting core technology with different conditional access systems either as alternative implementations or even at the same time.

    With respect to the envisioned new paradigm of any user being a content creator, it is very important to provide a standardized interface .

  • CONTENT PROTECTION (Cont)CA (Conditional Access)

  • CONTENT PROTECTION (Cont)Real-Time Transport Protocol (RTP) RTP Header RTP Features Sequence number Timestamp

  • CONTENT PROTECTION (Cont)2.1. MP4 3.7.4.CW8.5.CA CW6.CW1.CW2.CW3.CWECM4.ECM2.SKEMM1.ECMSKContent protection system process

  • CONTENT MANAGEMENT SYSTEMDue to the fact that distributed P2P architecture clients do not establish a secure connection with a server and download content, the network architecture entails serious security problems.

    For this reason, we propose a semi-distributed P2P-based architecture, in which some critical functions exist in a dedicated content management server, while all others lie in peer node .

  • Implemented SolutionAs mentioned above, we targeted a secure SVC/MVC content management and media sharing system that can be divided into server side and client side.We decided to follow the DVB SimulCrypt specification for the implementation in order to make it easier to adapt the content protection system to the content management system, but our target has always been to implement a lightweight and interoperable management system.

  • Implemented Solution(2)This implementation gives the system the capability to be compatible with other content management system implementations, DRM systems, and so on.Figure 3 shows an overview of the content protection and key management system.

  • Figure 3. An overview of the content protection and key management system.The content management system consists of a server agent with several functions.

  • Figure 3. An overview of the content protection and key management system.

  • Implemented Solution(3)Finally, the server acts as a license management agent, keeping a list of all the available licenses in order to let the clients know which licenses they have purchased and modifying the content of the license accordingly .

  • An example of the functionality of the P2Pcontent management system is shown in Fig. 3

  • An example of the functionality of the P2Pcontent management system is shown in Fig. 3

  • An example of the functionality of the P2Pcontent management system is shown in Fig. 3

  • An example of the functionality of the P2Pcontent management system is shown in Fig. 3

  • An example of the functionality of the P2Pcontent management system is shown in Fig. 3

  • An example of the functionality of the P2Pcontent management system is shown in Fig. 3To complete our system, we need to add some plug-ins into the media player included in the device in order to provide the system with all these functionalities.

  • An example of the functionality of the P2Pcontent management system is shown in Fig. 3First, an SVC codec plug-in to the clients media player is added. Thus, the content is available in several resolutions to satisfy different clients needs.Additionally, a plug-in is added to the media player to make it able to create and understand the licenses, and execute the content as the rights object authorizes it to do.Finally, the ISMACryp decrypting capabilities are included in the client environment, while the ISMACryp proxy is located at the server side.

  • ECMG and EMMGECMThe ECM generator creates an ECM message, which includes the CW that has been used to encrypt the content following the ISMACryp standard, and some other parameters needed to establish connection between this particular module and the SCS module.EMMthe EMM messages are generated by the EMM generator module, also included in the server. An EMM contains the license, which indicates the actions a user can take on specified content and the necessary key to decrypt the encrypted CW of the ECM.

  • Figure 4. Interaction between ECM and EMM messages.

  • Key Management

    In order to control all the keys that get into the action, the system includes a key management system. In the proposed content management system, two different set of keys are implicated. 1.One of them is needed to encrypt the CW generated by the ISMACryp Proxy, as described earlier. This encryption takes place in the ECMG module. 2.The other set of keys is needed to encrypt the license, which takes place in the license management module.

  • License ManagementThe implemented license management system gives the user the freedom to create and modify its licenses, so we can define it as a personalized license management system. For this reason, it needs to be located at the client side for generating and performing the license, and also at the server side for delivery of the license to the users that request it.

  • License Management(cont.)License management system.

  • Use Cases

    According to the consumption permission given to the media content, we can distinguish several use cases that should be treated in our model:1.Content that can be consumed by any user.

    2. Encrypted content restricted to a set of users selected by the author. -The creator sends them the key (by email, phone call, etc.), giving them the freedom to consume it whenever they desire.

    -The creator wants to have control over the content and avoid its consumption by other people.

  • System Testing Architecture

    General testing architecture

  • 1.SVC/MVCserverclient2.DVB SimulCrypt 1.DRM2.SERVER AGENT1.ECMSCSSCS-ECMG(Simulcrypt)2.EMMserverlicenselicensesclients1.licenses2.licenseP2P1. Peer1 server serverPeer1user_ID2.Peer1(.) Peer1P2P

    serverODRLLicense licenses licenseclient(user_IDcontent_ID)CW3.SERVERCLIENTSimulcrypt ECM(CW)Symulcript syncronizerISMACrypt proxy CWs

    4.Peer1ECMP2P

    5.Peer2web interface ()ECMP2P6.Peer2serverlicense7.ServerEMMlicensePeer2 Peer2

    media playersvc codec client client

    licenses

    ISMACrypclientISMACryp proxySERVERECMECMECMCWISMACrypSCSEMMEMMEMMSERVEREMMlicenseECMCW