Telecommunication Systems

, Volume 55, Issue 2, pp 315–330 | Cite as

Media Gateway: bringing privacy to private multimedia cloud connections

  • Daniel Díaz-Sánchez
  • Florina Almenarez
  • Andrés Marín
  • Rosa Sánchez-Guerrero
  • Patricia Arias


The growing interest in media sharing combined with the explosion of social applications have opened an opportunity window for cloud based applications for media management as Media Cloud, described in this article, that has brought the concept of Cloud Computing to home environments. Media Cloud provides a comprehensive and efficient solution for managing content among federated home environments. As part of the purpose of empowering the user role as well as to improve user experience, we placed significant efforts on interoperability and privacy protection when it comes to accessing cloud resources from other networks. This article describes a solution that enables limited devices to access contents located in private clouds, as Media Cloud, with the cooperation of network providers,


Cloud computing Multimedia Streaming Privacy 


  1. 1.
    Content protection and copy management specification; part 2: Cpcm reference model (Tech. Rep. ETSI TS 102 825-2 V1.1.1). European Telecommunications Standards Institute (2008). Google Scholar
  2. 2.
    Content protection and copy management specification; part 3: Cpcm usage state information (Tech. Rep. ETSI TS 102 825-3 V1.1.1). European Telecommunications Standards Institute (2008). Google Scholar
  3. 3.
    P1817 standard for consumer-ownable digital personal property, initial technical description of the p1817 standar (Tech. Rep. P1817). IEEE (2011). Available at
  4. 4.
    Androutsellis-Theotokis, S., & Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36, 335–371. doi: 10.1145/1041680.1041681. CrossRefGoogle Scholar
  5. 5.
    Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., & Lilien, L. (2010). An entity-centric approach for privacy and identity management in cloud computing. In 29th IEEE symposium on reliable distributed systems, 2010 (pp. 177–183). doi: 10.1109/SRDS.2010.28. CrossRefGoogle Scholar
  6. 6.
    Arias, P., Almenares, F., Sánchez, R., Marín, A., & Díaz-Sánchez, D. (2012). Multi-device single sign-on for cloud service continuity. In Proc. IEEE int. conference on consumer electronics (pp. 1–2). New York: IEEE Press. Google Scholar
  7. 7.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., & Zaharia, M. (2009). Above the clouds: a Berkeley view of cloud computing. (Tech. Rep. UCB/EECS-2009-28). EECS Department, University of California, Berkeley.
  8. 8.
    Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13, 422–426. doi: 10.1145/362686.362692. CrossRefGoogle Scholar
  9. 9.
    Bonneau, J. (2009). Attack of the zombie photos. Accessed 12 January 2012.
  10. 10.
    Breitman, K., Endler, M., Pereira, R., & Azambuja, M. (2010). When tv dies, will it go to the cloud? Computer, 43(4), 81–83. doi: 10.1109/MC.2010.118. CrossRefGoogle Scholar
  11. 11.
    Broder, A., & Mitzenmacher, M. (2002). Network applications of bloom filters: a survey. In Internet mathematics (pp. 636–646). Google Scholar
  12. 12.
    Cameron, K., Posch, R., & Rannenberg, K. (2008). Proposal for a common identity framework: a user-centric identity metasystem. Google Scholar
  13. 13.
    Cavoukian, A. (2008). Privacy in the clouds. Identity in the Information Society, 1(1), 89–108. doi: 10.1007/s12394-008-0005-z. CrossRefGoogle Scholar
  14. 14.
    Chen, H., Jin, H., Chen, L., Liu, Y., & Ni, L. (2011). Optimizing bloom filter settings in peer-to-peer multi-keyword searching. IEEE Transactions on Knowledge and Data Engineering, PP(99), 1. doi: 10.1109/TKDE.2011.14. CrossRefGoogle Scholar
  15. 15.
    Chen, Y., Paxson, V., & Katz, R. H. (2010). Whats new about cloud computing security? Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley. Google Scholar
  16. 16.
    Díaz-Sánchez, D., Marín López, A., Almenárez Mendoza, F., Campo Vázquez, C., & García-Rubio, C. (2007). Context awareness in network selection for dynamic environments. Telecommunication Systems, 36, 49–60. doi: 10.1007/s11235-007-9058-9. CrossRefGoogle Scholar
  17. 17.
    Díaz-Sánchez, D., Almenárez, F., Marín, A., Arias, P., Sanchez-Guerrero, R., & Sanvido, F. (2011). A privacy aware media gateway for connecting private multimedia clouds to limited devices. In Wireless and mobile networking conference (WMNC), 2011 4th joint IFIP (pp. 1–8). doi: 10.1109/WMNC.2011.6097259. CrossRefGoogle Scholar
  18. 18.
    Díaz-Sánchez, D., Almenárez, F., Marín, A., Proserpio, D., & Arias, P. (2011). Media cloud: an open cloud computing middleware for content management. IEEE Transactions on Consumer Electronics, 57(2), 970–978. doi: 10.1109/TCE.2011.5955247. CrossRefGoogle Scholar
  19. 19.
    Erdogmus, H. (2009). Cloud computing: does nirvana hide behind the nebula? IEEE Software, 26(2), 4–6. doi: 10.1109/MS.2009.31. CrossRefGoogle Scholar
  20. 20.
    Erickson, J., Spence, S., Rhodes, M., Banks, D., Rutherford, J., Simpson, E., Belrose, G., & Perry, R. (2009). Content-centered collaboration spaces in the cloud. IEEE Internet Computing, 13(5), 34–42. doi: 10.1109/MIC.2009.93. CrossRefGoogle Scholar
  21. 21.
    Filipovic, P. (2008). The future of home networks—a global perspective (Tech. rep.). The Diffusion Group. Google Scholar
  22. 22.
    Geambasu, R., Kohno, T., Levy, A. A., Levy, H. M. (2009). Vanish: increasing data privacy with self-destructing data. Google Scholar
  23. 23.
    Gellman, R. (2009). Privacy in the Clouds: risks to privacy and confidentiality from Cloud Computing (Tech. rep.). Google Scholar
  24. 24.
    Goodrich, M. T., & Mitzenmacher, M. (2011). Invertible bloom lookup tables. CoRR, 1101.2245.
  25. 25.
    Gray, J. (2008). Distributed computing economics. Queue, 6(3), 63–68. doi: 10.1145/1394127.1394131. CrossRefGoogle Scholar
  26. 26.
    Grzonkowski, S., Corcoran, P., & Coughlin, T. (2011). Security analysis of authentication protocols for next-generation mobile and ce cloud services. In IEEE international conference on consumer electronics-Berlin (ICCE-Berlin) (pp. 83–87). doi: 10.1109/ICCE-Berlin.2011.6031855. Google Scholar
  27. 27.
    Hammer-Lahav, E. (2010)). The OAuth 1.0 Protocol. RFC 5849 (Informational).
  28. 28.
    Hardt, D. (2005). Identity 2.0. Keynote Talk at OSCON 2005. Google Scholar
  29. 29.
    Heynen, J. (2011). Home networking devices. Tech. rep., Infonetics Research. Google Scholar
  30. 30.
    Hirsch, F., Philpott, R., & Maler, E. (2005). Security and privacy considerations for the oasis security assertion markup language (saml) v2.0. Tech. rep., OASIS Standard. Google Scholar
  31. 31.
    Kahl, C., Böttcher, K., Tschersich, M., Heim, S., & Rannenberg, K. (2010). How to enhance privacy and identity management for mobile communities: approach and user driven concepts of the picos project. In K. Rannenberg, V. Varadharajan, & C. Weber (Eds.), Security and privacy silver linings in the cloud: Vol. 330. IFIP advances in information and communication technology, pp. 277–288). Boston: Springer. Google Scholar
  32. 32.
    Ko, R. K. L., Jagadpramana, P., & Lee, B. S. (2011). Flogger: a file-centric logger for monitoring file access and transfers within cloud computing environments. International Joint Conference of IEEE TrustCom/IEEE ICESS/FCST (pp. 765–771). doi: 10.1109/TrustCom.2011.100.
  33. 33.
    Lampropoulos, K., Diaz-Sanchez, D., Almenares, F., Weik, P., & Denazis, S. (2010). Introducing a cross federation identity solution for converged network environments. In Principles, systems and applications of IP telecommunications, IPTComm ’10 (pp. 1–11). New York: ACM. doi: 10.1145/1941530.1941532. CrossRefGoogle Scholar
  34. 34.
    Massonet, P., Naqvi, S., Ponsard, C., Latanicki, J., Rochwerger, B., & Villari, M. (2011). A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures. In IEEE international symposium on parallel and distributed processing workshops and Phd forum (IPDPSW), 2011 (pp. 1510–1517). doi: 10.1109/IPDPS.2011.304. CrossRefGoogle Scholar
  35. 35.
    Nauman, M., Ali, T., & Rauf, A. (2013). Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommunication Systems, 52, 1–13. doi: 10.1007/s11235-011-9538-9. CrossRefGoogle Scholar
  36. 36.
    Palfrey, J., & Gasser, U. (2008). Born digital: understanding the first generation of digital natives/John Palfrey and Urs Gasser. New York: Basic Books. Google Scholar
  37. 37.
    Parkhill, D. F. (1966). The challenge of the computer utility by Parkhill, D. F. Reading: Addison-Wesley. Google Scholar
  38. 38.
    Pearson, S. (2009). Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE workshop on software engineering challenges of cloud computing, CLOUD ’09 (pp. 44–52). Washington: IEEE Comput. Soc. doi: 10.1109/CLOUD.2009.5071532. CrossRefGoogle Scholar
  39. 39.
    Presser, A., Farrell, L., Kemp, D., Lupton, W., Tsuruyama, S., & Albright, S. (2008). Upnp device architecture (Tech. Rep. V1.1). UPnP Forum. Google Scholar
  40. 40.
    Shah, M. A., Baker, M., Mogul, J. C., & Swaminathan, R. (2007). Auditing to keep online storage services honest. In Proceedings of the 11th USENIX workshop on hot topics in operating systems (pp. 11:1–11:6). Berkeley: USENIX Association. Google Scholar
  41. 41.
    Simoes, J., & Magedanz, T. (2011). Contextualized user-centric multimedia delivery system for next generation networks. Telecommunication Systems, 48, 301–316. doi: 10.1007/s11235-010-9345-8. CrossRefGoogle Scholar
  42. 42.
    Sánchez, R., Arias, P., Almenares, F., & Díaz-Sánchez, D. (2012). Trust-aware federated idm in consumer cloud computing. In Proc. IEEE int. conference on consumer electronics (pp. 1–2). New York: IEEE Press. Google Scholar
  43. 43.
    Sánchez-Guerrero, R., Almenarez, F., Díaz-Sánchez, D., Marín, A., & Arias, P. (2010). Improving privacy in identity management systems for healthcare scenarios. In Third international symposium on ubiquitous computing and ambient intelligence (Ucami2011) (pp. 1–5). Google Scholar
  44. 44.
    Tang, Y., Lee, P. P. C., Lui, J. C. S., & Perlman, R. (2010). FADE: secure overlay cloud storage with file assured deletion security and privacy in communication networks (Vol. 22, pp. 380–397). Berlin: Springer. doi: 10.1007/978-3-642-16161-2_22. Google Scholar
  45. 45.
    Tian, Y., Song, B., & Huh, E. N. (2011). Towards the development of personal cloud computing for mobile thin-clients. In International conference on information science and applications (ICISA), 2011 (pp. 1–5). doi: 10.1109/ICISA.2011.5772368. CrossRefGoogle Scholar
  46. 46.
    Velte, T., Velte, A., & Elsenpeter, R. (2010). Cloud computing, a practical approach (1st ed.). New York: McGraw-Hill. Google Scholar
  47. 47.
    Voas, J., & Zhang, J. (2009). Cloud computing: new wine or just a new bottle? IT Professional, 11(2), 15–17. doi: 10.1109/MITP.2009.23. CrossRefGoogle Scholar
  48. 48.
    Wang, C., Wang, Q., Ren, K., & Lou, W. (2009). Ensuring data storage security in cloud computing. In 17th international workshop on quality of service, 2009, IWQoS (pp. 1–9). doi: 10.1109/IWQoS.2009.5201385. Google Scholar
  49. 49.
    Wehrle, K., & Steinmetz, R. (2005). Peer-to-peer-based applications. In Peer-to-peer systems and applications (pp. 1–5). CrossRefGoogle Scholar
  50. 50.
    Weiss, A. (2007). Computing in the clouds. Networker, 11, 16–25. CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Daniel Díaz-Sánchez
    • 1
  • Florina Almenarez
    • 1
  • Andrés Marín
    • 1
  • Rosa Sánchez-Guerrero
    • 1
  • Patricia Arias
    • 1
  1. 1.Universidad Carlos III de MadridLeganésSpain

Personalised recommendations