跳到主要內容

臺灣博碩士論文加值系統

(3.235.185.78) 您好!臺灣時間:2021/07/27 17:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:范承剛
研究生(外文):Chen-Gang Fan
論文名稱:具客戶端認證及數位著作權管理之隨選視訊系統
論文名稱(外文):A VOD System Based on User Authentication and Digital Rights Management
指導教授:曾黎明曾黎明引用關係
指導教授(外文):Li-Ming Tseng
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:65
中文關鍵詞:加密及解密Kerberos系統熱門廣播法數位著作權管理數位內容保護
外文關鍵詞:digital content protectionHot-video broadcastingencryption and decryptionDigital Rights Management
相關次數:
  • 被引用被引用:2
  • 點閱點閱:103
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著網路頻寬的成長,對於影音多媒體串流的需求也隨之增加,隨選視訊系統 (VOD) 的發展也被認為是下一波網際網路應用的主流。由於數位多媒體檔案在電腦上具有複製容易、散佈快速的特性,所以目前的社會上販賣非法複製、拷貝多媒體檔案的情況日益猖獗,加上現今網路的普及,使用者可以利用點對點傳輸網路 (P2P) 或FTP之類的方法來散佈多媒體檔案,使得擁有版權和著作權的廠商對於多媒體檔案的管理愈來愈困難。相同的情形在傳統的隨選視訊系統上也會出現的,雖然隨選視訊系統已經行之有年且各式應用於其上的演算法,例如:快取伺服器 (Cache Server) 的快取替換 (Cache Replacement) 演算法,影片廣播 (Video Broadcasting) 的演算法,也都發展至一成熟且完整的架構,但在實際的應用上尚有一段距離,因為應用在實際就會產生商業上或其它層面的考量,對於影片的管理在傳統的隨選視訊系統上並無一確實而有效的方法,如此一來影片的擁有者便要面臨到檔案被任意複製和非法傳播的風險。
本文提出了一結合Kerberos使用者認證機制及數位著作權管理(Digital Rights Management) 的隨選視訊系統。系統使用認證伺服器 (Authentication Server) 來管理所有使用者的資訊,利用Kerberos中門票的觀念來對合法的使用者核發門票,使得使用者可以持此門票來向各個伺服器來要求服務及其欲觀看的影片。在影片的管理上我們使用對稱式加密的方法將影片加密,然後利用DRM中License的技術,使得播放器可以藉由License中獲得解密的金鑰以及其中的規定來限制存取的權限及方法。最後,我們利用熱門廣播法來實作出整套系統,並且實際在網路上播放以測試其效能。
As the growth of bandwidth of Internet, the demand of media streaming is increasing as well. The development of video on demand system is considered as next main application on the internet. Due to the characteristics of copying easily and distributing rapidly, there are many illegal copies sold nowadays. Users can get Internet everywhere, they can distribute media files by P2P network or FTP and so on. The rights holders are losing their ability to manage media files. The traditional VOD system has the same case. Although VOD has applied for simulation for many years, the variant algorithms of video on demand (for example: cache replacement algorithms of cache server, algorithms of video broadcasting) have developed to a mature and complete architecture, but most of them are focused on the simulation. Because we have some others considerations in applying on commerce or other aspects, it still has a distance to the practice of application. Content owner may take the risk of copying and distributing illegally. Thus we need to solve the problems below:
The first problem is the management of users: the system allows only the legitimate users to log in to watch the movies that they want. The offered information when the users login must prevent from malicious eavesdrop or interception. The second one is the management and the protection of the video copyrights. When users receive the video, we have to manage and protect the copyrights. The video owners have to take the risk of copying video arbitrarily and distributing illegally by users without any protection. There must be an approach to protect the copyrights of video.
We proposed a VOD system with Kerberos user authentication mechanism and digital rights management. By using authentication server, we can manage all information of users. With the concepts of tickets in Kerberos, we grant tickets to the legitimate users. Users who get the tickets can request the services and the videos that they want to watch. We encrypt the videos using symmetric encryption algorithm to manage videos. Then we use the license technique in digital rights management such that the video player can get the key to decrypt the video from license and the rules to limit access rights. Finally we implement the system with hot-video broadcasting and test it on real network.
摘要 ii
Abstract iv
誌謝 vi
目錄 viii
圖目錄 x
第一章 緒論 1
第二章 相關研究 3
2.1 熱門廣播法 3
2.2 影片快取 4
2.3 傳統式加密與公開鑰匙加密 8
2.4 使用者認證與安全訊息傳遞 10
2.5 數位著作權管理 14
第三章 系統設計 21
3.1 系統模型 21
3.2 Authentication Server 22
3.3 Cache Server 27
3.4 Program Server 29
3.5 License Server 30
3.6 Video Server 33
3.7 Client 33
第四章 系統實作 36
4.1 功能模組 36
4.2 實作方法 37
4.3 播放流程 38
第五章 結論 45
參考文獻 48
[1]D. Clark, “Oracle predicts interactive gear by early 1994,” The Wall Street Journal, November 10, 1993
[2]Asit Dan, Dinkar Sitaram and Perwez Shahabuddin, "Scheduling Policies for an On-Demand Video Server with Batching," in Proceedings of ACM Multimedia Conference, pp.15-23, 1994
[3]Asit Dan, Dinkar Sitaram and Perwez Shahabuddin, "Dynamic Batching Policies for an on-demand video server,” Multimedia Systems, vol. 4, no. 3, pp. 112-121, June 1996
[4]L.-S. Juhn, and L.-M. Tseng, “Fast broadcasting for hot video access,” in Proceedings of the 4th International Workshop on Real-time Computing Systems and Applications, pp. 237-243, Oct 1997
[5]L.-S. Juhn and L.-M. Tseng, “Fast data broadcasting and receiving scheme for popular video services,” IEEE Transactions on Broadcasting, vol. 44, no. 1, pp. 100-105, March 1998
[6]Yu-Chee Tseng, Ming-Hour Yang, and Chi-He Chang, “A recursive frequency-splitting scheme for broadcasting hot videos in VOD service,” IEEE Transactions on Communications, vol. 50, no. 8, pp. 1348-1355, August 2002
[7]L.-S. Juhn and L.-M. Tseng, “Harmonic broadcasting for video-on-demand service,” IEEE Transactions on Broadcasting, vol. 43, no. 3, pp. 268-271, September 1997
[8]Seong Ho Park, Eun Ji Lim, and Ki Dong Chung, “Popularity-based Partial Caching for VOD Systems using a Proxy Server” in Proceedings of the IEEE Parallel and Distributed Processing Symposium, pp. 1164 -1168, Apr 2001
[9]Sehgal, A and Chou, P.A "Cost-distortion optimized caching of streaming media" in Proceedings of IEEE International Conference, on Acoustics, Speech, and Signal Processing, Vol. 2, pp. 1973 -1976, May 2002
[10]Yong Woon Park and Ki Dong Chung, "caching policy for continuous media objects based on logical caches and object partitioning," in Proceedings of IEEE International Conference on Parallel Processing 2001, pp. 259 -266, 2001
[11]K.-L. Wu, P. S. Yu, and J. L. Wolf, “Segment-Based Proxy Caching of Multimedia Streams,” in Proceedings of WWW10, pp. 36-44, Hong Kong, May 2001
[12]Y. Guo, S. Sen and D. Towsley, "Prefix Caching assisted Periodic Broadcast for Streaming Popular Videos," Technical Report TR 01-22, UMass CMPSCI, 2001
[13]Eun-Ji Lim, Seong-Ho Park, Hyeon-Ok Hong, and Ki-Dong Chung, “A Proxy Caching Scheme for Continuous Streams on the Internet,” in Proceedings of the 15th International Conference on Information Networking, pp. 720-725, 2001
[14]S.-H. Gary Chan, and Fouad A. Tobagi, “Caching Schemes for Distributed Video Services,” in Proceedings of the 1999 IEEE International Conference on Communications, June 1999
[15]Rivest R., Shamir A., Adleman L, “A Method for Obtaining Digital Signatures and Public Key cryptosystems,” Communications of the ACM, February 1978
[16]J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, L. Stewart, “HTTP Authentication: Basic and Digest Access Authentication,” IETF RFC 2617, June 1999
[17]Rivest R., “The MD5 Message-digest Algorithm,” IETF IEEE RFC1392, April 1992
[18]B. Lloyd, W. Simpson, “PPP Password Authentication Protocols,” IETF RFC1334, October 1992
[19]W. Simpson, “PPP Challenge Handshake Authentication Protocols,” IETF RFC1994, August 1996
[20]L. Blunk, J. Vollbrecht, “PPP Extensible Authentication Protocols (EAP),” IETF RFC2284, March 1998
[21]Needham R., Schroeder M., “Using Encryption Authentication in Large Networks of Computers,” Communications of the ACM, December 1978
[22]Denning D., “Timestamps in Key Distribution Protocols,” Communication of the ACM, August 1981
[23]Denning D, “Cryptography and Data Security,” Reading, MA: Addison-Wesley, 1982
[24]Woo T., Lam S., “Authentication for Distributed Systems,” Computer, January 1992
[25]Woo T., Lam S., “Authentication’ Revisited,” Computer, April 1992
[26]http://wp.netscape.com/eng/ssl3
[27]T Dierks, C. Allen, “The TLS Protocol Version 1.0,” IETF RFC 2246, January 1999
[28]Miller S., Neuman B., Schiller J., Saltzer J. “Kerberos Authentication and Authorization System,” Section E.2.1 Project Athena Technical Plan, M.I.T. Project Athena, Cambridge, MA, 27, October 1988
[29]Steiner J., Neuman B., Schiller J., “Kerberos: An Authentication Service for Open Networked Systems,” Proceedings of the Winter 1988 USENIX Conference, February 1988
[30]Kohl J, Neuman B., Tso T., “The Evolution of the Kerberos Authentication Service,” In Brazier F, Johansen D Distributed Open Systems, Los Alamitos, CA: IEEE Computer Society Press 1994, Available at http://web.mit.edu/kerberos/www/papers.html
[31]http://www.odrl.net
[32]http://www.w3c.org
[33]http://www.openebook.org
[34]http://www.sdmi.org
[35]http://www.idrm.org
[36]http://www.microsoft.com/windows/windowsmedia/drm/default.aspx
[37]http://www.microsoft.com/windows/windowsmedia/drm/9series/providers.aspx
[38]http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wmrm/htm/quickstart.aspx
[39]http://www-306.ibm.com/software/data/emms/
[40]http://www.intertrust.com/main/technology/index.html
[41]http://www.realnetworks.com/products/commerce
[42]http://www.adobe.com
[43]Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, “Digital Rights Management for Content Distribution,” Proceedings of the Australasian Information Security Workshop 2003 (AISW2003), Adelaid, Australia. Conferences in Research and Practice in Information Technology, Vol. 21
[44]DRM Whitepaper, Sonera Plaza Media, Feb 2002, Available from:http://www.medialab.sonera.fi/workspace/DRMwhitePaper.pdf
[45]http://www.ndap.org.tw
[46]黃世昆, 林宗伯, 洪偉能, “數位內容保護與追蹤機制,” 第一屆數位典藏技術研討會, Taipei, July 2002
[47]林宗伯, 洪偉能, 黃世昆, “以安全執行環境限制之內容保護機制,” 第二屆數位典藏技術研討會, Taipei, July 2003
[48]3GPP TS 22.242 V6.0.0, Jun 2002, Available from:http://www.3gpp.org/ftp/Specs/archive/22_series/22.242
[49]OMA Digital Rights Management, Version 1.0 Sep 2002, Available from:http://www.openmobilealliance.org/docs/OMA-Download-DRM-v1_0-20020905-a.pdf
[50]Open Digital Rights Language, Version 1.1, Aug 2002, Available from:http://odrl.net/1.1/ODRL-11.pdf
[51]謝民一, “複製可追查型CDN-P2P遞送網路下之近端伺服器選擇,” 碩士論文, 國立中央大學資訊工程研究所, July 2004
[52]吳俊德, “具額外快取之影片快取替換,” 碩士論文, 國立中央大學資訊工程研究所, July 2004
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top