Security and privacy requirements in interactive TV

Springer Science and Business Media LLC - Tập 17 - Trang 393-408 - 2010
Dhiah el Diehn I. Abou-Tair1, Ingo Köster2, Kathrin Höfke2
1School of Informatics and Computing, German Jordanian University, Amman, Jordan
2Faculty of Language, Literature and Media Studies, University of Siegen, Siegen, Germany

Tóm tắt

The paper focuses on security measures in the context of interactive TV (iTV), leaving out the field of social TV and concentrating on all two-way communication between user/viewer and infrastructure or content providers. It aims at introducing architecture for regulating all kinds of interactions and data streams within an iTV environment, including the different parties and their individual interests. By modeling this kind of organizational infrastructure, the authors follow the intention of finding best compromises between the partly opposing interests. While the user is in need of preserving his privacy, the scenario provider as well as the content provider together with the advertisers is dependent on valuable consumer information about content and general product information. In this respect, the proposed outline of the scenario considers all ways and directions of data flows, ranging from user information in the shape of TV content recommendations or tailored product information according to given consumption preferences up to all aspects of data protection. The latter appears highly important according to the different participants in the scenario, all having their own interests and thus forming heterogeneous relationships between the different single and corporate actors. The article emphasizes an alternate perspective on iTV compared to simple digital TV on the one and internet technology on the other hand. It gives a dense description of privacy concerns, economic interests, organizational necessities and approaches to programming solutions, presenting alongside the latest inventions and standards in terms of data protection features, e.g. operating with anonymized snapshots helping not only to hide the user’s identity but also to create profile clusters. One of the main suggestions outlined here is to strengthen the consumer’s role, thus accepting his dominant position in bringing iTV to success. The conclusion to be proposed lies in two key aspects: it is as well necessary to refer to the organizational structure as a model of interest relations as to combine the structure with innovative data protection mechanisms. Because the whole scenario deeply depends on trust and reputation, it is a need to put the user/viewer into control of the origins of data processing. This can only be achieved by a special kind of smartcard with far reaching impacts linked to the snapshot method. Furthermore, the authors give hints on how to enhance the attractiveness of the back channel in order to stimulate the data flow.

Tài liệu tham khảo

Abercrombie, N., Longhurst, B.: Audiences: A Sociological Theory of Performance and Imagination. Sage, London (1998) Ardissono, L., Gena, C., Torasso, P., Bellifemine, F., Difino, A., Negro, B.: User modeling and recommendation techniques for personal electronic program guides. In: Ardissono, L. (ed.) Personalized Digital Television, vol. 6 of Human–Computer Interaction Series, pp. 3–26. Kluwer Academic Publisher, Dordrecht (2004). ISBN 1402021631 Berkovsky, S., Kuflik, T., Ricci, F.: Enhancing privacy while preserving the accuracy of collaborative filtering (2006). http://www.inf.unibz.it/~ricci/papers/ECAI-CF-privacy-v9.pdf. Accessed 05 November 2009 Büschkes, R., Kesdogan, D.: Privacy enhanced intrusion detection. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, vol. 3: Information Security, pp. 187–204. Addison-Wesley, München (1999). ISBN 3827313600 Büttner, K.: Content-based versus collaborative filtering (2005). http://www.is-frankfurt.de/uploads/down417.pdf. Accessed 06 October 2009 Charlton, M.: Massenkommunikation aus der Sicht der Masse: ein handlungstheoretischer Ansatz. In: Hasebrink, U., Krotz, F. (eds.) Die Zuschauer als Fernsehregisseure? Zum Verständnis individueller Nutzungs- und Rezeptionsmuster, 1st edn., pp. 76–93. Nomos, Baden-Baden (1996) Cissée, R., Albayrak, S.: An agent based approach for privacy preserving recommender systems (2007). http://www.dai-labor.de/fileadmin/files/publications/AAMAS_2007_DRAFT.pdf. Accessed 10 October 2009 Haas, A.: Medienmenüs. Der Zusammenhang zwischen Mediennutzung, SINUS-Milieus und Soziodemographie. Fischer, München (2007) Hachmeister, L., Zabel, C.: Das interaktive Fernsehen und seine Zuschauer. In: zu Salm, C. (ed.) Zaubermaschine interaktives Fernsehen? pp. 145–169. Gabler, Wiesbaden (2004). ISBN 3409126376 Hagel, J., Singer, M.: Net Value: Der Weg des digitalen Kunden. Gabler, Wiesbaden (2000). ISBN 9783409115391 Hansell, S.: An icon says they’re watching you. New York Times, March 19th (2009) Hess, J., Becker, T., Hauptmeier, H.: TV 2010—Mission Complete? Buhl Data Service, Neunkirchen (2006) Karsten, R.: Rechtliche Rahmenbedingungen einer international genutzten Internetpräsenz. GRIN Verlag, München (2003) Klahold, A.: Empfehlungssysteme: Recommender Systems: Grundlagen, Konzepte und Lösungen. Studium, 1st edn. Vieweg + Teubner, Wiesbaden (2009). ISBN 9783834805683. http://www.gbv.de/dms/weimar/toc/57161891X_toc.pdf Krason, A., Mayr, M., Schipperges, M.: The modern upper middle classes in Western and Central Eastern Europe: cross-cultural targeting in the case of Bank Austria Creditanstalt. In: ESOMAR (ed.) Proceedings of the 56th ESOMAR Conference ‘Excellence in Consumer Insights’, pp. 13–37. ESOMAR, Madrid (2003) Kruth, W.: Grundlagen der Informationstechnik: Kompaktwissen für Datenschutz- und Security-Management, 3rd edn. Datakontext, Heidelberg (2009). ISBN 9783895775451. http://www.gbv.de/dms/ilmenau/toc/593493753.PDF Lassmann, W.: Wirtschaftsinformatik: Nachschlagewerk für Studium und Praxis. Wiesbaden, Gabler (2006). ISBN 9783834991522. http://dx.doi.org/10.1007/978-3-8349-9152-2 Maybury M., Greiff W., Boykin S., Ponte J., McHenry C., Ferro L.: Personalcasting: tailored broadcast news. In: Ardissono, L. (ed.) Personalized Digital Television, vol. 6 of Human–Computer Interaction Series, pp. 177–202. Kluwer Academic Publisher, Dordrecht (2004). ISBN 1402021631 McLeod, J.M., Sotirovic, M., Holbert, R.L.: Values as sociotronic judgements influencing communication patterns. Commun. Res. 25(5), 453–485 (1998) McQuail, D.: Audience analysis. Sage, London (1997) Metzger, J.: Erfahrungen mit der MedienNutzerTypologie bei der Programmplanung und -positionierung im Fernsehen. In: Oehmichen, E., Ridder, C.-M. (eds.) Die Medien-Nutzer-Typologie, vol. 17 of Schriftenreihe Media Perspektiven, pp. 299–302. Nomos, Baden-Baden (2003). ISBN 3832900292 Min, W.-H., Cheong, Y.-G.: An interactive-content technique based approach to generating personalized advertisement for privacy protection. In: Smith, M.J., Salvendy, G. (eds.): Human Interface and the Management of Information: Designing Information Environments; Symposium on Human Interface 2009. Part II, pp. 185–191. Springer, Berlin (2009). ISBN 978-3-642-02558-7. doi:10.1007/978-3-642-02559-4_21 Moores, S.: Broadcasting and its audiences. In: Mackay, H. (ed.): Consumption and Everyday Life. Culture, Media and Identities, vol. 5, pp. 213-258. Sage, London (1997) Morley, D.: Television, Audiences, and Cultural Studies. Sage, London (1992) Morris, S., Smith-Chaigneau, A.: Interactive TV Standards: (a guide to MHP, OCAP, and JavaTV). Elsevier/Focal Press, Amsterdam (2005). ISBN 0240806662. http://www.loc.gov/catdir/toc/ecip057/2005001355.html, http://www.loc.gov/catdir/enhancements/fy0621/2005001355-d.html Müller, E.: Datenschutz als Verbraucherschutz. In: Bäumler, H., von Mutius, A. (eds.) Datenschutz als Wettbewerbsvorteil, DuD-Fachbeiträge, pp. 20–26. Vieweg, Braunschweig (2002). ISBN 3528057939 National Advertising Initiative. Opt out of behavioral advertising (2009). http://www.networkadvertising.org Oehmichen, E.: Medienübergreifende Nutzungsmuster: Struktur- und Funktionsverschiebungen; eine Analyse auf Basis der ARD/ZDF-Onlinestudien 2008 und 2003. Media Perspektiven 8, 394–409 (2008) Pei, Q., Fan, K., Dai, J., Ma, J.: An intelligent digital content protection framework between home network receiver devices. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) Computational Intelligence and Security, vol. 4456 of Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, pp. 750–758. Springer, Berlin (2007). ISBN 9783540743767 De Pessemier, T., Deryckere, T., Vanhecke, K., Martens, L.: Proposed architecture and algorithm for personalized advertising on IDTV and mobile devices. IEEE Trans. Consum. Electron. 54(2), 709–713 (2008) Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.33.pdf, April 2010. Potonniée, O.: A decentralized privacy-enabling TV personalization framework (2004). http://www.csd.abdn.ac.uk/~jmasthof/EuroITV04/P07.pdf. Accessed 01 November 2009 Ramirez, D.: Converged video network security (2005). http://america.liderdigital.com/documentos/Converged_Video_Network_Security_Lucent.pdf. Accessed 29 September 2009 Ramirez, D.: IPTV Security: Protecting High-Value Digital Contents. Wiley, Chichester (2008). ISBN 9780470519240. http://www.gbv.de/dms/ilmenau/toc/545980429.PDF Schirmer, N.: Qualitative Bewertung von Werbung im Umfeld iTV (interactive Television): Bestandsaufnahme, Analyse und Perspektiven des deutschen Marktes, vol. 3 of BiTS-Forschung. Projektverl. Bochum (2006). ISBN 3897331411 Schmid, N.: iTV-Werbung: Chancen und Herausforderungen. VDM, Saarbrücken (2007). ISBN 9783865507426. http://deposit.d-nb.de/cgi-bin/dokserv?id=2915700&prov=M&dok_var=1&dok_ext=htm Schwenke, M.C.: Individualisierung und Datenschutz: Rechtskonformer Umgang mit personenbezogenen Daten im Kontext der Individualisierung: Univ., 1st edn. DuD-Fachbeiträge. Deutscher Univ.-Verl., Wiesbaden (2006). ISBN 3835003941 Sencar, H.T., Ramkumar, M., Akansu, A.N.: Data Hiding Fundamentals and Applications: Content Security in Digital Media. Elsevier Academic Press, Amsterdam (2004). ISBN 0120471442. http://www.zentralblatt-math.org/zmath/en/search/?an=1074.68517 Sheth, J.N., Raju, P.S.: Sequential and cyclical nature of information processing models in repetitive choice behavior. Adv. Consum. Res. 1(1), 348–358 (1974). http://www.acrwebsite.org/volumes/display.asp?id=5664. Accessed 01 October 2009 Smyth, B., Cotter, P.: A personalized television listings service. Commun. ACM 43(8):107–111 (2000). ISSN 0001-0782. doi:10.1145/345124.345161 Stevenson, N.: Understanding Media Cultures: Social Theory and Mass Communication. Sage, London (1995) Stipp, H.: Wird der Computer die traditionellen Medien ersetzen? Media Perspektiven 2, 78–82 (1998) Turow, J., King, J., Hoofnagle, C.J., Bleakley, A., Hennessy, M.: Americans Reject Tailored Advertising and Three Activities that Enable it. SSRN eLibrary (2009) van Setten, M., Tokmakoff, A., van Vliet, H.: Designing personalized information systems—a personal media center (2001). http://www.di.unito.it/~liliana/UM01/vanSetten.pdf. Accessed 10 October 2009 Ware, H.S.: Holly Sanders Ware. NEW YORK POST, p. 37, July 10 2009 Witt, B.C.: IT-Sicherheit kompakt und verständlich: eine praxisorientierte Einführung, 1st edn. Vieweg, Wiesbaden (2006). ISBN 9783834801401. http://www.gbv.de/dms/goettingen/505540649.pdf Wolf, G., Pfitzmann, A.: Empowering users to set their protection goals. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, vol. 3: Information Security, pp. 113–135. Addison-Wesley, München (1999). ISBN 3827313600 Zhou, Y., Cheng, H., Jeffrey, X.Y.: Graph clustering based on structural/attribute similarities. PVLDB 2(1), 718–729 (2009) Zhu, M., Zhang, M., Chen, X., Zhang, D., Huang, Z.: A hierarchial key distribution scheme for conditional access system in DTV broadcasting. In: Wang, Y., Cheung, Y.M., Liu, H. (eds.) Computational Intelligence and Security, vol. 4456 of Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, pp. 839–846. Springer, Berlin (2007). ISBN 9783540743767