博碩士論文 91522036 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:84 、訪客IP:3.145.47.193
姓名 范承剛(Chen-Gang Fan)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 具客戶端認證及數位著作權管理之隨選視訊系統
(A VOD System Based on User Authentication and Digital Rights Management)
相關論文
★ 整合多樣配置組態下的藍芽射頻驗證系統★ 具檔案敘述相關語查詢之智慧型檔案搜尋系統
★ 具遲到者支援功能之網際網路簡報系統★ 以快速廣播法建構熱門視訊隨選服務伺服器
★ 具事件同步再現特性之遠程電傳展示伺服器★ 無線網路環境下之廣播資訊快速下載
★ 中文網站繁簡互訪協助系統★ 支援時光平移播放之調適性現場直播演算法
★ 用於互動式廣播之段落對齊法★ 熱門影片廣播法之影片區段復原機制
★ 配合熱門影片廣播的本地伺服器高效快取法★ 一個增進SIP在防火牆環境中應用的協同模組
★ 考量網頁熱門度之一致性雜湊法解決 網頁代理伺服器之負載平衡★ 以網域名稱伺服器為基礎之色情網站過濾系統
★ 使用熱門廣播法及支援點對點傳輸之影音內容傳遞網路★ 變動頻寬平滑化之熱門廣播演算法
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著網路頻寬的成長,對於影音多媒體串流的需求也隨之增加,隨選視訊系統 (VOD) 的發展也被認為是下一波網際網路應用的主流。由於數位多媒體檔案在電腦上具有複製容易、散佈快速的特性,所以目前的社會上販賣非法複製、拷貝多媒體檔案的情況日益猖獗,加上現今網路的普及,使用者可以利用點對點傳輸網路 (P2P) 或FTP之類的方法來散佈多媒體檔案,使得擁有版權和著作權的廠商對於多媒體檔案的管理愈來愈困難。相同的情形在傳統的隨選視訊系統上也會出現的,雖然隨選視訊系統已經行之有年且各式應用於其上的演算法,例如:快取伺服器 (Cache Server) 的快取替換 (Cache Replacement) 演算法,影片廣播 (Video Broadcasting) 的演算法,也都發展至一成熟且完整的架構,但在實際的應用上尚有一段距離,因為應用在實際就會產生商業上或其它層面的考量,對於影片的管理在傳統的隨選視訊系統上並無一確實而有效的方法,如此一來影片的擁有者便要面臨到檔案被任意複製和非法傳播的風險。
本文提出了一結合Kerberos使用者認證機制及數位著作權管理(Digital Rights Management) 的隨選視訊系統。系統使用認證伺服器 (Authentication Server) 來管理所有使用者的資訊,利用Kerberos中門票的觀念來對合法的使用者核發門票,使得使用者可以持此門票來向各個伺服器來要求服務及其欲觀看的影片。在影片的管理上我們使用對稱式加密的方法將影片加密,然後利用DRM中License的技術,使得播放器可以藉由License中獲得解密的金鑰以及其中的規定來限制存取的權限及方法。最後,我們利用熱門廣播法來實作出整套系統,並且實際在網路上播放以測試其效能。
摘要(英) As the growth of bandwidth of Internet, the demand of media streaming is increasing as well. The development of video on demand system is considered as next main application on the internet. Due to the characteristics of copying easily and distributing rapidly, there are many illegal copies sold nowadays. Users can get Internet everywhere, they can distribute media files by P2P network or FTP and so on. The rights holders are losing their ability to manage media files. The traditional VOD system has the same case. Although VOD has applied for simulation for many years, the variant algorithms of video on demand (for example: cache replacement algorithms of cache server, algorithms of video broadcasting) have developed to a mature and complete architecture, but most of them are focused on the simulation. Because we have some others considerations in applying on commerce or other aspects, it still has a distance to the practice of application. Content owner may take the risk of copying and distributing illegally. Thus we need to solve the problems below:
The first problem is the management of users: the system allows only the legitimate users to log in to watch the movies that they want. The offered information when the users login must prevent from malicious eavesdrop or interception. The second one is the management and the protection of the video copyrights. When users receive the video, we have to manage and protect the copyrights. The video owners have to take the risk of copying video arbitrarily and distributing illegally by users without any protection. There must be an approach to protect the copyrights of video.
We proposed a VOD system with Kerberos user authentication mechanism and digital rights management. By using authentication server, we can manage all information of users. With the concepts of tickets in Kerberos, we grant tickets to the legitimate users. Users who get the tickets can request the services and the videos that they want to watch. We encrypt the videos using symmetric encryption algorithm to manage videos. Then we use the license technique in digital rights management such that the video player can get the key to decrypt the video from license and the rules to limit access rights. Finally we implement the system with hot-video broadcasting and test it on real network.
關鍵字(中) ★ 數位著作權管理
★ 熱門廣播法
★ Kerberos系統
★ 加密及解密
★ 數位內容保護
關鍵字(英) ★ encryption and decryption
★ Hot-video broadcasting
★ digital content protection
★ Digital Rights Management
論文目次 摘要 ii
Abstract iv
誌謝 vi
目錄 viii
圖目錄 x
第一章 緒論 1
第二章 相關研究 3
2.1 熱門廣播法 3
2.2 影片快取 4
2.3 傳統式加密與公開鑰匙加密 8
2.4 使用者認證與安全訊息傳遞 10
2.5 數位著作權管理 14
第三章 系統設計 21
3.1 系統模型 21
3.2 Authentication Server 22
3.3 Cache Server 27
3.4 Program Server 29
3.5 License Server 30
3.6 Video Server 33
3.7 Client 33
第四章 系統實作 36
4.1 功能模組 36
4.2 實作方法 37
4.3 播放流程 38
第五章 結論 45
參考文獻 48
參考文獻 [1] D. Clark, “Oracle predicts interactive gear by early 1994,” The Wall Street Journal, November 10, 1993
[2] Asit Dan, Dinkar Sitaram and Perwez Shahabuddin, "Scheduling Policies for an On-Demand Video Server with Batching," in Proceedings of ACM Multimedia Conference, pp.15-23, 1994
[3] Asit Dan, Dinkar Sitaram and Perwez Shahabuddin, "Dynamic Batching Policies for an on-demand video server,” Multimedia Systems, vol. 4, no. 3, pp. 112-121, June 1996
[4] L.-S. Juhn, and L.-M. Tseng, “Fast broadcasting for hot video access,” in Proceedings of the 4th International Workshop on Real-time Computing Systems and Applications, pp. 237-243, Oct 1997
[5] L.-S. Juhn and L.-M. Tseng, “Fast data broadcasting and receiving scheme for popular video services,” IEEE Transactions on Broadcasting, vol. 44, no. 1, pp. 100-105, March 1998
[6] Yu-Chee Tseng, Ming-Hour Yang, and Chi-He Chang, “A recursive frequency-splitting scheme for broadcasting hot videos in VOD service,” IEEE Transactions on Communications, vol. 50, no. 8, pp. 1348-1355, August 2002
[7] L.-S. Juhn and L.-M. Tseng, “Harmonic broadcasting for video-on-demand service,” IEEE Transactions on Broadcasting, vol. 43, no. 3, pp. 268-271, September 1997
[8] Seong Ho Park, Eun Ji Lim, and Ki Dong Chung, “Popularity-based Partial Caching for VOD Systems using a Proxy Server” in Proceedings of the IEEE Parallel and Distributed Processing Symposium, pp. 1164 -1168, Apr 2001
[9] Sehgal, A and Chou, P.A "Cost-distortion optimized caching of streaming media" in Proceedings of IEEE International Conference, on Acoustics, Speech, and Signal Processing, Vol. 2, pp. 1973 -1976, May 2002
[10] Yong Woon Park and Ki Dong Chung, "caching policy for continuous media objects based on logical caches and object partitioning," in Proceedings of IEEE International Conference on Parallel Processing 2001, pp. 259 -266, 2001
[11] K.-L. Wu, P. S. Yu, and J. L. Wolf, “Segment-Based Proxy Caching of Multimedia Streams,” in Proceedings of WWW10, pp. 36-44, Hong Kong, May 2001
[12] Y. Guo, S. Sen and D. Towsley, "Prefix Caching assisted Periodic Broadcast for Streaming Popular Videos," Technical Report TR 01-22, UMass CMPSCI, 2001
[13] Eun-Ji Lim, Seong-Ho Park, Hyeon-Ok Hong, and Ki-Dong Chung, “A Proxy Caching Scheme for Continuous Streams on the Internet,” in Proceedings of the 15th International Conference on Information Networking, pp. 720-725, 2001
[14] S.-H. Gary Chan, and Fouad A. Tobagi, “Caching Schemes for Distributed Video Services,” in Proceedings of the 1999 IEEE International Conference on Communications, June 1999
[15] Rivest R., Shamir A., Adleman L, “A Method for Obtaining Digital Signatures and Public Key cryptosystems,” Communications of the ACM, February 1978
[16] J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, L. Stewart, “HTTP Authentication: Basic and Digest Access Authentication,” IETF RFC 2617, June 1999
[17] Rivest R., “The MD5 Message-digest Algorithm,” IETF IEEE RFC1392, April 1992
[18] B. Lloyd, W. Simpson, “PPP Password Authentication Protocols,” IETF RFC1334, October 1992
[19] W. Simpson, “PPP Challenge Handshake Authentication Protocols,” IETF RFC1994, August 1996
[20] L. Blunk, J. Vollbrecht, “PPP Extensible Authentication Protocols (EAP),” IETF RFC2284, March 1998
[21] Needham R., Schroeder M., “Using Encryption Authentication in Large Networks of Computers,” Communications of the ACM, December 1978
[22] Denning D., “Timestamps in Key Distribution Protocols,” Communication of the ACM, August 1981
[23] Denning D, “Cryptography and Data Security,” Reading, MA: Addison-Wesley, 1982
[24] Woo T., Lam S., “Authentication for Distributed Systems,” Computer, January 1992
[25] Woo T., Lam S., “Authentication’ Revisited,” Computer, April 1992
[26] http://wp.netscape.com/eng/ssl3
[27] T Dierks, C. Allen, “The TLS Protocol Version 1.0,” IETF RFC 2246, January 1999
[28] Miller S., Neuman B., Schiller J., Saltzer J. “Kerberos Authentication and Authorization System,” Section E.2.1 Project Athena Technical Plan, M.I.T. Project Athena, Cambridge, MA, 27, October 1988
[29] Steiner J., Neuman B., Schiller J., “Kerberos: An Authentication Service for Open Networked Systems,” Proceedings of the Winter 1988 USENIX Conference, February 1988
[30] Kohl J, Neuman B., Tso T., “The Evolution of the Kerberos Authentication Service,” In Brazier F, Johansen D Distributed Open Systems, Los Alamitos, CA: IEEE Computer Society Press 1994, Available at http://web.mit.edu/kerberos/www/papers.html
[31] http://www.odrl.net
[32] http://www.w3c.org
[33] http://www.openebook.org
[34] http://www.sdmi.org
[35] http://www.idrm.org
[36] http://www.microsoft.com/windows/windowsmedia/drm/default.aspx
[37] http://www.microsoft.com/windows/windowsmedia/drm/9series/providers.aspx
[38] http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wmrm/htm/quickstart.aspx
[39] http://www-306.ibm.com/software/data/emms/
[40] http://www.intertrust.com/main/technology/index.html
[41] http://www.realnetworks.com/products/commerce
[42] http://www.adobe.com
[43] Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, “Digital Rights Management for Content Distribution,” Proceedings of the Australasian Information Security Workshop 2003 (AISW2003), Adelaid, Australia. Conferences in Research and Practice in Information Technology, Vol. 21
[44] DRM Whitepaper, Sonera Plaza Media, Feb 2002, Available from:http://www.medialab.sonera.fi/workspace/DRMwhitePaper.pdf
[45] http://www.ndap.org.tw
[46] 黃世昆, 林宗伯, 洪偉能, “數位內容保護與追蹤機制,” 第一屆數位典藏技術研討會, Taipei, July 2002
[47] 林宗伯, 洪偉能, 黃世昆, “以安全執行環境限制之內容保護機制,” 第二屆數位典藏技術研討會, Taipei, July 2003
[48] 3GPP TS 22.242 V6.0.0, Jun 2002, Available from:http://www.3gpp.org/ftp/Specs/archive/22_series/22.242
[49] OMA Digital Rights Management, Version 1.0 Sep 2002, Available from:http://www.openmobilealliance.org/docs/OMA-Download-DRM-v1_0-20020905-a.pdf
[50] Open Digital Rights Language, Version 1.1, Aug 2002, Available from:http://odrl.net/1.1/ODRL-11.pdf
[51] 謝民一, “複製可追查型CDN-P2P遞送網路下之近端伺服器選擇,” 碩士論文, 國立中央大學資訊工程研究所, July 2004
[52] 吳俊德, “具額外快取之影片快取替換,” 碩士論文, 國立中央大學資訊工程研究所, July 2004
指導教授 曾黎明(Li-Ming Tseng) 審核日期 2004-7-16
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明