2022
DOI: 10.1002/int.22810
|View full text |Cite
|
Sign up to set email alerts
|

Toward fine‐grained access control and privacy protection for video sharing in media convergence environment

Abstract: Video streaming applications are rapidly proliferating, allowing users to browse, download, and share videos through platforms such as YouTube, Netflix, and Amazon. Media content providers are required to register copyrights on digital platforms. With the existence of blockchain technology, users can manage their data using a smart contract, which allows them to define access and search policies and use an instant payment system without a third party in a decentralized network. We propose a secure and reliable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 38 publications
0
7
0
Order By: Relevance
“…To investigate the effect of the privacy budget ε on usability [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15], and the effect of different privacy budgets on MAE, put the number of data attributes d = 20/10 and the number of users n = 10000/100, and the experimental results are shown in Figure 7.…”
Section: Analysis Of Privacy Protection Algorithm Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…To investigate the effect of the privacy budget ε on usability [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15], and the effect of different privacy budgets on MAE, put the number of data attributes d = 20/10 and the number of users n = 10000/100, and the experimental results are shown in Figure 7.…”
Section: Analysis Of Privacy Protection Algorithm Resultsmentioning
confidence: 99%
“…Ahmed et al constructed a password-based user authentication and data transmission scheme using a bilinear pairing algorithm. They combined user smart cards with passwords to avoid the insecurity of overly simple passwords that can be cracked [ 11 ]. Ciafrè et al improved their scheme by proposing a two-factor authentication scheme for the Internet of things to achieve message reliability and be able to resist various types of security attacks [ 12 ].…”
Section: Related Workmentioning
confidence: 99%
“…Ahmed, F. et al analyzed the current state of development of video streaming applications in the present time and that different platforms collect users' private data during the video sharing process performed by the users. The resulting secure video-sharing scheme utilizing blockchain protects the streaming media and user-specific information with passwords to prevent the leakage of user's private data during video viewing [27].…”
Section: ) Privacy Protectionmentioning
confidence: 99%
“…Therefore, the specific conditions of the slope should be considered in addition to the local climate when selecting the slope protection technology; There are many high and steep slopes. Deep excavation and high filling of expressways in mountainous areas produce many high and steep slopes, which are steep and difficult to afforest, and are prone to water and soil loss [6,7].…”
Section: Analysis Of Slope Characteristics Of Mountainous Expresswaymentioning
confidence: 99%