15 research outputs found

    A Digital Rights Management System based on Cloud

    Get PDF
    In the current Internet, digital entertainment contents, such as video or audio files, are easily accessible due to the new multimedia technologies and to broadband network connections. This causes considerable economic loss to global media players since digital contents, once legitimately obtained, can be illegitimately shared through file sharing services on the Internet. Digital Rights Management (DRM) systems have been proposed to support the protection of copyrighted digital contents. Even though such systems have been widely adopted and promoted by global media players, they are based on proprietary mechanisms that usually work only in closed, monolithic environments. In this regard, systems based on watermarking technologies appear more suited to protect digital copyrighted content. This paper describes the implementation scheme of a DRM system able to ensure the copyright protection of digital content according to an innovative buyer-friendly watermarking protocol. The DRM system has been implemented by exploiting a cloud environment in order to improve the overall performance of the system. In particular, cloud behaves as a service infrastructural provider, since the content provider involved in the watermarking protocol uses cloud to speed up the watermark embedding process and to save storage and bandwidth costs needed to store and to deliver protected contents

    Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks

    Get PDF
    Wireless Sensor, Actuator and Robot Networks (WSARNs) are made of mobile and static sensor nodes that interact in order to collaboratively perform specific tasks, such as supporting assisted navigation for mobile robotic nodes that carry out requested operations in hostile environments, where the human presence is impracticable. In this regard, it is worth noting that assisted navigation algorithms have a highly dynamic nature, and are implemented by sensor nodes that are characterized by limited transmission power and lean autonomy in terms of computing and memory capacity. This paper presents an improved version of the assisted navigation algorithm based on the concept of “credit field”. The main aim of the proposed algorithm is to reduce and balance the energy consumption among the static sensor nodes when running the algorithm to manage the presence of obstacles and adversary areas, thus extending the lifetime of WSARNs. The algorithm has been tested on a hybrid sensor network that employs Mica2 Motes as static sensor nodes and Lego Mindstorms robots integrated with a Stargate board developed by Crossbow as mobile nodes

    Digital Copyright Protection: Focus on Some Relevant Solutions

    Get PDF
    Copyright protection of digital content is considered a relevant problem of the current Internet since content digitalization and high performance interconnection networks have greatly increased the possibilities to reproduce and distribute digital content. Digital Rights Management (DRM) systems try to prevent the inappropriate or illegal use of copyrighted digital content. They are promoted by the major global media players, but they are also perceived as proprietary solutions that give rise to classic problems of privacy and fair use. On the other hand, watermarking protocols have become a possible solution to the problem of copyright protection. They have evolved during the last decade, and interesting proposals have been designed. This paper first presents current trends concerning the most significant solutions to the problem of copyright protection based on DRM systems and then focuses on the most promising approaches in the field of watermarking protocols. In this regard, the examined protocols are discussed in order to individuate which of them can better represent the right trade-off between opposite goals, such as, for example, security and easy of use, so as to prove that it is possible to implement open solutions compatible with the current web context without resorting to proprietary architectures or impairing the protection of copyrighted digital content

    A Deterministic Algorithm for the Deployment of Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are made up by communicating sensor nodes that gather and elaborate information from real world in a distributed and coordinated way in order to deliver an intelligent support to human activities. They are used in many fields such as national security, surveillance, health care, biological detection, and environmental monitoring. However, sensor nodes are characterized by limited wireless communication and computing capabilities as well as reduced on-board battery power. Therefore, they have to be carefully deployed in order to cover the areas to be monitored without impairing network lifetime. This paper presents a new deterministic algorithm to solve the coverage problem of well-known areas by means of wireless sensor networks. The proposed algorithm depends on a small set of parameters and can control sensor deployment within areas even in the presence of obstacles. Moreover, the algorithm makes it possible to control the redundancy degree that can be obtained in covering a region of interest so as to achieve a network deployment characterized by a minimum number of wireless sensor nodes

    RUNNING LARGE-SCALE APPLICATIONS ON CLUSTER GRIDS

    No full text
    Grid computing enables the enormous, but often poorly utilized, computing resources existing on the Internet to be harnessed in order to solve large-scale problems. However, if they want to solve the problems of configuration and performance optimization of their large-scale applications, programmers wishing to exploit such computing resources have to deal with highly variable communication delays, security threats, machine and network failures, and the distributed ownership of the computing resources. On the other hand, Parallel Virtual Machine (PVM) is still widely used to develop high performance parallel applications on high performance/cost ratio computing platforms, such as workstation clusters. However, workstations belonging to networked clusters canno

    Programmazione parallela e distribuita orientata agli oggetti: un approccio ed un ambiente di programmazione

    No full text
    Dottorato di ricerca in ingegneria dell'informazione, elettromagnetismo applicato e telecomunicazioni. 12. ciclo. Coordinatore I. M. Pinto'. Tutore M. Di SantoConsiglio Nazionale delle Ricerche - Biblioteca Centrale - P.le Aldo Moro, 7, Rome; Biblioteca Nazionale Centrale - P.za Cavalleggeri, 1, Florence / CNR - Consiglio Nazionale delle RichercheSIGLEITItal

    A Watermarking Protocol Based on Blockchain

    No full text
    Digital watermarking can be used to implement mechanisms aimed at protecting the copyright of digital content distributed on the Internet. Such mechanisms support copyright identification and content tracking by enabling content providers to embed perceptually invisible watermarks into the distributed copies of content. They are employed in conjunction with watermarking protocols, which define the schemes of the web transactions by which buyers can securely purchase protected digital content distributed by content providers. In this regard, the “buyer friendly” and “mediated” watermarking protocols can ensure both a correct content protection and an easy participation of buyers in the transactions by which to purchase the distributed content. They represent a valid alternative to the classic “buyer and seller” watermarking protocols documented in the literature. However, their protection schemes could be further improved and simplified. This paper presents a new watermarking protocol able to combine the “buyer friendly” and “mediated” design approach with the blockchain technology. The result is a secure protocol that can support a limited and balanced participation of both buyers and content providers in the purchase transactions of protected digital content. Moreover, the protocol can avoid the direct involvement of trusted third parties in the purchase transactions. This can reduce the actual risk that buyers or sellers can violate the protocol by illicitly interacting with trusted third parties. In fact, such peculiarities make the proposed protocol suited for the current web context

    Blockchain and Cloud to Overcome the Problems of Buyer and Seller Watermarking Protocols

    No full text
    Copyright protection of digital content has become a problem not only for web content providers but also for ordinary web users who like to publish their digital contents on social or user generated content platforms. Among the possible solutions to such a problem, digital watermarking, in conjunction with watermarking protocols, appears to be a valid alternative to current DRM (digital rights management) systems. In fact, watermarking based solutions insert perceptually invisible copyright information into the copies of contents published or distributed on the web in order to track them. Such insertions are carried out according to the watermarking protocols, which have evolved over the years from the classic “buyer and seller” paradigm into a simpler and versatile “buyer friendly” and “mediated” approach. However, such an approach cannot exploit the new technologies that characterize the current Internet. This paper presents a new watermarking protocol able to adapt the “buyer friendly” and “mediated” approach to the use of innovative technologies such as cloud platforms and blockchain. In this way, (1) content providers and common web users can take advantage of the computing and storage resources made available by cloud platforms; (2) the involvement of trusted third parties in the protocols can be reduced by using blockchain without complicating the protection scheme. In fact, these two goals make the protocol particularly suited for the current Internet
    corecore