Security and privacy requirements in interactive TV

被引:2
|
作者
Abou-Tair, Dhiah el Diehn I. [1 ]
Koester, Ingo [2 ]
Hoefke, Kathrin [2 ]
机构
[1] German Jordanian Univ, Sch Informat & Comp, Amman 11180, Jordan
[2] Univ Siegen, Fac Language Literature & Media Studies, D-57068 Siegen, Germany
关键词
Data protection; Interactive television; Multilateral security; Multimedia architecture;
D O I
10.1007/s00530-010-0221-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper focuses on security measures in the context of interactive TV (iTV), leaving out the field of social TV and concentrating on all two-way communication between user/viewer and infrastructure or content providers. It aims at introducing architecture for regulating all kinds of interactions and data streams within an iTV environment, including the different parties and their individual interests. By modeling this kind of organizational infrastructure, the authors follow the intention of finding best compromises between the partly opposing interests. While the user is in need of preserving his privacy, the scenario provider as well as the content provider together with the advertisers is dependent on valuable consumer information about content and general product information. In this respect, the proposed outline of the scenario considers all ways and directions of data flows, ranging from user information in the shape of TV content recommendations or tailored product information according to given consumption preferences up to all aspects of data protection. The latter appears highly important according to the different participants in the scenario, all having their own interests and thus forming heterogeneous relationships between the different single and corporate actors. The article emphasizes an alternate perspective on iTV compared to simple digital TV on the one and internet technology on the other hand. It gives a dense description of privacy concerns, economic interests, organizational necessities and approaches to programming solutions, presenting alongside the latest inventions and standards in terms of data protection features, e.g. operating with anonymized snapshots helping not only to hide the user's identity but also to create profile clusters. One of the main suggestions outlined here is to strengthen the consumer's role, thus accepting his dominant position in bringing iTV to success. The conclusion to be proposed lies in two key aspects: it is as well necessary to refer to the organizational structure as a model of interest relations as to combine the structure with innovative data protection mechanisms. Because the whole scenario deeply depends on trust and reputation, it is a need to put the user/viewer into control of the origins of data processing. This can only be achieved by a special kind of smartcard with far reaching impacts linked to the snapshot method. Furthermore, the authors give hints on how to enhance the attractiveness of the back channel in order to stimulate the data flow.
引用
收藏
页码:393 / 408
页数:16
相关论文
共 50 条
  • [1] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    [J]. Multimedia Systems, 2011, 17 : 393 - 408
  • [2] Functional Requirements Modelling for Interactive TV Applications
    Canchi, Sergio
    Eduardo Duran, Juan
    [J]. REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY ( REFSQ 2015), 2015, 9013 : 254 - 261
  • [3] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    [J]. SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [4] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    [J]. INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [5] The hidden meta-requirements of security and privacy
    Spafford, G
    [J]. FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 10 - 10
  • [6] Requirements for Security, Privacy, and Trust in the Internet of Things
    Mohammed, Sabah
    Kim, Tai-Hoon
    Fang, Wai Chi
    [J]. IEEE SECURITY & PRIVACY, 2021, 19 (01) : 8 - 10
  • [7] Security and Privacy in Video Surveillance: Requirements and Challenges
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184
  • [8] DOES COMPUTER SECURITY MEET PRIVACY REQUIREMENTS
    ELLISON, R
    [J]. INFORMATION PRIVACY, 1978, 1 (01): : 33 - 37
  • [9] Privacy, Security, Soft Requirements, and Flaky Tests
    Staron, Miroslaw
    Abrahao, Silvia
    Honnenahalli, Chetan
    Horkoff, Jennifer
    [J]. IEEE SOFTWARE, 2023, 40 (05) : 117 - 120
  • [10] Security and Privacy Requirements for the Internet of Things: A Survey
    Alhirabi, Nada
    Rana, Omer
    Perera, Charith
    [J]. ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (01):