This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
May 2008 (vol. 19 no. 5)
pp. 615-626
Content services such as content filtering and transcoding, adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is an important problem, and crucial for many web applications. In this paper, we propose an approach that addresses data integrity and confidentiality in content adaptation and caching by intermediaries. Our approach permits multiple intermediaries to simultaneously perform content services on different portions of the data. Our protocol supports decentralized proxy and key managements and flexible delegation of services. Our experimental results show that our approach is efficient and minimizes the amount of data transmitted across the network.

[1] C. Aggarwal, J.L. Wolf, and P.S. Yu, “Caching on the World Wide Web,” IEEE Trans. Knowledge and Data Eng., vol. 11, no. 1, pp. 94-107, Jan. 1999.
[2] G. Berhe, L. Brunie, and J.M. Pierson, “Modeling Service-Based Multimedia Content Adaptation in Pervasive Computing,” Proc. First Conf. Computing Frontiers, Apr. 2004.
[3] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “Web Caching and Zipf-Like Distributions: Evidence and Implications,” Proc. IEEE INFOCOM '99, Mar. 1999.
[4] S. Buchholz and A. Schill, “Adaptation-Aware Web Caching: Caching in the Future Pervasive Web,” Proc. 13th GI/ITG Conf. Kommunikation in Verteilten Systemen (KiVS), 2003.
[5] V. Cardellini, P.S. Yu, and Y.W. Huang, “Collaborative Proxy System for Distributed Web Content Transcoding,” Proc. Ninth ACM Int'l Conf. Information and Knowledge Management (CIKM '00), Nov. 2000.
[6] S. Chandra and C.S. Ellis, “JPEG Compression Metric as a Quality-Aware Image Transcoding,” Proc. Second Usenix Symp. Internet Technology and Systems (USITS '99), Oct. 1999.
[7] C.H. Chi, Y. Lin, J. Deng, X. Li, and T. Chua, “Automatic Proxy-Based Watermarking for WWW,” Computer Comm., vol. 24, no. 2, pp. 144-154, Feb. 2001.
[8] C.H. Chi and Y. Wu, “An XML-Based Data Integrity Service Model for Web Intermediaries,” Proc. Seventh Int'l Workshop Web Content Caching and Distribution (WCW '02), Aug. 2002.
[9] Extensible Markup Language (XML), http://www.w3.orgXML/, 2007.
[10] A. Fox, S.D. Gribble, Y. Chawathe, and E.A. Brewer, “Adapting to Network and Client Variation Using Active Proxies: Lessons and Perspectives,” IEEE Personal Comm., Aug. 1998.
[11] M.J. Freedman, E. Freudenthal, and D. Mazières, “Democratizing Content Publication with Coral,” Proc. Usenix/ACM Symp. Networked Systems Design and Implementation (NSDI '04), Mar. 2004.
[12] R. Han, P. Bhagwat, R. LaMaire, T. Mummert, V. Perret, and J. Rubas, “Dynamic Adaptation in an Image Transcoding Proxy for Mobile Web Browsing,” IEEE Personal Comm., vol. 5, no. 6, pp. 8-17, Dec. 1998.
[13] J-L. Huang, M-S. Chen, and H-P. Hung, “A QoS-Aware Transcoding Proxy Using On-Demand Data Broadcasting,” Proc. IEEE INFOCOM '04, Mar. 2004.
[14] Y. Koglin, G. Mella, E. Bertino, and E. Ferrari, “An Update Protocol for XML Documents in Distributed and Cooperative Systems,” Proc. 25th Int'l Conf. Distributed Computing Systems (ICDCS '05), June 2005.
[15] B. Li, M.J. Golin, G.F. Italiano, X. Deng, and K. Sohraby, “On the Optimal Placement of Web Proxies in the Internet,” Proc. INFOCOM '99, Mar. 1999.
[16] W.Y. Lum and F.C.M. Lau, “On Balancing between Transcoding Overhead and Spatial Consumption in Content Adaptation,” Proc. ACM MobiCom '02, pp. 239-250, Sept. 2002.
[17] P. Maglio and R. Barrett, “Intermediaries Personalize Information Streams,” Comm. ACM, vol. 43, no. 8, pp. 99-101, Aug. 2000.
[18] S. Sivasubramanian, M. Szymaniak, G. Pierre, and M.V. Steen, “Replication for Web Hosting Systems,” ACM Computing Surveys, vol. 36, no. 3, pp. 291-334, Sept. 2004.
[19] SSL Specification, http://wp.netscape.com/eng/securitySSL_2.html , 2007.
[20] B. Thuraisingham, A. Gupta, E. Bertino, and E. Ferrari, “Collaborative Commerce and Knowledge Management,” Knowledge and Process Management, vol. 9, no. 1, pp. 43-53, Aug. 2002.
[21] Transport Layer Security, http://www.ietf.org/html.charterstls-charter.html , 2007.
[22] W3C XML Schema, http://www.w3.org/XMLSchema, 2007.

Index Terms:
Database Management, Data sharing, Security, integrity, and protection, Distributed systems
Citation:
Yunhua Koglin, Danfeng Yao, Elisa Bertino, "Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries," IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 5, pp. 615-626, May 2008, doi:10.1109/TPDS.2007.70758
Usage of this product signifies your acceptance of the Terms of Use.