DOI QR코드

DOI QR Code

Secure Contents Access Control System in IPTV Flexible-PPC Model

IPTV Flexible-PPC 환경에서의 안전한 콘텐츠 접근 제어 시스템

  • Received : 2010.05.31
  • Accepted : 2010.11.25
  • Published : 2011.02.28

Abstract

A conditional access system is an essential element in IPTV services enabling service providers to allow authorized access to their services only to paid subscribers. Currently, there are two types of IPTV service models, namely PPC (pay-per-channel) and PPV (pay-per-view). However, a more desirable model would be the flexible PPC model, in which subscribers are free to choose any combination of preferred channels and add/remove channels independently. In this paper, we first point out that a previously proposed key management scheme for F-PPC is not secure. We then propose a new conditional access system using 4-level key hierarchy to realize secure F-PPC services. Compared to existing schemes, the proposed system is very efficient, just requiring O(1) communication for key update.

제한수신시스템은 IPTV 서비스의 가입자에게 비용을 청구하고 인가된 사용자에게만 서비스를 제공하기 위한 필수적인 요소이다. 현재 IPTV는 PPC(pay-per-channel)와 PPV(pay-per-view) 두 가지 환경으로 서비스되고 있는데, 사용자의 취향에 따라 임의의 채널을 조합할 수 있고 구독기간에 관계없이 개별적인 채널 추가 및 해지가 가능한 F-PPC(Flexible-PPC) 환경이 요구된다. 기존에 제안된 제한수신시스템 기법들을 F-PPC 환경에 적용하기에는 문제점이 존재한다. 본 논문에서는 F-PPC 환경에 적용할 수 있는 4계층 키 구조의 제한수신시스템을 제안한다. 제안하는 시스템은 이진트리를 이용하여 효율적인 키 관리가 가능하고 키 갱신에 요구되는 메시지 통신량이 O(1) 수준이기 때문에 대역폭의 부담이 적다. 따라서 기존의 제한수신시스템에 비해 효율적이고 안전하다.

Keywords

Acknowledgement

Supported by : 한국과학재단

References

  1. "Conditional-Access Broadcasting Systems," ITU Rec., 810, 1992.
  2. F. Tu, C. Laih, and H. Tung, "On Key Distribution Management for Conditional Access System on Pay-TV System," IEEE Trans. Consumer Electronics, Vol. 45, pp.151-158, February 1999. https://doi.org/10.1109/30.754430
  3. Y.L. Huang, S. Shieh, F.S. Ho, and J.C. Wang, "Efficient key distribution schemes for secure media delivery in pay-TV systems," IEEE Trans. Multimedia, vol. 6, no. 5, pp. 760-769, October 2004. https://doi.org/10.1109/TMM.2004.834861
  4. T. Jiang, S. Zheng, and B. Liu, "Key distribution based on hierarchical access control for conditional access system in DTV broadcast," IEEE Trans. Consumer Electronics, vol. 50, no. 1, pp. 225-230, February 2004. https://doi.org/10.1109/TCE.2004.1277866
  5. B. Liu, W. Zhang, and T. Jiang, "A scalable key distribution scheme for conditional access system in digital pay-TV system," IEEE Trans. Consumer Electronics, vol. 50, no. 2, pp. 632-637, May 2004. https://doi.org/10.1109/TCE.2004.1309442
  6. H.M. Sun, C.M. Chen, and C.Z. Shieh, "Flexible-Pay-Per-Channel: A new model for content access control in pay-TV broadcasting systems," IEEE Trans. Multimedia, vol. 10, no. 6, pp. 1109-1120, October 2008. https://doi.org/10.1109/TMM.2008.2001381
  7. C.K. Wong, M. Gouda, and S.S. Lam, "Secure group communications using Key graphs," IEEE/ACM Trans. Networking, vol. 8, pp. 16-30, February 2000. https://doi.org/10.1109/90.836475
  8. D.M. Wallner, E.J. Harder, and R.C. Agee, "Key management for multicast: Issues and architecutres," RFC 2627, June 1999.
  9. R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and som efficient constructions," IEEE INFOCOM, vol. 2, pp. 708-716, March 1999.
  10. A.T. Sherman and D.A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Software Engineering, vol. 29, pp. 444-458, May 2003. https://doi.org/10.1109/TSE.2003.1199073
  11. M. Li, R. Poovendran, and C. Bernstein, "Design of secure multicast key management schemes with communication budget constraint," IEEE Communication Letters, vol. 6, pp. 108-110, March 2002. https://doi.org/10.1109/4234.991148
  12. M.J. Mihaljevic, "Reconfigurable key management for broadcast encryption," IEEE Communication Letters, vol. 8, pp. 440-442, July 2004. https://doi.org/10.1109/LCOMM.2004.832774
  13. W.T. Zhu, "Optimizing the tree structure in secure multicast key management," IEEE Communications Letters, vol. 9, no. 5, pp. 477-479, May 2005. https://doi.org/10.1109/LCOMM.2005.1431177
  14. Q. Kang, X. Meng, and J. Wang, "An optimized LKH scheme based on one-way hash function for secure group communications," IEEE ICCT, November 2006.