Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Security and privacy requirements in interactive TV

  • Interactive Multimedia Computing
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

The paper focuses on security measures in the context of interactive TV (iTV), leaving out the field of social TV and concentrating on all two-way communication between user/viewer and infrastructure or content providers. It aims at introducing architecture for regulating all kinds of interactions and data streams within an iTV environment, including the different parties and their individual interests. By modeling this kind of organizational infrastructure, the authors follow the intention of finding best compromises between the partly opposing interests. While the user is in need of preserving his privacy, the scenario provider as well as the content provider together with the advertisers is dependent on valuable consumer information about content and general product information. In this respect, the proposed outline of the scenario considers all ways and directions of data flows, ranging from user information in the shape of TV content recommendations or tailored product information according to given consumption preferences up to all aspects of data protection. The latter appears highly important according to the different participants in the scenario, all having their own interests and thus forming heterogeneous relationships between the different single and corporate actors. The article emphasizes an alternate perspective on iTV compared to simple digital TV on the one and internet technology on the other hand. It gives a dense description of privacy concerns, economic interests, organizational necessities and approaches to programming solutions, presenting alongside the latest inventions and standards in terms of data protection features, e.g. operating with anonymized snapshots helping not only to hide the user’s identity but also to create profile clusters. One of the main suggestions outlined here is to strengthen the consumer’s role, thus accepting his dominant position in bringing iTV to success. The conclusion to be proposed lies in two key aspects: it is as well necessary to refer to the organizational structure as a model of interest relations as to combine the structure with innovative data protection mechanisms. Because the whole scenario deeply depends on trust and reputation, it is a need to put the user/viewer into control of the origins of data processing. This can only be achieved by a special kind of smartcard with far reaching impacts linked to the snapshot method. Furthermore, the authors give hints on how to enhance the attractiveness of the back channel in order to stimulate the data flow.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Notes

  1. Special devices allowing interpersonal messages to all viewers of the same program, e.g. to find contact partners.

  2. For further definitions of iTV trying to describe different stages of interactivity, see for instance Hachmeister and Zabel [9, pp. 148–150].

  3. See Hachmeister and Zabel [9, pp. 148–150], differentiating between personally and temporarily offered services.

  4. Information about potential customers, their behavior and preferences has become one of the most important assets within the information society (cf. [13, p. 113]).

  5. The so-called tailored advertisements on the basis of behavioral targeting (BT) still only exist for different sorts of web services like Google or Amazon. They all have in common using ‘deep packet inspection’, i.e. searching for all user generated data by looking at the data stream between service and browser providers. Flash cookies are used to diminish the danger of losing tracking by those users changing their IP adressess frequently. See also as an example the homepages of two big companies providing solutions for personalized advertising: Phorm, see http://www.phorm.com, and AudienceScience, see http://www.audiencescience.com.

  6. It is obvious that they all closely belong to the sphere of marketing, embodying three out of the four decisive categories of modern marketing (also commonly known as the four ‘Ps’, product, prize, place—i.e. distribution—and promotion policy). Recommendation systems serve as a product surplus. In the case of fee reductions, the customer is confronted with a highly distinguished prize policy. And finally all aspects of data protection are closely connected to the sphere of distribution, the way TV programs and other media services are transported and how the whole access process is conducted.

  7. See, e.g., two main internationally operating agencies working on empirical results for sociodemographic tendencies in modern societies: SINUS Sociovision, http://www.sociovision.de and SIGMA, http://www.sigma-online.com.

  8. See, e.g., Oehmichen [28], McLeod/Sotirovic/Holbert [19, p. 459], Abercrombie/Longhurst [1, pp. 99–110], McQuail [20, pp. 54–55], Morley [24, p. 204].

  9. See more closely, e.g., Moores [23, p. 214] (concerning the relationship between consumer culture and media usage), Charlton [6, p. 91] (leisure and media usage), Stevenson [41] (to convincing parallels between sociodemographic facts and media usage). The sociodemographic parameters serve as a substitute for all the complex influence factors that can neither be fully depicted nor generalized (cf. e.g. [42]).

  10. See http://www.imdb.com/interfaces.

  11. See http://www.deanclatworthy.com/imdb.

  12. “Generally, companies have virtually free rein to use data in the US for business purposes without their customers’ knowledge or consent” [43, p. 6].

  13. Soft skills in this sense comprise reputation building. Only in case of being successful in persuasion that any service can guarantee highest standards in privacy protection, like it is mostly the case with online banking, the provider might earn the customer’s trust (cf. [26, p. 25]). An effective step towards trust building is to license the own service or at least certain general methods by independent authorities as supervised and trustworthy (cf. [7, p. 3]). Such certificates, like the ones by the Intelligence and Security Committee (ISC) of the UK, help building up reputation.

References

  1. Abercrombie, N., Longhurst, B.: Audiences: A Sociological Theory of Performance and Imagination. Sage, London (1998)

  2. Ardissono, L., Gena, C., Torasso, P., Bellifemine, F., Difino, A., Negro, B.: User modeling and recommendation techniques for personal electronic program guides. In: Ardissono, L. (ed.) Personalized Digital Television, vol. 6 of Human–Computer Interaction Series, pp. 3–26. Kluwer Academic Publisher, Dordrecht (2004). ISBN 1402021631

  3. Berkovsky, S., Kuflik, T., Ricci, F.: Enhancing privacy while preserving the accuracy of collaborative filtering (2006). http://www.inf.unibz.it/~ricci/papers/ECAI-CF-privacy-v9.pdf. Accessed 05 November 2009

  4. Büschkes, R., Kesdogan, D.: Privacy enhanced intrusion detection. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, vol. 3: Information Security, pp. 187–204. Addison-Wesley, München (1999). ISBN 3827313600

  5. Büttner, K.: Content-based versus collaborative filtering (2005). http://www.is-frankfurt.de/uploads/down417.pdf. Accessed 06 October 2009

  6. Charlton, M.: Massenkommunikation aus der Sicht der Masse: ein handlungstheoretischer Ansatz. In: Hasebrink, U., Krotz, F. (eds.) Die Zuschauer als Fernsehregisseure? Zum Verständnis individueller Nutzungs- und Rezeptionsmuster, 1st edn., pp. 76–93. Nomos, Baden-Baden (1996)

  7. Cissée, R., Albayrak, S.: An agent based approach for privacy preserving recommender systems (2007). http://www.dai-labor.de/fileadmin/files/publications/AAMAS_2007_DRAFT.pdf. Accessed 10 October 2009

  8. Haas, A.: Medienmenüs. Der Zusammenhang zwischen Mediennutzung, SINUS-Milieus und Soziodemographie. Fischer, München (2007)

  9. Hachmeister, L., Zabel, C.: Das interaktive Fernsehen und seine Zuschauer. In: zu Salm, C. (ed.) Zaubermaschine interaktives Fernsehen? pp. 145–169. Gabler, Wiesbaden (2004). ISBN 3409126376

  10. Hagel, J., Singer, M.: Net Value: Der Weg des digitalen Kunden. Gabler, Wiesbaden (2000). ISBN 9783409115391

  11. Hansell, S.: An icon says they’re watching you. New York Times, March 19th (2009)

  12. Hess, J., Becker, T., Hauptmeier, H.: TV 2010—Mission Complete? Buhl Data Service, Neunkirchen (2006)

  13. Karsten, R.: Rechtliche Rahmenbedingungen einer international genutzten Internetpräsenz. GRIN Verlag, München (2003)

  14. Klahold, A.: Empfehlungssysteme: Recommender Systems: Grundlagen, Konzepte und Lösungen. Studium, 1st edn. Vieweg + Teubner, Wiesbaden (2009). ISBN 9783834805683. http://www.gbv.de/dms/weimar/toc/57161891X_toc.pdf

  15. Krason, A., Mayr, M., Schipperges, M.: The modern upper middle classes in Western and Central Eastern Europe: cross-cultural targeting in the case of Bank Austria Creditanstalt. In: ESOMAR (ed.) Proceedings of the 56th ESOMAR Conference ‘Excellence in Consumer Insights’, pp. 13–37. ESOMAR, Madrid (2003)

  16. Kruth, W.: Grundlagen der Informationstechnik: Kompaktwissen für Datenschutz- und Security-Management, 3rd edn. Datakontext, Heidelberg (2009). ISBN 9783895775451. http://www.gbv.de/dms/ilmenau/toc/593493753.PDF

  17. Lassmann, W.: Wirtschaftsinformatik: Nachschlagewerk für Studium und Praxis. Wiesbaden, Gabler (2006). ISBN 9783834991522. http://dx.doi.org/10.1007/978-3-8349-9152-2

  18. Maybury M., Greiff W., Boykin S., Ponte J., McHenry C., Ferro L.: Personalcasting: tailored broadcast news. In: Ardissono, L. (ed.) Personalized Digital Television, vol. 6 of Human–Computer Interaction Series, pp. 177–202. Kluwer Academic Publisher, Dordrecht (2004). ISBN 1402021631

  19. McLeod, J.M., Sotirovic, M., Holbert, R.L.: Values as sociotronic judgements influencing communication patterns. Commun. Res. 25(5), 453–485 (1998)

    Google Scholar 

  20. McQuail, D.: Audience analysis. Sage, London (1997)

  21. Metzger, J.: Erfahrungen mit der MedienNutzerTypologie bei der Programmplanung und -positionierung im Fernsehen. In: Oehmichen, E., Ridder, C.-M. (eds.) Die Medien-Nutzer-Typologie, vol. 17 of Schriftenreihe Media Perspektiven, pp. 299–302. Nomos, Baden-Baden (2003). ISBN 3832900292

  22. Min, W.-H., Cheong, Y.-G.: An interactive-content technique based approach to generating personalized advertisement for privacy protection. In: Smith, M.J., Salvendy, G. (eds.): Human Interface and the Management of Information: Designing Information Environments; Symposium on Human Interface 2009. Part II, pp. 185–191. Springer, Berlin (2009). ISBN 978-3-642-02558-7. doi:10.1007/978-3-642-02559-4_21

  23. Moores, S.: Broadcasting and its audiences. In: Mackay, H. (ed.): Consumption and Everyday Life. Culture, Media and Identities, vol. 5, pp. 213-258. Sage, London (1997)

  24. Morley, D.: Television, Audiences, and Cultural Studies. Sage, London (1992)

  25. Morris, S., Smith-Chaigneau, A.: Interactive TV Standards: (a guide to MHP, OCAP, and JavaTV). Elsevier/Focal Press, Amsterdam (2005). ISBN 0240806662. http://www.loc.gov/catdir/toc/ecip057/2005001355.html, http://www.loc.gov/catdir/enhancements/fy0621/2005001355-d.html

  26. Müller, E.: Datenschutz als Verbraucherschutz. In: Bäumler, H., von Mutius, A. (eds.) Datenschutz als Wettbewerbsvorteil, DuD-Fachbeiträge, pp. 20–26. Vieweg, Braunschweig (2002). ISBN 3528057939

  27. National Advertising Initiative. Opt out of behavioral advertising (2009). http://www.networkadvertising.org

  28. Oehmichen, E.: Medienübergreifende Nutzungsmuster: Struktur- und Funktionsverschiebungen; eine Analyse auf Basis der ARD/ZDF-Onlinestudien 2008 und 2003. Media Perspektiven 8, 394–409 (2008)

    Google Scholar 

  29. Pei, Q., Fan, K., Dai, J., Ma, J.: An intelligent digital content protection framework between home network receiver devices. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) Computational Intelligence and Security, vol. 4456 of Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, pp. 750–758. Springer, Berlin (2007). ISBN 9783540743767

  30. De Pessemier, T., Deryckere, T., Vanhecke, K., Martens, L.: Proposed architecture and algorithm for personalized advertising on IDTV and mobile devices. IEEE Trans. Consum. Electron. 54(2), 709–713 (2008)

    Google Scholar 

  31. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.33.pdf, April 2010.

  32. Potonniée, O.: A decentralized privacy-enabling TV personalization framework (2004). http://www.csd.abdn.ac.uk/~jmasthof/EuroITV04/P07.pdf. Accessed 01 November 2009

  33. Ramirez, D.: Converged video network security (2005). http://america.liderdigital.com/documentos/Converged_Video_Network_Security_Lucent.pdf. Accessed 29 September 2009

  34. Ramirez, D.: IPTV Security: Protecting High-Value Digital Contents. Wiley, Chichester (2008). ISBN 9780470519240. http://www.gbv.de/dms/ilmenau/toc/545980429.PDF

  35. Schirmer, N.: Qualitative Bewertung von Werbung im Umfeld iTV (interactive Television): Bestandsaufnahme, Analyse und Perspektiven des deutschen Marktes, vol. 3 of BiTS-Forschung. Projektverl. Bochum (2006). ISBN 3897331411

  36. Schmid, N.: iTV-Werbung: Chancen und Herausforderungen. VDM, Saarbrücken (2007). ISBN 9783865507426. http://deposit.d-nb.de/cgi-bin/dokserv?id=2915700&prov=M&dok_var=1&dok_ext=htm

  37. Schwenke, M.C.: Individualisierung und Datenschutz: Rechtskonformer Umgang mit personenbezogenen Daten im Kontext der Individualisierung: Univ., 1st edn. DuD-Fachbeiträge. Deutscher Univ.-Verl., Wiesbaden (2006). ISBN 3835003941

  38. Sencar, H.T., Ramkumar, M., Akansu, A.N.: Data Hiding Fundamentals and Applications: Content Security in Digital Media. Elsevier Academic Press, Amsterdam (2004). ISBN 0120471442. http://www.zentralblatt-math.org/zmath/en/search/?an=1074.68517

  39. Sheth, J.N., Raju, P.S.: Sequential and cyclical nature of information processing models in repetitive choice behavior. Adv. Consum. Res. 1(1), 348–358 (1974). http://www.acrwebsite.org/volumes/display.asp?id=5664. Accessed 01 October 2009

  40. Smyth, B., Cotter, P.: A personalized television listings service. Commun. ACM 43(8):107–111 (2000). ISSN 0001-0782. doi:10.1145/345124.345161

    Google Scholar 

  41. Stevenson, N.: Understanding Media Cultures: Social Theory and Mass Communication. Sage, London (1995)

  42. Stipp, H.: Wird der Computer die traditionellen Medien ersetzen? Media Perspektiven 2, 78–82 (1998)

  43. Turow, J., King, J., Hoofnagle, C.J., Bleakley, A., Hennessy, M.: Americans Reject Tailored Advertising and Three Activities that Enable it. SSRN eLibrary (2009)

  44. van Setten, M., Tokmakoff, A., van Vliet, H.: Designing personalized information systems—a personal media center (2001). http://www.di.unito.it/~liliana/UM01/vanSetten.pdf. Accessed 10 October 2009

  45. Ware, H.S.: Holly Sanders Ware. NEW YORK POST, p. 37, July 10 2009

  46. Witt, B.C.: IT-Sicherheit kompakt und verständlich: eine praxisorientierte Einführung, 1st edn. Vieweg, Wiesbaden (2006). ISBN 9783834801401. http://www.gbv.de/dms/goettingen/505540649.pdf

  47. Wolf, G., Pfitzmann, A.: Empowering users to set their protection goals. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, vol. 3: Information Security, pp. 113–135. Addison-Wesley, München (1999). ISBN 3827313600

  48. Zhou, Y., Cheng, H., Jeffrey, X.Y.: Graph clustering based on structural/attribute similarities. PVLDB 2(1), 718–729 (2009)

    Google Scholar 

  49. Zhu, M., Zhang, M., Chen, X., Zhang, D., Huang, Z.: A hierarchial key distribution scheme for conditional access system in DTV broadcasting. In: Wang, Y., Cheung, Y.M., Liu, H. (eds.) Computational Intelligence and Security, vol. 4456 of Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, pp. 839–846. Springer, Berlin (2007). ISBN 9783540743767

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dhiah el Diehn I. Abou-Tair.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Abou-Tair, D.I., Köster, I. & Höfke, K. Security and privacy requirements in interactive TV. Multimedia Systems 17, 393–408 (2011). https://doi.org/10.1007/s00530-010-0221-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-010-0221-x

Keywords