Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: https://www.sciepub.com/journal/iscf Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
Information Security and Computer Fraud. 2014, 2(3), 48-51
DOI: 10.12691/iscf-2-3-3
Open AccessArticle

The Security File System in Smart TV Operating System

Wang Xin1, 2, and Yao Suying1

1School of Electronic Information Engineering, Tianjin University, Tianjin, China

2Tianjin Broadcast and Television Network Co., Ltd

Pub. Date: December 23, 2014

Cite this paper:
Wang Xin and Yao Suying. The Security File System in Smart TV Operating System. Information Security and Computer Fraud. 2014; 2(3):48-51. doi: 10.12691/iscf-2-3-3

Abstract

Modern smart TV devices have put a wealth of information and ever increasing opportunities for social interaction at the fingertips of users. At the center of this revolution are smart phone, smart TV and tablet computers, which give people a nearly constant connection to the Internet. As smart TV usage increases, more developers become involved in implementing application for smart TV. Security for application running on the smart TV is important. The smart TV operating system provides great flexibility not only for application developers but also for users. Most of Smart TV Operating Systems are open source operating system designed for Digital TV available on a variety of smart TV devices. As with PCs, there are a variety of security threats that can affect the smart TV device such as application based threat, web based threat, network based threat and file data threat. In this paper, we mainly focus on file data threat, in order to keep the data integrity the information should not be amended, damaged and loss in transmission process. We present the security file system in the Smart TV Operating System.

Keywords:
security file system Smart TV DVB Android

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Wang Xin, Chen Delin, Sun Yue, Wang Xu, Yao Suying, “Security control for TVOS”, 2014 2nd Asian Pacific Conference on Mechatronics and Control Engineering.
 
[2]  Wang Xin, Yao Suying, Wang Xu, Chen Delin, Sun Jun, Hua Zhong, Wang Dongfei, “TVOS Content Security Analysis and Protection in Smart TV”, 2014 2nd International Conference on Mechatronics and Control Engineering.
 
[3]  Wang Xin, Chen Delin, Sun Yue, Wang Xu, Yao Suying, “The Security Model of Broadcast Illtelligent Terminal Application and Technology Realization on TVOS”, 2014 2nd International Conference on Mechatronics and Control Engineering.
 
[4]  Felix Rohrer, Nebiyu Feleke, Yuting Zhang, Kenneth Nimley,Lou Chitkushev, Tanya Zlateva1. Android Security Analysis and Protectionin Finance and Healthcare. //Boston University MET
 
[5]  ChenDelin, Li Zheng, Wang Ying, Zhao Liangfu, Zhang Dingjing. “The main technical characteristics and software architecture of NGB TVOS”, “Radio and television information”, 2013-10National Academy of Broadcasting Science
 
[6]  NGB TVOS1.0 Version of cooperation and development. The next generation of radio and television (NGB) Intelligent Technology TV operating system v1.0.0, the State Press and Publication Administration
 
[7]  GY/T267-2012.NGB Technical specification of terminal middleware, the State Press and Publication Administration
 
[8]  Wang Mingmin, Zhu Yunbin. “To explore the implementation model and techniques of intelligent television terminal security under NGB environment”, “Radio and TV Technology”, 2012-10.
 
[9]  Ning Hua, Li Wei, Wang Kun, Lei Mingyu. “Research on intelligent terminal security system”, “Modern telecommunication technology”, 2012-5.
 
[10]  Haohui Mai, Edgar Pek, Hui Xue, Samuel T. King, P.Madhusudan. Verifying Security Invariants in ExpressOS // University of Illinois at Urbana-Champaign
 
[11]  Bernhard J. Berger, Michaela Bunke, and Karsten Sohr. An Android Security Case Study with Bauhaus // 2011 18th Working Conference on Reverse Engineering.
 
[12]  Zhiguo Wan, Jun’e Liu, Rui Zhang, and Robert H. Deng. “A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting” // IEEE TRANSACTIONS ON MULTIMEDIA VOL. 15,NO. 6, OCTOBER 2013
 
[13]  Eun-Jun Yoon, Kee-Young Yoo. “ECC-based Key Exchange Protocol for IPTV Service” // ICIC 2011
 
[14]  Stephen D. WolthusenFraunhofer-IGD. “Security Policy Enforcement at the File System Level in the Windows NT Operating System Family”.
 
[15]  Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. Jason Hinek. “Dual RSA and Its Security Analysis” //IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 8, AUGUST 2007.