<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Sharing and Protecting Networked Digital Life Memories</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Professor Madjid Merabti</string-name>
          <email>M.Merabti@ljmu.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Computing and Mathematical Sciences Liverpool John Moores University</institution>
          ,
          <addr-line>Liverpool</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulted in an astonishing growth in the use of multimedia and the production of user generated content. It's now becoming feasible to store a digital record of everything that a person sees and hears throughout their life, all using cheap and easily obtainable commodity hardware. Such possibilities have given rise to the idea of a digital human life memory, able to store all of the video, photographs, documents and communications that relate to us as we travel through our lives. We explore how networked systems can be used to extend the capabilities of digital human life memory stores. Not only through the networking of the memory stores themselves, but also through the use of networked appliances, networked virtual worlds and wireless sensors network technologies. As well as the benefits, the massive increase in multimedia networking also presents drawbacks that include the potential for breaches of privacy and the need for content protection. We will also therefore consider our work in the area of security that aims to address some of these challenges, and maintain a balance between the competing benefits of sharing and protection of multimedia and sensory data.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>INTRODUCTION</title>
      <p>Over several decades, computers have continued to grow
in power and capabilities at an exponential rate. In 1965
Gordon Moore famously predicted that “the number of
transistors on a chip will double about every two years,” and
this remained largely true for the next thirty years. At the
same time, digital storage space has improved exponentially,
both in terms of capacity and price, so that average users are
now able to have terabytes of storage space at their disposal.</p>
      <p>This description, however, doesn‟t really do justice to the
change that many people have experienced over the thirty
years in the way they interact with computers. The real
changes have not been just quantitative, but qualitative as
well. With computers and broadband networks now
nearubiquitous in many countries, people‟s lives and experiences
have been transformed by modern computing. Devices that
in the past would have been seen as standalone (often
mechanical) devices in their own right – cameras, video
recorders, phones, books – now not only connect to and
interoperate with computers, but are in fact computers in
their own right.</p>
      <p>
        Just one of the many exciting consequences of these
changes has been the potential for and growth of user
generated content (UGC). There is clearly a huge appetite for
people to not just consume content and media, but also to
create it, to describe their thoughts on personal blogs, to
share their experiences on social networking sites and to
catalogue their lives in photos on photo sharing sites. While
the need to share experiences isn‟t new, the opportunities
certainly are. As we can see from the data of Gemmel et al.
in Table 1 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a terabyte of storage will allow the recording
of more audio than an individual can realistically generate in
a year. In the not too distant future users will be in a position
to record every waking (and sleeping) moment of their lives
in 2D video.
Item
300 KB JPEG picture
1 MB document
1 hour 256 Kb/s audio
1 hour 1.5 Mb/s video
Items/TB
3.6M
1.0M
9.3K
290
      </p>
      <p>Items/day</p>
      <p>In this paper we will explore these ideas further,
considering the importance of a human life memory store,
how it will extend through the growth of the Internet of
Things and some of the security considerations that might
result.</p>
    </sec>
    <sec id="sec-2">
      <title>II. HUMAN LIFE MEMORY STORE</title>
      <p>The massive quantity of data that we encounter and
generate through our lives has given rise to the idea of a
digital human life memory. This would be capable of storing
all of the video, images, documents and communications that
relate to us as we travel through our lives. Computers have
given us the means to capture and store such information,
however the real challenge that motivates the need for a
human life memory store is not the desire to capture and
store, but more the desire to manage and organise these vast
quantities of data. Although surely we have seen
improvements in this area, the design of an efficient
management tool for all of this data – able to rival the brain‟s
own ability to handle and recall memories – remains a
significant challenge.</p>
      <p>
        However, the challenge is not a new one. In 1945
Vannavar Bush published a groundbreaking article “As We
May Think” [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] that explored the possibility of developing a
Memex device able to store and retrieve all of his books,
records, communications and so on. At this early stage, Bush
envisaged a desk-like device with screens able to show data
recorded on microfiche. He even considered the possibility
of recording memories using a head-mounted camera.
      </p>
      <p>
        More recently the focus has been turned to computers to
achieve similar ends. The ongoing Microsoft MyLifeBits
project [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] aims to fulfil the Memex vision using a database
of annotated photographs and other media. Microsoft
developed the SenseCam to take digital photographs
prompted automatically by significant changes in sensory
data, such as light or temperature levels. Media can be
browsed in the form of a timeline to allow the user to quickly
identify relevant memories.
      </p>
      <p>
        The Companions project [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] aims to make the interaction
between humans and machines easier using techniques that
allow the computer to learn about an individual through their
memories. For example, the computer may ask questions
about a recently uploaded photograph (“Who is in this
picture? Is it the same person that you were with yesterday
afternoon?”) thereby allowing the image to e appropriately
tagged and the information used to augment future
conversations between the user and computer.
      </p>
      <p>
        Indeed the need to store, manage and share memories is
often seen as being a defining trait of humanity and one
which underpins the persistence of human cultures. This has
been recognised by the UNESCO Memory of the World
programme [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], which aims to store cultural documents and
material that might otherwise be lost, and guard against
“collective amnesia”. Ironically, the rapidly changing world
of computing has often hindered rather than promoted this
aim, as data stored on legacy systems becomes unreadable by
newer computers and ultimately lost. The need to tackle all
of these issues has also been recognised by research funding
bodies, for example having been designated as a Grand
Challenge for Computing in the UK [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>III. SHARING MEMORIES</title>
      <p>Although retention and management of memories are of
course crucial, our own work has looked at another aspect
which is equally important; that of sharing memories.</p>
      <p>There are already a variety of tools that allow sharing of
different types of multimedia file and often these are
webbased in nature. Social networking sites also provide an
attractive means for users to share personal information with
others in their community. However, from an architectural
perspective such systems are not ideal. They are inevitably
centralised in nature and require that the user relinquishes
control of their personal data to the website owner. It can be
difficult to transfer data between sites and should one site
disappear a user‟s data may be lost with it. Moreover the
methods made available for annotating, organising and
searching data may be restrictive.</p>
      <p>
        Previous work has shown that peer-to-peer networks
provide a very successful, decentralised architecture that has
been used widely in applications where sharing large
amounts of data is a primary concern [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Moreover, the
characteristics of social networks have also been shown to be
similar to those of peer-to-peer networks, which could
provide an opportunity to create an efficient system by
reflecting the social network structure into that of the
peerto-peer network. Our work has therefore looked at how a
peer-to-peer network could be used as a means of storing and
creating a human life memory store. This has allowed us to
improve existing methods to implement a novel peer-to-peer
architecture that represents a decentralised and
usercontrolled network for sharing memories.
      </p>
    </sec>
    <sec id="sec-4">
      <title>IV. NETWORKED MEMORIES</title>
      <p>
        Although the prospect of integrating human life memory
stores with peer-to-peer networks provides great potential in
allowing people to share memories between each other
seamlessly, we believe the true benefit extends well beyond
this. By developing our human life memory network as a
service on top of our existing Service Utilisation Framework
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] (itself designed as a peer-to-peer architecture), we are
immediately able to integrate other software and hardware
services and devices to provide additional functionality. The
framework allows networked appliances and other devices to
interoperate and compose to provide new services. For
example, data from a home multimedia device, phone or
networked appliance could be fed directly into the human
life memory store to provide additional annotation about
additional aspects of a person‟s life. Such additional
information might include the type of films that someone
watches, what type of food someone enjoys or logs of device
usage. Future wireless sensor networks integrated in the
system can be utilised in a similar manner.
      </p>
    </sec>
    <sec id="sec-5">
      <title>V. SECURITY</title>
      <p>
        Although the growth of the technologies we have been
discussing presents a wealth of exciting opportunities and
applications, it will also inevitably present new security
threats and difficulties. The ability for memories to flow
seamlessly between interested parties represents a key
property of the systems that we are developing. To allow this,
while preventing serious privacy concerns, new security
methods will be needed. For this reason we are also
considering distributed security techniques able to work
flexibly, but without the need for centralised control. We
believe the use of distributed techniques, especially through
the use of mobile agents [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and community-based security
mechanisms [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Community mechanisms utilise the
intrinsic nature of the peer-to-peer data sharing network –
that they are based on users with shared interests who are
sharing data – to improve the overall security of a system by
allowing the community itself to perform the „policing‟,
rather than rely on any centralised mechanism.
      </p>
    </sec>
    <sec id="sec-6">
      <title>VI. CONCLUSION</title>
      <p>As technology develops users will continue to use and
generate huge quantities of information and documents. The
need to store, organise and manage this information will only
increase, and with it the desire for users to share it with
friends, family members and others who may be interested.
We believe peer-to-peer networks present an ideal
technology that can allow not only effective management
and sharing of life memories, but which will also allow
future developments in networked appliances to be
integrated naturally, thereby providing an even richer and
more effect method to manage our memories.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gemmell</surname>
          </string-name>
          , G. Bell,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lueder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Drucker</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wong</surname>
          </string-name>
          ,
          <article-title>"MyLifeBits: Fulfilling the Memex Vision,"</article-title>
          in ACM Multimedia '
          <volume>02</volume>
          ,
          <string-name>
            <surname>Juan-</surname>
          </string-name>
          les-Pins, France,
          <fpage>1</fpage>
          -
          <issue>6</issue>
          <year>December 2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Bush</surname>
          </string-name>
          ,
          <article-title>"As We May Think," in The Atlantic Monthly</article-title>
          ,
          <year>July 1945</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gemmell</surname>
          </string-name>
          , G. Bell, and
          <string-name>
            <given-names>R.</given-names>
            <surname>Lueder</surname>
          </string-name>
          ,
          <article-title>"MyLifeBits: A personal database for everything,"</article-title>
          <source>Communications of the ACM</source>
          , vol.
          <volume>49</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>88</fpage>
          -
          <lpage>95</lpage>
          ,
          <year>January 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Turunen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hakulinen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Charlton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Cavazza</surname>
          </string-name>
          ,
          <article-title>"Physically Embodied Conversational Agents as Health and Fitness Companions,"</article-title>
          <source>in Interspeech</source>
          <year>2008</year>
          , Brisbane, Australia,
          <fpage>22</fpage>
          -
          <issue>26</issue>
          <year>September 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>K.</given-names>
            <surname>Bradley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lei</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Blackall</surname>
          </string-name>
          ,
          <article-title>"Towards an Open Source Archival Repository and Preservation System,"</article-title>
          <source>UNESCO</source>
          , Paris, France,
          <year>June 2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K. O‟</given-names>
            <surname>Hara</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Shadbolt</surname>
          </string-name>
          ,
          <article-title>"Road Map for Memories for Life Research," 1 January 2008</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E. K.</given-names>
            <surname>Lua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Crowcroft</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Lim</surname>
          </string-name>
          ,
          <article-title>"A survey and comparison of peer-to-peer overlay network schemes,"</article-title>
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          , vol.
          <volume>7</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>2</fpage>
          -
          <lpage>93</lpage>
          ,
          <year>March 2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mingkhwan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fergus</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          <article-title>Abuelma'atti</article-title>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Merabti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Askwith</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Hanneghan</surname>
          </string-name>
          ,
          <article-title>"Dynamic Service Composition in Home Appliance Networks," Kluwers Multimedia Tools and Applications: A Special Issue on Advances in Consumer Communications and Networking</article-title>
          , vol.
          <volume>29</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>257</fpage>
          -
          <lpage>284</lpage>
          ,
          <year>June 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Shi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Merabti</surname>
          </string-name>
          ,
          <article-title>"Resource-efficient intrusion detection in pervasive computing,"</article-title>
          <source>in IEEE International Conference on Communications (ICC</source>
          <year>2007</year>
          ), Glasgow, UK,
          <fpage>24</fpage>
          -
          <lpage>28</lpage>
          June 2007.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Merabti</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Llewellyn-Jones</surname>
          </string-name>
          ,
          <article-title>"Digital Rights Management in Ubiquitous Computing,"</article-title>
          <source>IEEE Multimedia</source>
          , vol.
          <volume>13</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>32</fpage>
          -
          <lpage>42</lpage>
          , April-June 2006.
          <article-title>Madjid Merabti is Professor of Networked Systems and Director of the School of Computing</article-title>
          &amp; Mathematical Sciences, at Liverpool John Moores University, UK.
          <article-title>He is a graduate of Lancaster University in the UK</article-title>
          .
          <article-title>He has over 20 years experience in conducting research and teaching in the areas of Computer Networks (fixed and wireless</article-title>
          ), Mobile Computing, and Computer Network Security. Prof.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <article-title>Merabti is widely published in these areas and leads the Distributed Multimedia Systems</article-title>
          and Security Research Group,
          <article-title>which has a number of UK Government, EU, and industry supported research projects. He is principal investigator in a number of current projects in Digital Rights Management, Games Technology, Multimedia Networking, Mobile Networks Security and Privacy Architectures and Protocols, Secure Component Composition in Ubiquitous Personal Networks, Networked Appliances, Mobile and AdHoc Computing Environments</article-title>
          , and
          <string-name>
            <given-names>Sensor</given-names>
            <surname>Networks</surname>
          </string-name>
          .
          <source>He is Associate Editor for IEEE Transactions on Multimedia, Area Editor for IEEE Communications Magazine series on Networked Appliances and Home Networking</source>
          , Co-Editor in
          <article-title>-Chief for the International Journal of Pervasive Computing and Communications (JPCC), Member of Editorial Boards for Springer Peer-to-Peer Networking</article-title>
          and
          <string-name>
            <given-names>Applications</given-names>
            <surname>Journal</surname>
          </string-name>
          ,
          <source>Elsevier Journal on Computer Communications, and Wiley‟s Communications and Security Journal</source>
          . Madjid is Guest Editor for Springer Signal Processing special issue on “
          <article-title>Advance in Peer-t-Peer Contents Management</article-title>
          ,”
          <year>2009</year>
          .
          <article-title>He was Guest Editor for the Special issue on “Research Developments in Consumer Communications</article-title>
          and Networking”,
          <source>Multimedia Tools and Applications: An International Journal</source>
          , Kluwer,
          <year>September 2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <article-title>Madjid Merabti serves on the steering committee for the IEEE Consumer Communications and Networking (CCNC) series of conferences</article-title>
          .
          <source>He is Technical Programme Chair for: IEEE ICC Symposium on Special Areas of Communications, Germany</source>
          <year>2009</year>
          , and IASTED - EuroIMSA
          <source>2009 European Conference on Internet and Multimedia Systems and Applications</source>
          .
          <article-title>He is a member of a number of international conference programme committees on networking, security, networked appliances, digital rights management, and computer entertainment</article-title>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>