A DRM Framework for Distributing Digital Contents through the Internet (original) (raw)
Related papers
Rights protection of digital content in the DRM environment
2015
In electronic-business settings, content providers produce digital goods/services (such as, games, images, softwares, etc.) which consumers/users wish to purchase. In general, mass-production of digital goods/services is possible if an instance of the goods/services is made available. Digital Rights Management (DRM) mainly considers technological approaches to protect content providers' rights on their original products (also known as, intellectual property) against illegal reproduction of the goods/services (also known as, piracy). Due to the wide range and different types of digital goods, several DRM systems have been studied in the literature. Many existing DRM systems, however, focus on the security of the content provider and often neglect the users' privacy. The problem statement of this thesis is devising DRM systems that protect users' privacy while content provider's security is maintained. To achieve this goal during the life-time of the digital content, w...
The Digital Rights Management (DRM) systems aim at protecting and enforcing the legal rights associated with the use of digital content distributed on the Internet. Most of such systems use watermarking techniques to implement the content protection. Although the effectiveness of the implemented protection strictly depends on the adopted watermarking techniques, an important role is also played by watermarking protocols. They define the scheme of the interactions that have to take place among the entities involved in the processes of content protection and web-based distribution governed by the DRM systems. This paper presents a DRM system developed as a web software platform to implement the copyright protection of multimedia digital content distributed on the Internet. The DRM system is based on a watermarking protocol previously developed by the authors, and has been designed as a service oriented architecture composed of a federation of coordinated web entities that play distinct roles and interact within a trusted environment.
Scenarios for Securing Content Delivery in the DRM Environment
In the DRM environment, content is usually distributed in an encrypted form. Typically, a secure encryption algorithm is utilized to accomplish such protection. However, executing this algorithm in an insecure environment may allow adversaries to compromise the system and obtain information about the decryption key. Keeping such a key secret is a major challenge for content distribution systems. We consider two solutions for securing content delivery. The first solution involves modifying the algorithm in such a way as to make implementation unintelligible. The second solution involves setting a buyer-seller protocol to communicate the key securely. In addition, the protocol can be set to achieve security for the content provider and privacy protection for user. This paper describes a study of these scenarios for DRM applications w.r.t securing content delivery.
Enabling DRM-preserving digital content redistribution
… , 2005. CEC 2005. …, 2005
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the use of these contents, to consumers. In this paper, we extend this model by introducing a security scheme that enables DRM preserving digital content redistribution. Essentially consumers can not only buy the rights to use digital content but also the rights to redistribute it to other consumers in a DRM controlled fashion. We examine the threats associated with ...
Secure and Private Content Distribution in the DRM Environment
Proceedings of the Information System International Conference (ISICO) 2013
Digital Rights Management (DRM) is required to provide balanced protection for both the content provider and the users in a content distribution system. The content provider demands secure content delivery so that only authorized users are able to access the content and use it properly. On the other hand, users require that their privacy be protected. However, most DRM systems tend to put greater emphasis on content providers‘ security and neglect users‘ privacy. This study aims to improve DRM by constructing a content distribution protocol that preserves the security of content provider and the privacy of users. To achieve this goal, we utilize the oblivious transfer (OT) concept. This concept allows a sender to securely send a set of information to a receiver in such a way that, at the end of the protocol, the receiver cannot learn more than he was supposed to learn, while the sender cannot determine what the receiver has learned. Assuming that tamper-proof device exists, the constructed protocol achieves perfect security for the content provider and privacy for the users. This oblivious content distribution ultimately enables DRM to be a privacy-aware protection system. The system does not merely focus on content providers‘ rights, but also seriously considers users‘ privacy protection.
Secure electronic content distribution is essential
2004
he interest in digital rights management (DRM) mainly started from the vision that the Web would become a new digital trading infrastructure for content. As it is evident from the piracy via the Web, security and content protection are essential [1]-[3]. This has triggered active research, new standards [4]-[9], legislation [10]-[12], and products in Web-based DRM technologies from Intertrust [13], IBM [14], Sony [15], and Real Networks [16]. Earlier on, content owners, the consumer electronics (CE) industry, and consumers were already in discussion about the protection of digital assets. This has resulted in media-related copy protection mechanisms for optical discs [18]-[22] as well as in conditional access systems that support current pay TV services [23], [26], [27]. The focus and priority changed with the advent of Web music exchange services like Napster [49].
Digital Rights Management in Peer To Peer Cultural Networks
Applications and Environments
As a general and effective protection measure for copyright violations which occur with the use of digital technologies including peer to peer (P2P) networks, copyright owners from the cultural sector often use Digital Rights Management systems and digital watermarking techniques to encrypt copyright information with the cultural content. In other cases copyright owners restrict or even block access to the digital cultural content through the Internet and the P2P infrastructure. This chapter claims that DRM and P2P can be quite complementary. Specifically, pa P2P infrastructure is presented which allows broad digital cultural content exchange while at the same time supporting copyright protection and management through watermarking technologies for digital images.
Digital Rights Management- Open Issues to Support e-Commerce
In the ear of the information technology and the rapid growth of the Internet access, e-Commerce technologies become very crucial as new and effective ways are needed to manage, transact, distribute, and exploit digital contents (e.g. audio and video). The proliferation of these contents has created a need for Digital Rights Management (DRM) systems. DRM, in addition to other security measures, is essential for the management and the protection of digital property which is the main component of an e-Commerce system. This chapter highlights the need for DRM as a tool facilitating e-Commerce. It also provides the history of developing DRM and the main components of a DRM system. It also gives an overview of the existing DRM system used in e-Commerce systems. It then discuss some open issues in the current DRM system to support consumers' rights, so supporting e-commerce business.
A novel approach to DRM systems
Modern Digital Rights Management (DRM) systems are often developed as web software platforms designed as service oriented architectures composed of a federation of coordinated web entities that play distinct roles and dynamically interact within a trusted environment. Such a design approach requires that trustu relationships have to be dynamically established across multiple and heterogeneous organizational boundaries so as to facilitate an ``on-the-fly'' resource sharing. This introduces non-trivial security architectural requirements concerning with the mechanisms that allow different security realms of web entities to be federated. This paper presents a DRM system developed as a web software platform designed to give a specific support both to the interaction of the web entities involved in the platform and to the development of the trusted relationships among them, in a much more flexible way than before, dynamically and with minimal overheads and shared infrastructure.