Skip to main content

Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption

  • Conference paper
Advances in Multimedia Information Processing – PCM 2007 (PCM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4810))

Included in the following conference series:

Abstract

P2P networks play a promotive role in distribution and transmission of digital multimedia content by providing high availability, fault tolerance, bandwidth efficiency and dynamic scalability. At the same time, however, it facilitates illegal pirate and unauthorized access towards copyright media content which may violate possessor ownership and result in economic loss. Conventional client/server model for DRM has difficulties coping with the challenge of secure communication in P2P environment. In this paper, we propose a strategy to incorporate DRM mechanism into P2P network architecture and construct a system which ensures efficient content sharing as well as reliable media protection. Our approach implements a revocable key management scheme based on broadcast encryption and enables cryptographic information for session key processing to be distributed among users within the same authorized domain in peer-to-peer mode. Mathematical analysis has demonstrated that the new strategy outperforms traditional solutions on alleviating communication overhead of License Server, minishing peer latency of authorization, and importing security modules without much modification to original peer-to-peer infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Subramanya, S.R., Yi, B.K.: Digital Rights Management. IEEE Potentials 25(2), 31–34 (2006)

    Article  Google Scholar 

  2. Kumar, V.: Trust and Security in Peer-to-Peer System. In: Proceedings of the 17th Inter-national Conference on Database and Expert Systems Applications, pp. 703–707 (2006)

    Google Scholar 

  3. Yu, F., Zhang, H., Yan, F.: A Fuzzy Relation Trust Model in P2P System. In: International Conference on Computation Intelligence and Security, vol. 2, pp. 1497–1502 (2006)

    Google Scholar 

  4. Griffiths, N., Chao, K.-M., Younas, M.: Fuzzy Trust for Peer-to-Peer Systems. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems Workshops, pp. 73–78 (2006)

    Google Scholar 

  5. Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P Transactions with Fuzzy Reputation Aggregation. IEEE Internet Computing 9(6), 24–34 (2005)

    Article  Google Scholar 

  6. Singh, A., Liu, L.: TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. In: Proceedings of the Third International Conference on Peer-to-Peer Computing, pp. 142–149 (2003)

    Google Scholar 

  7. Xiao, L., Xu, Z., Zhang, X.: Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 14(9), 829–840 (2003)

    Article  Google Scholar 

  8. Nandan, A., Pau, G., Salomoni, P.: GhostShare – Reliable and Anonymous P2P Video Distribution. In: IEEE Global Telecommunications Conference Workshops, pp. 200–210 (2004)

    Google Scholar 

  9. Mee, J., Watters, P.A.: Detecting and Tracing Copyright Infringements in P2P Net-works. In: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, pp. 60–65 (2006)

    Google Scholar 

  10. Chen, K., Deng, Q.: Legitimate Peer-to-Peer Content Distribution Network. In: Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops (2006)

    Google Scholar 

  11. Schmucker, M., Ebinger, P.: Promotional and Commercial Content Distribution based on a Legal and Trusted P2P Framework. In: Proceedings of the Seventh IEEE International Conference on E-Commerce Technology, pp. 439–442 (2005)

    Google Scholar 

  12. Chu, C.-C., Su, X., Prabhu, B.S., Gadh, R., Kurup, S., Sridhar, G., Sridhar, V.: Mobile DRM for Multimedia Content Commerce in P2P Networks. In: 2006 3rd IEEE Consumer Communi-cations and Networking Conference, vol. 2, pp. 1119–1123 (January 2006)

    Google Scholar 

  13. Neelima Arora, R.K., Shyamasundar, R.K.: PGSP: A Protocol for Secure Communication in Peer-to-Peer System. In: IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2094–2099 (2005)

    Google Scholar 

  14. Pathak, V., Iftode, L.: Byzantine Fault Tolerant Public Key Authentication in Peer-to-Peer Systems. Computer Networks. Special Issues on Management in Peer-to-Peer Systems: Trust, Reputation and Security 50(4), 579–596 (2006)

    MATH  Google Scholar 

  15. Palomar, E., Estevez-Tapiador, J.M., Hernandez-Castro, J.C., Ribagorda, A.: Certificate-based Access Control in Pure P2P Networks. In: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing, pp. 177–184 (2006)

    Google Scholar 

  16. Pestoni, F., Lotspiech, J.B., Nusser, S.: xCP: Peer-to-Peer Content Protection. IEEE Signal Processing Magazine 21(2), 71–81 (2004)

    Article  Google Scholar 

  17. Zhou, Y.C., Cerruti, J.A., Ma, L., Ma, L., Myles, G.: CPWCT: Making P2P Home Network Secure Virtual Multimedia Device. In: Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (2005)

    Google Scholar 

  18. Fiat, A., Naor, M.: Broadcast Encryption. In: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp. 480–491 (August 1994)

    Google Scholar 

  19. Lotspiech, J., Nusser, S., Pestoni, F.: Broadcast Encryption’s Bright Future. Computer 35(8), 57–63 (2002)

    Article  Google Scholar 

  20. Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Horace H.-S. Ip Oscar C. Au Howard Leung Ming-Ting Sun Wei-Ying Ma Shi-Min Hu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y., Yuan, C., Zhong, Y. (2007). Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77255-2_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77254-5

  • Online ISBN: 978-3-540-77255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics