Skip to main content

Secure Content Delivery in DRM System with Consumer Privacy

  • Conference paper
Information Security Practice and Experience (ISPEC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7863))

Abstract

Unauthorized access and illegal content distribution cause huge revenue loss to the rights holders. Digital Rights Management (DRM) is a system, which is developed to prevent illegal content consumption. To ensure authorized content consumption, most of the existing DRM systems lose consumer privacy. However, a scalable DRM system should maintain secure and flexible content distribution which can protect privacy without losing accountability. In this article, we present a secure content distribution mechanism in which involve parties mutually authenticate each other and establish secure session which offers promise for secure content delivery. Moreover, content delivery mechanism does not reveal consumers’ preferences and system learns nothing except what must be learned to achieve accountability, which ensures consumers’ privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ku, W., Chi, C.: Survey on the technological aspects of digital rights management. Information Security, 391–403 (2004)

    Google Scholar 

  2. Rosset, V., Filippin, C., Westphall, C.: A DRM architecture to distribute and protect digital contents using digital licenses. In: Proceeding of the Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop, AICT/SAPIR/ELETE 2005, pp. 422–427. IEEE (2005)

    Google Scholar 

  3. Cohen, J.: DRM and Privacy. Communications of the ACM 46(4), 46–49 (2003)

    Article  Google Scholar 

  4. Jamkhedkar, P., Heileman, G.: Digital rights management architectures. Computers & Electrical Engineering 35(2), 376–394 (2009)

    Article  MATH  Google Scholar 

  5. Zhang, Z.: Digital rights management ecosystem and its usage controls: A survey. JDCTA: International Journal of Digital Content Technology and its Applications 5(3), 255–272 (2011)

    Article  Google Scholar 

  6. Liu, Q., Safavi-Naini, R., Sheppard, N.: Digital rights management for content distribution. In: Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003, vol. 21, pp. 49–58. Australian Computer Society, Inc. (2003)

    Google Scholar 

  7. Lee, J., Hwang, S., Jeong, S., Yoon, K., Park, C., Ryou, J.: A DRM framework for distributing digital contents through the Internet. ETRI Journal 25(6), 423–436 (2003)

    Article  Google Scholar 

  8. Sachan, A., Emmanuel, S., Das, A., Kankanhalli, M.: Privacy preserving multiparty multilevel DRM architecture. In: 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, pp. 1–5. IEEE (2009)

    Google Scholar 

  9. Hwang, S., Yoon, K., Jun, K., Lee, K.: Modeling and implementation of digital rights. Journal of Systems and Software 73(3), 533–549 (2004)

    Article  Google Scholar 

  10. Thomas, T., Emmanuel, S., Das, A., Kankanhalli, M.: Secure multimedia content delivery with multiparty multilevel DRM architecture. In: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 85–90. ACM (2009)

    Google Scholar 

  11. Dutta, R., Mukhopadhyay, S., Dowling, T.: Key management in multi-distributor based DRM system with mobile clients using IBE. In: Second International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2009, pp. 597–602. IEEE (2009)

    Google Scholar 

  12. Dutta, R., Mishra, D., Mukhopadhyay, S.: Access policy based key management in multi-level multi-distributor DRM architecture. In: Joye, M., Mukhopadhyay, D., Tunstall, M. (eds.) InfoSecHiComNet 2011. LNCS, vol. 7011, pp. 57–71. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  13. Dutta, R., Mishra, D., Mukhopadhyay, S.: Vector Space Access Structure and ID Based Distributed DRM Key Management. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. CCIS, vol. 193, pp. 223–232. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  14. Sachan, A., Emmanuel, S.: DRM violation detection using consumer logs analysis. In: 2011 IEEE International Conference on Multimedia and Expo, ICME, pp. 1–6. IEEE (2011)

    Google Scholar 

  15. Chong, D., Deng, R.: Privacy-enhanced superdistribution of layered content with trusted access control. In: Proceedings of the ACM Workshop on Digital Rights Management, pp. 37–44. ACM (2006)

    Google Scholar 

  16. Yao, J., Lee, S., Nam, S.: Privacy preserving DRM solution with content classification and superdistribution. In: 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, pp. 1–5. IEEE (2009)

    Google Scholar 

  17. Perlman, R., Kaufman, C., Perlner, R.: Privacy-preserving DRM. In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, pp. 69–83. ACM (2010)

    Google Scholar 

  18. Yuan, J., Zhang, W., Zhao, F.: Content key acquisition protocols hiding the usage information in DRM system. In: 2011 IEEE 15th International Symposium on Consumer Electronics, ISCE, pp. 313–317 (2011)

    Google Scholar 

  19. Win, L., Thomas, T., Emmanuel, S.: A privacy preserving content distribution mechanism for DRM without trusted third parties. In: 2011 IEEE International Conference on Multimedia and Expo, ICME, pp. 1–6. IEEE (2011)

    Google Scholar 

  20. Mishra, D., Mukhopadhyay, S.: Towards a secure, transparent and privacy-preserving DRM system. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. Communications in Computer and Information Science, vol. 335, pp. 304–313. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  21. Mishra, D., Mukhopadhyay, S.: Privacy rights management in multiparty multilevel DRM system. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 625–631. ACM (2012)

    Google Scholar 

  22. Tsiounis, Y.: Anonymity & privacy: The internet cash example, Internet document (August 2001), http://www.internetcash.com/fgo/0,1383,white02,00.html

  23. Win, L., Thomas, T., Emmanuel, S.: Privacy enabled digital rights management without trusted third party assumption. IEEE Transactions on Multimedia 14(3), 546–554 (2012)

    Article  Google Scholar 

  24. Fan, K., Pei, Q., Mo, W., Zhao, X., Li, X.: A novel authentication mechanism for improving the creditability of DRM system. In: International Conference on Communication Technology, ICCT 2006, pp. 1–4. IEEE (2006)

    Google Scholar 

  25. Yang, Z., Fan, K., Lai, Y.: Trusted computing based mobile DRM authentication scheme. In: Fifth International Conference on Information Assurance and Security, IAS 2009, vol. 1, pp. 7–10. IEEE (2009)

    Google Scholar 

  26. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  27. Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography. Springer (2004)

    Google Scholar 

  28. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13, p. 21. USENIX Association (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mishra, D., Mukhopadhyay, S. (2013). Secure Content Delivery in DRM System with Consumer Privacy. In: Deng, R.H., Feng, T. (eds) Information Security Practice and Experience. ISPEC 2013. Lecture Notes in Computer Science, vol 7863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38033-4_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38032-7

  • Online ISBN: 978-3-642-38033-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics