Energy Evaluation and Optimal Design of Semi-transparent ...
Transparent Digital Rights Management System with Superdistribution
Transcript of Transparent Digital Rights Management System with Superdistribution
Transparent Digital Rights Management System with Superdistribution
Chih-Ta Yen1, Hrong-Twu Laiw2, Nai-Wei Lo1*, Ting-Chun Liu1, Jay Stu3 1Department of Information Management
National Taiwan University of Science and Technology 2Department of Information Management
Shih Hsin University 3Innovative DigiTech-Enabled Applications and Services Institute
Institute for Information Industry Taiwan, Taipei
Abstract—Digital rights management allows content providers to control the distribution and usage of digital contents for their e-commerce applications. Most of previously proposed digital rights management mechanisms focus on the protection mechanisms for digital contents and pay less attention to the discussion on business models and users’ convenience. It will decrease effective distribution for digital contents and the intentions of users’ usage. With the superdistribution model, we first propose a digital rights management system that increases distribution channels to increase the efficiency of distribution for digital contents. Then, we implement the proposed digital rights management system by using the API Hook with Microsoft Foundation Classes (MFC) as a wrapper. The implemented digital rights management system can achieve content protection without sacrificing user’s convenience. In addition, the proposed digital rights management system satisfies the following requirements: description, identification, transaction, protection, monitoring, tracing, superdistribution, transparency, and portability.
Keywords-component; Digital Rights Management, API Hook, Wrapper, Transparency
I. INTRODUCTION With the rapid development of Internet and computers,
more and more digital contents including text files, audios, and videos can be distributed through public network channels. However, it is easy for a pirate to illegally copy, use and distribute those digital contents from public channels. Intentional piracy of digital contents has become a serious problem. The consequence of piracy has brought large amount of revenue loss to the digital content providers [12]. Digital Rights Management (DRM) is a mechanism which applies cryptosystem to defend against unauthorized copy or usage and protects the rights of digital content providers [8, 12]. DRM can be used to track and manage the utilization of digital contents, including copy permission, distribution, and legal issues.
In 2001, Iannella [9] proposed a DRM architecture, and the architecture describes how core entities interact with each other to protect a digital content and its distribution. The architecture points out that a successful DRM must consider
both content protection and content distribution. Since then, a variety of research works have been published [2-3, 5, 7-8, 10-11, 13-14, 18-21, 24-26. 28]. However, most of them only focus on content protection and do not consider effective content distribution in order to earn more profits.
Liaw et al. [13] provided a complete digital rights management process design. However, they do not specify any method for offline tracking. Furthermore, their mechanism does not support rights transfer and the rights revoking as they package all files including digital contents, rights expression language, and monitor module into a single protected file. Their mechanism does not support superdistribution either.
Sun et al. [24] introduced an improved system to rectify privacy deficiencies of the identity-based DRM system proposed by Conrado. Moreover, their system retains users’ privacy by removing the relationship between users and digital contents. Nonetheless, they only mentioned that digital contents are protected by using secure memory and their work does not monitor the use of digital contents.
Sun et al. [25] designed a ticket based DRM to solve user privacy problem. Although their scheme introduces a new role as service provider and uses the ticket issuing mechanism to protect users’ privacy, this system may encounter unavailability problem and require enormous computing cost from users as it consumes considerable computing power to perform a partial blind signature mechanism.
In view of currently existing multimedia application systems, such as Windows Media Rights Manager, iTunes, Adobe Systems, the vendors only support their own digital content types and thus do not offer system transparency for the sake of users’ convenience. System transparency is an important feature for users who can use a new system without changing their using behaviors and habits [27].
A successful DRM system heavily relies on its support capability to business models of digital content providers as well as potential customers. In 1990, Mori and Kawahara [18] introduced the concept and architecture of superdistribution for software distribution. Under such architecture, the chosen target of software can be available
2010 International Conference on Broadband, Wireless Computing, Communication and Applications
Unrecognized Copyright Information
DOI 10.1109/BWCCA.2010.110
435
2010 International Conference on Broadband, Wireless Computing, Communication and Applications
Unrecognized Copyright Information
DOI 10.1109/BWCCA.2010.110
435
2010 International Conference on Broadband, Wireless Computing, Communication and Applications
978-0-7695-4236-2/10 $26.00 © 2010 IEEE
DOI 10.1109/BWCCA.2010.110
435
2010 International Conference on Broadband, Wireless Computing, Communication and Applications
978-0-7695-4236-2/10 $26.00 © 2010 IEEE
DOI 10.1109/BWCCA.2010.110
435
freely in various distribution channels without restriction in an encrypted format. Lately, Hwang [8] successfully employed superdistribution into the design of a DRM system for digital contents in a more creative and effective manner [12, 15]. A DRM system with superdistribution has the advantages of increasing distribution channels, reducing costs, and forming strong partner networks [12, 15-16]. Thus, a DRM system is successful if the following requirements are satisfied [8, 12, 15-16, 18, 23]: Description: For consumers to know what the digital content is before they buy it, content information description and preview should be provided in the system. Identification: A digital content must be uniquely identified. Thus, each digital content should be assigned a unique number. Transaction: To support transactions of the protected digital content, various transaction processes should be defined or provided. Protection: Only an authenticated consumer can use the corresponding digital content. In our system design, cryptosystem is adopted to encrypt the digital content and only legal and authenticated user owns the decryption key. Monitoring: To assure every action from a user is valid, a DRM system should provide monitoring feature. In our system, API HOOK technique is adopted to monitor consumer’s behaviors on content usage. Tracing: Content provider may want to know how consumers use purchased digital contents, so the system should be able to transfer usage records of consumers from their devices to the content provider. Superdistribution: It can increase the distribution channels when a DRM system supports superdistribution. In our system, we separate content usage license from the content itself to facilitate content distribution. Transparency: In our system API HOOK is implemented to achieve monitoring feature and allows consumers to keep using his favor media player. Portable: In our system, online authentication and smart card authentication mechanisms are provided for consumers to use contents in different devices.
In this paper, we propose a novel DRM system that adopts the superdistribution model to increase distribution channels and consequently support more versatile business models. We also implement a prototype for the proposed DRM system using the API Hook technique from Microsoft Foundation Classes (MFC) as a software wrapper to achieve system transparency and provide user’s convenience. Note that our implementation is under Windows 32-bit platform.
II. THE PROPOSED THEME In this paper, we propose a secure, fair and effective
DRM system to support the distribution and management of digital contents through Internet.
Our system model is shown in Fig. 1 and stakeholders of this whole system model are introduced as follows.
Consumer (C): A consumer who utilizes this system is to consume digital contents. A consumer buys digital contents from the digital content rights issuing management platform, and then completes the payment. Later, the consumer can
download the digital contents and obtain the license. Following this, the consumer enjoys his digital contents and can distribute digital contents or get digital contents through superdistribution.
Certificate Authority (CA): CA is the TTP of this mechanism. Its services are as follows: registration of applicants, licenses issuing, licenses revoking, and licenses management. Moreover, it will store evidence during the process of transactions for future judgment should arguments occur.
Digital Content Provider (CP): His alias is the provider. His major tasks are to provide contents produced by the government or publishers and to digitalize authors’ works. Then, he provides these digital contents for distribution.
Digital Content Rights Issuing Management Platform (MP): Its alias is management platform and its services are (1) providing a website to advertise and market providers’ digital contents. This website must contain functions that include flexibility with regard to transaction, licenses issuing, and tracing (2) identifying banks, consumers, and providers. Moreover, it serves as a bridge and manages cash flow.
Bank (BK): Providing financial transactions and related business.
BK CA
CP MP
C1
Protected Content
Superdistribution
C2
C3
Protected LicenseBuy license
Figure 1. The proposed DRM system model
The following describes the detailed processes of our mechanism. Our mechanism contains seven phases: Initial Phase, Superdistirbution Phase, Content Selection and Authentication Phase, Flexible Payment Phase, License Issuing Phase, Tracking Phase, License Reissuing Phase. We show system notations in this paper as follows:
IDX: Identity of user X PW: Password TIDX: Temporary identity generated with KryptoKnight PM: The selected method of payment DIDX: Serial number of X’s device. The device may be
CPU, smart card, etc. MID: MP’s Server ID PID: CP’s Server ID DCSN: Serial number of the digital content L: License of the digital content tk: Verification code of the license SigX: Signature with key X EX: Encryption with key X UR: Grants of the digital content UD: The use data of the consumer GMX: Rates of X APX: Accounts payable of X
436436436436
t: Timestamp of license issuing time r: Random number MG: Money Guarantee TOX: Success message of X’s transaction CON: A digital content CON_S: A sample of CON OD: Other data describes CON DRM_CON: A protected digital content, including DRM
controller CertX: Certificate of X
Initial Phase During the initial phase, all participants within this
mechanism must register with CA and request certificates. After registration, CP decides on marketing and basic grants for superdistribution. If consumers wish enjoy these digital contents, they must register MP by sending a self certificate, device serial number or smart card. Then, CP registers his content as the following step: Message 1-1, CP MP: URCONIDPP ||||
CP transfers his grants of digital contents in XrML format and sends the digital contents and XrML to MP through a secure channel. MP saves the above information upon receiving it. Figure 2 shows the processes for uploading.
CP MP
2. Save
Figure 2. The upload content process of Initial Phase
Superdistribution Phase Potential consumer CN can receive a protected digital
content shared by original consumer CO through emails, instant messages, or P2P connections. CN can test the content with the basic grants. If CN is interested, he can buy the content through a DRM controller.
MP
CO CN
2. Enjoying the contentwith basic license
Figure 3. Superdistribution Phase
Content Selection and Authentication Phase After the consumer finishes registration and receives the
certificate, he can browse the website of MP or get the content by superdistribution to find contents of interest. Message 3-1, C MP: DCSN
The Consumer C sends a request containing the identity of the desired content and the desired grants to MP. Message 3-2, MP C:
)(||||_|||| MPPK UEODSCONURDCSNC
MP decides upon a temporary private key dMP and generates a public key UMP with Elliptic Curve Diffie-Hellman (ECDH). Next, MP sends the encrypted message PKC to C.
Gd U MPMP =
CP
C
3. Generatetemporary ID
5. Check the DIDis in the DB
Figure 4. Content Selection and Authentication Phase
Message 3-3, C MP: )||||( PMTIDDCSNE CPKMP
C receives the message and checks the content. If the message is correct, C decides upon a temporary private key dC and generates the private key UC with ECDH[1]. Next, C generates a temporary identity TIDC with KryptoKnight[17].
GdUd CCC =, )||||||( CCCCMPPKC UDIDUIDUETID
MP⊕=
Then, C sends the message to MP, including TIDC, the serial number of the content, and the payment method. The payment method may be credit transfer, micro-payment, or credit card payment.
Finally, MP decrypts the message with his own private key. Then, MP identifies C by checking the Database (DB) to see if it has TIDC or not. The process maintains the anonymity of consumers by using a temporary identity that does not involve the personal information of C to avoid the consumers’ privacy leaking. Flexible Payment Phase
Consumers can buy licenses from online services after authentication. Figure 5 shows the details of the processes: Message 4-1, C MP:
)||)||||(((|||||| MPCMPMPKMP CertUUrHSigEPMDCSNU MP decides the temporary private key dMP and generates
a public key UMP with ECDH after C requests the desired digital content. Then, MP selects a random number r and generates a session key K ( )||( rUdHK CMP= ) between MP and C by hashing. After this, MP sends the encrypted messages to C. Message 4-2, MP C:
)||)||||((( PMCertUUHSigE CMPCCK C can generate the same session key K
( )||( rUdHK MPC= ) of MP by using the parameter sent by MP and check the validity after receiving a message from
437437437437
MP. After checking the validity of K, C returns the related message as a response to MP.
BK CP MP
C
8. Charge
1. Compute session key K
3. Verify andcompute K
Figure 5. Flexible Payment Phase
Message 4-3, MP BK: )||(|||| CCPK AMIDEPMDCSN
BK
MP sends the related message to BK for payment, including the serial number of the content, the payment method, the identity, and the payment amount. Message 4-4, BK C: )||(|| CCPK TOIDEDCSN
MP
Message 4-5, BK MP: )||(|| CCPK TOIDEDCSNMP
When completing the transaction, BK sends a successful
message to inform C and MP that the transaction has been completed, including the serial number of the content, the consumer’s identity, and the message. Message 4-6, MP BK:
)||||(|| MPCPCPPK GMGMIDEDCSNMP
MP sends the profit distribution agreed upon by MP and
CP to BK. BK processes the transaction after receiving the above message.
In addition, the TOC contains a hash of the serial number of the content, the consumer’s identity, and the timestamp. The above messages are also signed with BK’s private key. License Issuing Phase
After payment, the consumer can request the license so as to enjoy the content. The details of the process are shown in Figure 6: Message 5-1, C MP:
)||(|||||| CCPKC TOIDEPMDCSNUMP
C sends TOC to MP for requesting the license. At the
same time, they start to agree on the session key K. Message 5-2, MP C:
MPPKCCMPMPKMP CertLEIDUUrHSigErUC
||)(||||)||||(((||||
MP checks the validity of the TOC, it issues the license encrypted with K to C.
)}||||||)||(||(||||||||)||(||{
ODURtMIDDIDHDCSNSigODURtMIDDIDHDCSNL
CMP
C=
MP
C
6. Save token
GdUd ccc =,2. Verify and
generate key
4. Generate token
Figure 6. License Issuing Phase
Message 5-3, C MP: )||)||||((( tkLUUHSigE MPCCK C decrypts the message and receives the license and
hashes the identity of C’s device and the license as a token for checking validity in the future. Finally, C sends the token to MP and MP saves the token.
)||( LDIDHtk C= In order to avoid the confusion which results in users’
licenses being reissued if CP requests for license transferring, we do not include CP’s identity in the license. Moreover, we can protect user privacy by eliminating it in the license. Furthermore, users cannot change the grants or other information because they are signed with MP’s private key. Tracking Phase
Regardless of online or offline patterns, the DRM controller must record and trace the processes whereby users enjoy contents so as to protect the contents. Figure 7 shows the details of the process:
MP
C
1. Using DCunder DRM controller
3. Generatekey K
5. Verify K
Figure 7. Tracking Phase
Message 6-1, C MP: )||||||)||((||||( tkDCSNUDrUHSigrUE CCCPKBK
When consumers connect to the Internet and enjoy the
digital contents at the same time, the DRM controller will verify the validity of the user and usage through MP. The DRM controller sends a request for identification which includes token, using data, and information to MP. Message 6-2, MP C:
)))||||||(((||)||||((|| UDrUUHSigErUUHSigU MPCMPKMPCMPMP After MP receives the request and determines the
validity, it sends information which contains the current state
438438438438
of information and this is signed with MP’s private key to C. Then, C saves the above information. License Reissuing Phase
Consumers may lose their licenses. This mechanism allows consumers to request license reissuing. The details of the process are shown in Figure 8:
MP
C
BK
DBC DIDDID?
.3 =
7. Revoke the original license
11. Save token
1. Generatetemporary ID
3. Check the DIDis in the DB
9. Verify andcompute K
Figure 8. License Reissuing Phase
Message 7-1, C MP: CTIDPMDCSN |||| C decides the temporary private key dC and generates a
temporary public key UC with ECDH. Then, C computes the temporary identity TIDC and sends the serial number of the content, the payment method for reissuing, and TIDC to MP to request license reissuing. Message 7-2, MP BK:
)||||(|||| MPCCPK GMAMIDEPMDCSNBK
P checks the validity of DIDC by searching its DB after
receiving the request. Next, MP notifies BK that C shall pay for the amount of fees. Message 7-3, BK MP: )||(|| CCPK TOIDEDCSN
BK
BK processes the transaction and sends a message to indicate that the transaction has been completed to MP. Message 7-4, MP C:
)||)(||||)||||(((|||| MPPKCCMPMPKMP CertLEIDUUrHSigErUC
MP revokes C’s original license and computes the session key K after receiving the message showing that the transaction has been completed. Next, MP reissues the license and encrypts it with K. Then, MP sends the above to C. Message 7-5, C MP: )||)||||((( tkLUUHSigE MPCCK
C computes a session key and then generates a token. After that, C sends the token to MP. MP saves the token after receiving it.
III. IMPLEMENTATION This paper implements a sample of DRM system for
protecting digital contents. The implementation contains the following features: attainment of integrity and security by wrapping; monitoring of processes by API HOOK and description of digital rights language with the XrML format. Moreover, this system allows various authentications, including both online and offline authentication with device identity of hardware or smart card. This section provides the architecture of this system.
There are four functional modules in this system, shown in Figures 9 and 10: Digital Content (DC) Management, DC Package, DC Wrapper, and DC Rights Exchange (DCRE). Furthermore, DC Management, DC Package, and DCRE are the modules of digital content rights issuing management platform. DC Wrapper is the module of clients and it starts when we use the services of digital contents.
The following describes the functions of each module: DC Management: This module provides content uploading and rights setting, such as the printing rights, times of use, durations of use. DC Package: What providers hope for is to distribute their contents effectively in order to earn money. Furthermore, consumers must be authenticated and paid for their contents. This system decrypts digital contents to avoid unauthorized use. Moreover, we package the contents to a new file, which includes encrypted content, copyright information, rights expression language, and API HOOK module. Moreover, we support marketing grants and basic grants for supporting superdistribution as well. In addition, the above mechanism makes rights exchanging and rights revoking more easily. Besides, this implementation provides a convenient and the user-friendly interface under an API HOOK by adopting MFC. DCRE: This system supports rights exchanging and rights revoking. As mentioned before, this paper allows providers to pay more attention on business models. DC Wrapper: In this system, we adopt an API HOOK to monitor processes. In addition, consumers need not install plug-in and change their habits.
Figure 9. The modules and functions in the digital content rights
management platform
IV. CONCLUSION In this paper, a novel digital content distribution and
management system is proposed to support versatile business models. In addition, a prototype is implemented. By using API HOOK technique, the prototype can hook to existing multimedia application. Hence, users do not need to change their usage behaviors and habits on existing applications
439439439439
when getting the proposed DRM support. In other words, this prototype achieves system transparency and thereby inherits all system advantages proposed by Liaw et al. [13]. Furthermore, we propose the concept of DRM controller to solve tracing issue without the need of installing plug-in program.
Figure 10. The functions of DC Wrapper
ACKNOWLEDGMENT This research is supported by the “Digital Convergence
Service Open Platform” project of the Institute for Information Industry which is subsidized by the Ministry of Economy Affairs of the Republic of China.
REFERENCES [1] E. Barker, D. Johnson, and M. Smid, “Recommendation for Pair-
Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised),” National Institute of Standards and Technology Special Content 800-56A, 2007.
[2] R.G. Cattelan, S. He, and D. Kirovski, “Prototyping a Novel Platform for Free-trade of Digital Content,” ACM International Conference Proceeding Series, Vol. 192, 2009.
[3] C. Conrado, F. Kamperman, C.J. Schrijen, and W. Jonker, “Privacy in an Identity-based DRM System,” Workshop on Database and Expert Systems Applications, pp. 389-395, 2003.
[4] K. Coyle, “Rights Expression Languages,” Technical report, A Report for the Library of Congress, 2004, http://www.loc.gov/standards/.
[5] E. Damiani and C. Fugazza, “Toward Semantics-aware Management of Intellectual Property Rights,” Online Information Review, Vol. 31, No. 1, 2007.
[6] J. Erickson, R. Iannella, and R. Wenning, “Workshop Report,” W3C Workshop on Digital Rights Management for the Web, 2001, http://www.w3.org/2000/12/ drm-ws/workshop-report.html
[7] F.M.F Filho, J.P. de Albuquerque, and P.L. de Geus, “A service-oriented framework to promote interoperability among DRM systems,” Lecture Notes in Computer Science, Vol. 4267, Springer Berlin, pp. 124-127, 2006.
[8] S.O. Hwang, “How Viable Is Digital Rights Management,” Computer, Vol. 42, No. 4, pp. 28-34, 2009.
[9] R. Iannella, “Digital Rights Management (DRM) Architectures,” D-Lib Magazine, Vol. 7, No. 6, pp. 207-216, 2001.
[10] P.A. Jamkhedkar, G.L. Heileman, and I. Martinez-Ortiz, “Middleware Services for DRM,” Proc. of the International Conference on Communication Systems Software and Middleware, Bangalore, India, pp. 1-8, 2007.
[11] D. Kirovski and K. Jain, “Off-line Economies for Digital Media,” Proc. of the International Workshop on Network and Operating Systems Support for Digital Audio and Video, Newport, Rhode Island, 2006.
[12] W. Ku and C.H. Chi, “Survey on the Technological Aspects of Digital Rights Management,” Proc. of the 7th Information Security Conference, Vol. 3225, pp. 391-403, 2004.
[13] M.T. Liaw, J.F. Lin, W.P. Liao, S.C. Liu, and C.L. Lin, “Digital Content Right Issuing Management Practice Mechanism,” Journal of e-Business, Vol. 9, No. 2, pp. 321-352, 2007.
[14] M.T. Liaw, M.H. Guo, W.P. Liao, and L.L. Hsiao, “Digital Right Issuing Management Mechanism and Implementation Strategy,” Journal of Computer Science and Application, Vol. 3, No. 1, pp. 23-42, 2007.
[15] Q. Liu, R. Safavi-Naini, and N.P. Sheppard, “Digital Rights Management for Content Distribution,” Proc. of the Australasian Information Security Workshop Conference on ACSW Frontiers, Vol. 21, pp. 49-58, 2003.
[16] Z. Liu, B. Wang, B. Lee, and M.M. Han, “Security License Distribution Mechanism for Rights Delegation Models of Group Distribution between Consumers,” Proc. of the International Conference on Computational Science and its Applications, pp. 144-152, 2007.
[17] R. Molva, G. Tsudik, E.V. Herreweghen, and S. Zatti, “KryptoKnight Authentication and Key Distribution System,” Proc. of Second European Symposium on Research in Computer Security, Vol. 648, pp. 155-174, 1992.
[18] R. Mor, and M. Kawahara, “Superdistribution: the Concept and the Architecture,” Transactions of the Institute of Electronics and Communication Engineers of Japan, Vol. E73-E, No. 7, pp. 1133-1146, 1990.
[19] A. Muhlbauer, R. Safavi-Naini, F. Salim, N.P. Sheppard, and M. Surminen, “Location Constrains in Digital Rights Management,” Computer Communications, Vol. 31, No. 6, pp. 1173-1180, 2008.
[20] N. Nadah, M.D. Rosnay, and B. Bachimont, “Licensing Digital Content with a Generic Ontology: Escaping from the Jungle of Rights Expression Languages,” Proc. of the International Conference on Artificial Intelligence and Law, pp. 65-69, 2007.
[21] Y. Nishimoto, A. Baba, T. Kimura, H. Imaizumi, and Y. Fujita, “Advanced Conditional Access System for Digital Broadcasting Receivers Using Metadata,” IEEE Transactions on Broadcasting, Vol. 53, No. 3, pp. 697-702, 2007.
[22] A. Osterwalder and Y. Pigneur, “An ontology for e-business models,” in Value Creation from E-Business Models, Butterworth-Heinemann, 2004.
[23] B. Rosenblatt, B. Trippe, and S. Mooney, “Digital Rights Management: Business and Technology,” John Wiley & Sons, 2001.
[24] H.M. Sun, C.F. Hung, and C.M. Chen, “An Improved Digital Rights Management System Based on Smart Cards,” Proc. of the International Conference on Digital EcoSystems and Technologies, Cairns, Australia, pp. 308-313, 2007.
[25] M.K. Sun, C.S. Laih, H.Y. Yen, and J.R. Kuo, “A Ticket Based Digital Rights Management Model,” Proc. of IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, pp. 1-5, 2009.
[26] N.P. Sheppard and R. Safavi-Naini, “Protecting Privacy with the MPEG-21 IPMP Framework,” Proc. of the International Workshop on Privacy Enhancing Technologies, Vol. 4528, pp. 152-171, 2006.
[27] S. Turkle, “The second self: computers and the human spirit,” Simon & Schuster, inc., New York, NY, 1984.
[28] B. Wang and B. Lee, “A Study for License Distribution Mechanism Using Accumulated Device Identifier in DRM System,” Proc. of the International Conference on Multimedia and Ubiquitous Engineering, Seoul, Korea, pp. 1118-1123, 2007.
[29] M. Zhaofeng, Y. Yixian, and N. Xinxin, “Secure and Flexible Digital Rights Management in a Pervasive Usage Mode,” Proc. of the International Conference on Computational Intelligence and Security, pp. 863-867, 2007.
440440440440