A DRM Interoperability Architecture Based on Local Conversion Bridge with Proxy Re-Cryptography

Article Preview

Abstract:

Various DRM standards curb users freedom to transfer and share digital contents among rendering devices. Several interoperability schemes that accommodate devices DRM compatibility have been raised through content distribution or sharing channel, these approaches are usually implemented by domain management or third party transformation services. Most of these schemes emphasize their advantages over others on trust level, security, cost, efficiency and flexibility. Our proposal integrates previous work to maintain the basic requirement of DRM system, we stick to local third party as the foundation for interoperability, we also use proxy re-encryption scheme to protect raw content from disclosure during content translation. And we try to enhance the system by bringing in three principles: security of content encryption key, fewest participants in conversion and minimum calculation requirements for end device. Finally, Statistical demonstration is presented with comparison to other schemes in our analysis to prove performance improvements.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

525-530

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A secure and mutual-profitable DRM interoperability scheme; Lee Sangho, Park Heejin; Kim, Jong; IEEE Symposium on Computers and Communications, ISCC (2010).

DOI: 10.1109/iscc.2010.5546755

Google Scholar

[2] Secure interoperable digital content distribution mechanisms in a multi-domain architecture; Win, Lei Lei; Thomas, Tony; Emmanuel, Sabu; MULTIMEDIA TOOLS AND APPLICATIONS, SEP (2012).

DOI: 10.1007/s11042-011-0802-5

Google Scholar

[3] Interoperable DRM Framework for Multiple Devices Environment; Hwang, Seong Oun; Yoon, Ki Song; ETRI JOURNAL, AUG (2008).

DOI: 10.4218/etrij.08.0107.0323

Google Scholar

[4] Towards a secure and interoperable DRM architecture; Taban, Gelareh; Cárdenas, Alvaro A.; Gligor, Virgil D; Proceedings of the ACM Workshop On Digital Rights Management, DRM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, (2006).

DOI: 10.1145/1179509.1179524

Google Scholar

[5] D. -W. Nam, J. -S. Lee, and J. -H. Kim, Interlock system for DRM interoperability of streaming contents, in Proceedings of IEEE International Symposium on Consumer Electronics 2007, ISCE (2007).

DOI: 10.1109/isce.2007.4382122

Google Scholar

[6] ISO/IEC 14496-13, Information technology: Generic coding of moving pictures and associated audio information, part 2: IPMP on MPEG-2 systems, (2002).

DOI: 10.3403/02989206

Google Scholar

[7] Barhoush, Malek; Atwood, J. William; Requirements for enforcing digital rights management in multicast content distribution; TELECOMMUNICATION SYSTEMS, SEP (2010).

DOI: 10.1007/s11235-009-9231-4

Google Scholar

[8] Improved proxy re-encryption schemes with applications to secure distributed storage Ateniese, Giuseppe; Fu, Kevin; Green, Matthew; Hohenberger, Susan; ACM Transactions on Information and System Security, (2006).

DOI: 10.1145/1127345.1127346

Google Scholar

[9] The JHU-MIT Proxy Re-cryptography Library, http: /spar. isi. jhu. edu/prl.

Google Scholar