Key management in digital rights management systems in offline mode
Subject Areas : Generalnafiseh shafiee 1 , مهدی شجری 2
1 -
2 -
Keywords:
Abstract :
Considering the expansion of the use of digital rights management systems, the use of methods such as encryption and encryption, although they have advantages, but they do not meet the requirements of the aforementioned systems responsible for the safe distribution of digital content. In this regard, the need for an alternative or hybrid method to protect digital content from the production stage to the transfer and storage of data in digital rights management systems is undeniable. In this paper, we have proposed a model to improve the performance of digital rights management systems, which is based on multi-part cryptography and not only monitors and controls the publication and distribution of documents, but also by using distinct and unique data in key generation. It also effectively prevents copying. The main difference between the proposed approach and other methods used in this field is the use of obfuscation technique in order to protect the key generation algorithm against reverse engineering attacks. The proposed system covers more security criteria compared to the existing systems in the field of digital rights management.
1. A.C.Prihandoko, B.Litow, H.Ghodosi, “DRM’s rights protection capability: a review”, International Conference on Computational Science and Information Management, 2012.
2. J.He, H.Zhang, “Digital Right Management Model Based on Cryptography and Digital Watermarking”, International Conference on Computer Science and Software Engineering, 2008.
3. C. L.Pimentel. R.Monroy, V.F.R.Fon Bon, “Symmetric Cryptography Protocol for Signing and Authenticating Digital Documents”, Springer-Verlag, Berlin Heidelberg, pp. 9–23, 2011.
4. L.Zheng, L.Feng, Y.Li, X.Cheng, “Research on Digital Rights Management Model for Spatial Data Files”, 2nd International Conference on Information Engineering and Computer Science (ICIECS), Vol. 4, 2010.
5. A.M.Eskicioglu, “Key Management for Multimedia Access and Distribution” from “Multimedia Security Technologies for Digital Rights Management”, ISBN: 9780-0-12-369476, Elsevier science, 2006.
6. Emilija Arsenova, MI, RWTH-Aachen, “Technical aspects of Digital Rights Management”, Seminar: Digital Rights Management.
7. Mir Mohamad Azad, “Digital Rights Management”, IJCSNS International journal of Computer Science and Network Security, November 2010.
8. Z.Zhang, “Digital Rights Management Ecosystem and its Usage Controls: A Survey”, International Journal of Digital Content Technology and its Applications, Volume 5, Number 3, March 2011.
9.M.Stamp, DIGITAL RIGHTS MANAGEMENT: THE TECHNOLOGY BEHIND THE HYPE, Journal of Electronic Commerce Research, VOL. 4, NO. 3, 2003.
10.N. Fazio, “On Cryptographic Techniques for Digital Rights Management”, New York University, Sep. 2006.
11. M.Iwakiri, T.M.Thanh, “Incomplete Cryptography Method Using Invariant Huffman Code Length to Digital Rights Management”, 26th IEEE International Conference on Advanced Information Networking and Applications, pp. 763-770, 2012.
12. T.M.Thanh, M.Iwakiri, “An Incomplete Cryptography based Digital Rights Management with DCFF”, The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, March 2013.
13. Y.Jung, J.Kim, M.Jun, “DRM Encryption System using the Key Exchange with Matrix Puzzle”, International Conference on Hybrid Information Technology, IEEE Computer Society, 2006.
14. C. L.Pimentel. R.Monroy, V.F.R.Fon Bon, “Symmetric Cryptography Protocol for Signing and Authenticating Digital Documents”, Springer-Verlag, Berlin Heidelberg, pp. 9–23, 2011.
15. R.Dutta, S.Mukhopadhyay, T.Dowling, “Key Management in Multi-Distributor based DRM System with Mobile Clients using IBE”, Applications of Digital Information and Web Technologies, Second International Conference on the, pp. 597 – 602, 2009.
16. A.Izumi, Y.Ueshige, K.Sakurai, “A proposal of efficient scheme of key management using ID-based encryption and Biometrics”, International Conference on Multimedia and Ubiquitous Engineering, 2007.
17. E.Chang, K.H.Huang, A.B.Lu, F.Lai, “Enterprise Digital Rights Management System based on Smart Card”, IEEE 15th International Symposium on Consumer Electronics, pp. 363-368, 2011.
18. A.Yu, D.Feng, R.Liu, “TBDRM: A TPM-Based Secure DRM Architecture”, 2009 International Conference on Computational Science and Engineering.