Usage Control Model for Digital Rights Management in Digital Home Networks

The free distribution, unauthorized usage, and illicit sharing of copyrighted digital contents have become a common phenomenon with the rapid triple-play progress. The digital home network (DHN) is confronted with the open issue of digital rights management, and there is a lack of a formalized usage control model as well as some killer applications. The paper proposes a role-based cross-domain usage control model called the RCDUCM for DHN, which embraces two primary features of both role-based access control and security domain constraint management. RCDUCM is visually modeled by Unified Modeling Language to shorten the gap between the theoretical model and digital rights management applications. An application case denotes that the proposed model can implement consumer-contents-device license binding and transferring, the result of which is copyright protection of purchased digital contents against malicious piracy.

[1]  Petros S. Stefaneas,et al.  Algebraic Specifications for OMA REL Licenses , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[2]  Riccardo Pucella,et al.  A Formal Foundation for ODRL , 2006, ArXiv.

[3]  Radu Sion,et al.  A personal mobile DRM manager for smartphones , 2009, Comput. Secur..

[4]  Pramod A. Jamkhedkar,et al.  A formal conceptual model for rights , 2008, DRM '08.

[5]  Mohan S. Kankanhalli,et al.  Efficient license validation in MPML DRM architecture , 2009, DRM '09.

[6]  Younho Lee,et al.  A robust and flexible digital rights management system for home networks , 2010, J. Syst. Softw..

[7]  SandhuRavi,et al.  The UCONABC usage control model , 2004 .

[8]  Mohan S. Kankanhalli,et al.  Privacy Preserving Multiparty Multilevel DRM Architecture , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[9]  Jong Kim,et al.  Redistributing time-based rights between consumer devices for content sharing in DRM system , 2009, International Journal of Information Security.

[10]  Andrew S. Tanenbaum,et al.  A DRM security architecture for home networks , 2004, DRM '04.

[11]  Zhi Tang,et al.  An Efficient Contents Sharing Method for DRM , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[12]  Kisong Yoon,et al.  DRM applied contents share in digital home , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[13]  Reihaneh Safavi-Naini,et al.  On the operational semantics of rights expression languages , 2009, DRM '09.

[14]  Nora Cuppens-Boulahia,et al.  OPA: Onion Policy Administration Model - Another approach to manage rights in DRM , 2007, SEC.

[15]  Reihaneh Safavi-Naini,et al.  Location constraints in digital rights management , 2008, Comput. Commun..

[16]  Paul Koster,et al.  Introduction of the Domain Issuer in OMA DRM , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[17]  Iván Martínez-Ortiz,et al.  The problem with rights expression languages , 2006, DRM '06.

[18]  Imad M. Abbadi,et al.  Replay Attack of Dynamic Rights within an Authorised Domain , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[19]  Paul Koster,et al.  Identity Based DRM: Personal Entertainment Domain , 2005, Communications and Multimedia Security.

[20]  Joseph Y. Halpern,et al.  A formal foundation for XrML , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[21]  Lin Yang,et al.  Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[22]  Jianfeng Ma,et al.  Security and Trust in Digital Rights Management: A Survey , 2009, Int. J. Netw. Secur..