A four-layer model for security of digital rights management

Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This complexity induces also that there is not one unique modeling of DRM. Each model should help to compare different DRM systems and easily highlight the differences and the similarities between them. One of the weaknesses of the current models is that none puts specifically the focus on the most important characteristics of DRM: protection of content and rights management. We propose a four-layer model that complements traditional ones. Using trust layer, rights management layer, rights enforcement layer, and content protection layer, this model is security oriented. It is suitable to describe any content protections such as DRM, conditional access, copy protection or even pre-recorded content protection systems.

[1]  Eric DIEHL,et al.  /spl copy/ watermark: closing the analog hole , 2003, 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE..

[2]  Carl A. Gunter,et al.  Models and languages for digital rights , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[3]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[4]  Renato Iannella,et al.  Digital Rights Management (DRM) Architectures , 2001, D Lib Mag..

[5]  Cheun Ngen Chong Experiments in rights control : expression and enforcement , 2005 .

[6]  Pramod A. Jamkhedkar,et al.  DRM interoperability analysis from the perspective of a layered framework , 2005, DRM '05.

[7]  Pramod A. Jamkhedkar,et al.  DRM as a layered system , 2004, DRM '04.

[8]  Stephen Mooney,et al.  Digital Rights Management: Business and Technology , 2001 .

[9]  Andrew Hutchison,et al.  Persistent access control: a formal model for drm , 2007, DRM '07.

[10]  Niels Rump Definition, Aspects, and Overview , 2003, Digital Rights Management.

[11]  Ivar Jacobson,et al.  The Unified Modeling Language User Guide , 1998, J. Database Manag..

[12]  Susanne Guth Interoperability of DRM systems: exchanging and processing XML based rights expressions , 2006 .

[13]  Title,et al.  Medianet : A framework to unify different distribution channels , .

[14]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[15]  Xin Wang,et al.  XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.

[16]  Pieter H. Hartel,et al.  Comparing Logic-Based and XML-Based Rights Expression Languages , 2003, OTM Workshops.

[17]  Borko Furht,et al.  Multimedia Encryption and Watermarking (Multimedia Systems and Applications) , 2005 .

[18]  Bart De Decker,et al.  Towards a software architecture for DRM , 2005, DRM '05.

[19]  Borko Furht,et al.  Multimedia encryption and watermarking , 2005, Multimedia systems and applications.

[20]  Dirk Günnewig,et al.  Digital Rights Management , 2005, Wirtsch..

[21]  Steve Mitchell,et al.  The long march to interoperable digital rights management , 2004, Proceedings of the IEEE.

[22]  Bruce Schneier,et al.  Mod n Cryptanalysis, with Applications Against RC5P and M6 , 1999, FSE.