Digital rights management: Model, technology and application

with rapid achievement of current information technology and computing ability and applications, much more digital content such as films, cartoons, design drawings, office documents and software source codes are produced in daily work, however to protect the content being copying, shared or deliberately stolen by inside or outside, digital rights management (DRM) became more and more important for digital content protection. In this paper, we studied various DRM model, technology and application, and first proposed DRM Security Infrastructure (DSI), in which we defined encryption, hash, signature algorithm, watermarking algorithms, authentication, usage control, trusted counter, conditional trace, secure payment, and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs, in which we proposed 6 typical classes of copyrights and content protection DRMs architecture: (1) Software-oriented DRM,(2) eBook-oriented DRM, (3) Video-oriented DRM, (4)Image-Oriented DRM (5) Unstructured data oriented DRM, (6) Text-oriented DRM. Based on the above DSI, we then proposed a dynamic DRM model selection method for various DRM application, which can be adapted dynamically for different technology of different applications, which can provide a whole solution for variant DRM development in a rapid and customized mode. The proposed DRM method, technology and application in this paper provided a common, flexible and extendable solution for variant DRM scenes, and can support rapid and customized development. Moreover, we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law, liberty and morality.

[1]  Sanjay Kadam,et al.  A network based document management model to prevent data extrusion , 2016, Comput. Secur..

[2]  Barbara Fox,et al.  Encouraging recognition of fair uses in DRM systems , 2003, CACM.

[3]  Abbas Foroughi,et al.  Digital rights management: a delicate balance between protection and accessibility , 2002, J. Inf. Sci..

[4]  Eberhard Becker,et al.  Digital rights management : technological, economic, legal and political aspects , 2003 .

[5]  Wang Lina,et al.  A distribution model for data leakage prevention , 2013, Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC).

[6]  Woei Lin,et al.  Enhanced digital rights management authentication scheme based on smart card , 2013, IET Inf. Secur..

[7]  David Forbes Lindsay,et al.  Copyright, privacy and digital rights management (DRM) , 2006 .

[8]  Marc Lemercier,et al.  The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[9]  Edward W. Felten DRM and public policy , 2005, CACM.

[10]  Hyung-Min Lim,et al.  A License Audit Model for Secure DRM Systems in IP-based Environments , 2010, J. Inf. Process. Syst..

[11]  Jinjun Chen,et al.  A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[12]  Vallipuram Muthukkumarasamy,et al.  A survey on data leakage prevention systems , 2016, J. Netw. Comput. Appl..

[13]  Willem Jonker,et al.  Privacy in an identity-based DRM system , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[14]  John S. Erickson Fair use, DRM, and trusted computing , 2003, CACM.

[15]  Qin Bo,et al.  Improving image copy-move forgery detection with particle swarm optimization techniques , 2016, China Communications.

[16]  Bill Rosenblatt DRM, law and technology: an American perspective , 2007, Online Inf. Rev..

[17]  Ta Minh Thanh,et al.  A proposal of digital rights management based on incomplete cryptography using invariant Huffman code length feature , 2013, Multimedia Systems.

[18]  E. Diehl,et al.  Copy protection system for digital home networks , 2004, IEEE Signal Processing Magazine.

[19]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[20]  Mikhail J. Atallah,et al.  Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.

[21]  Dritan Kaleshi,et al.  Securing the delivery of digital content over the Internet , 2002 .

[22]  Yuval Elovici,et al.  CoBAn: A context based model for data leakage prevention , 2014, Inf. Sci..

[23]  Thomas S. Messerges,et al.  Digital rights management in a 3G mobile phone and beyond , 2003, DRM '03.