Skip to main content
Log in

Redistributing time-based rights between consumer devices for content sharing in DRM system

  • regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Device-based digital rights management (DRM) systems tightly bind rights for content to a device. However, it can decrease the consumers’ convenience because it disturbs consumers who want to use the already purchased content with their other devices freely. Previous research into solving this problem still have burdens such as restricting the number of devices that a consumer can use and requiring a special device that manages content sharing. In this paper, we propose a new rights sharing scheme which does not restrict the number of devices that a consumer can use and does not require a specialized device. In our scheme, the right to use content is represented as the right to use the content for a certain amount of time. Consumers can use the content with any of their devices by redistributing the usage amount of time between devices. The redistribution process only requires local synchronization among participating devices. To prevent illegal content sharing and to detect illegally increased content usage time, the amount of time that a consumer can have is limited and the rights for each unit of time has a unique number to prevent illegal duplications. We present data structures and protocols, analyze security properties of our scheme, compare our scheme with related work, and evaluate our scheme through implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Cena, G., Bertolotti, I.C., Valenzano, A., Zunino, C.: Analysis of response times in 802.11 industrial networks. In: Proceedings of 2007 5th IEEE International Conference on Industrial Informatics, pp. 195–200 (2007)

  2. Chor B., Fiat A., Naor M., Pinkas B.: Tracing traitors. IEEE Trans. Inf. Theory 46(3), 893–910 (2000)

    Article  MATH  Google Scholar 

  3. Diehl, E., Furon, T.: ©watermarking: Closing the analog hole. In: Proceedings of the 2003 IEEE International Conference on Consumer Electronics, pp. 52–53 (2003)

  4. ISO/IEC FDIS 21000-5:2003(E): Information technology: Multimedia framework. Part 5: rights expression language

  5. Koenen R.H., Lacy J., Mackay M., Mitchell S.: The long march to interoperable digital rights management. Proceedings of the IEEE 92(6), 883–897 (2004)

    Article  Google Scholar 

  6. Koster, P., Kamperman, F., Lenoir, P., Vrielink, K.: Identity based DRM: Personal entertainment domain. In: Proceedings of Communications and Multimedia Security, vol. LNCS 3677, pp. 42–54 (2005)

  7. Kundur D., Karthik K.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 92(6), 918–932 (2004)

    Article  Google Scholar 

  8. Lee W., Wu W., Chang C.: A portable DRM scheme using smart cards. J. Organ. Comput. Electron. Commer. 17(3), 247–258 (2007)

    Google Scholar 

  9. Marlin Developer Community: Marlin architecture overview (2006). http://www.marlin-community.com

  10. Mulligan, D.K., Han, J., Burstein, A.J.: How DRM-based content delivery systems disrupt expectations of “personal use”. In: Proceedings of the 3rd ACM Workshop on Digital Rights Management, October 2003, pp. 77–89 (2003)

  11. Open Mobile Alliance: DRM rights expression language: Candidate version 2.1 (2007). http://www.openmobilealliance.org

  12. Open Mobile Alliance: DRM specification: Candidate version 2.1 (2007). http://www.openmobilealliance.org

  13. OpenSSL Project: http://www.openssl.org

  14. Pestoni F., Lotspiech J.B., Nusser S.: xCP: Peer-to-peer content protection. IEEE Signal Process. Mag. 21(2), 71–81 (2004)

    Article  Google Scholar 

  15. Popescu, B.C., Crispo, B., Tanenbaum, A.S., Kamperman, F.: A DRM security architecture for home networks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 1–10 (2004)

  16. The Digital Media Project: Approved document No. 3: Technical specification: interoperable DRM platform, version 3.0 (2007). http://www.dmpf.org

  17. The Open Digital Rights Language (ODRL) Initiative: http://www.odrl.net

  18. Trusted Computing Group: http://www.trustedcomputinggroup.org/home

  19. van den Heuvel, S., Jonker, W., Kamperman, F., Lenoir, P.: Secure content management in authorised domains. In: Proceedings of International Broadcasting Conference 2002, pp. 467–474 (2002)

  20. Viega J., Messier M., Chandra P.: Network Security with Open-SSL. O’Reilly & Associates, Inc., Sebastopol, CA, USA (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sangho Lee.

Additional information

This research was supported by the Ministry of Knowledge Economy (MKE), Korea, under the Information Technology Research Center (ITRC) support program supervised by the Institute for Information Technology Advancement (IITA) (IITA-2009-C1090-0902-0045).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, S., Kim, J. & Hong, S.J. Redistributing time-based rights between consumer devices for content sharing in DRM system. Int. J. Inf. Secur. 8, 263–273 (2009). https://doi.org/10.1007/s10207-009-0082-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-009-0082-5

Keywords

Navigation