Digital Rights Management for Untrusted Peer-to-Peer Networks

Digital Rights Management for Untrusted Peer-to-Peer Networks

Pallavi Priyadarshini (San Jose State University, USA) and Mark Stamp (San Jose State University, USA)
Copyright: © 2009 |Pages: 32
DOI: 10.4018/978-1-60566-262-6.ch006
OnDemand PDF Download:
$37.50

Abstract

Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and ease of content dissemination of such networks presents a potentially lucrative opportunity. However, content creators have been reluctant to adopt P2P networks as a distribution vehicle since these networks are plagued with piracy. This chapter focuses on developing a solution for distributing digital content in P2P networks in a way that established businesses and amateur artists alike can profit. We propose a content distribution system that employs Digital Rights Management (DRM) technologies and is independent of the underlying P2P network. Our system relies on innovative uses of security technologies to deter piracy. In addition, we include various non-technical features that encourage users to “play by the rules”.
Chapter Preview
Top

Introduction

Due to the Internet, there has been an exponential increase in the volume of digital content available to consumers. Apple iTunes (Distributed Computing Industry Association 2004) and YouTube (2006) exemplify the paradigm shift in music and video distribution. Users are increasingly obtaining digital content through downloads. Given the tremendous popularity of digital content, exploring new channels to enable content distribution and creating new non-traditional marketplaces is a logical step forward.

P2P networks are currently popular vehicles for digital content distribution. With the continued proliferation of P2P networks such as Kazaa (2006) and Gnutella (Gnutella clients 2006, Gnutella 2006), industry and academia are beginning to realize the potential of such networks in the dissemination of digital information. However, at present, P2P networks are rife with risks of copyright infringement. P2P networks lack many of the security features inherent in client-server networks that can be used to protect the rights of content owners.

This chapter focuses on exploring solutions that enable large-scale distribution of digital content in P2P networks such that intellectual property rights are not violated and the content creators are able to collect profits. We augment the basic distribution of content from creators to consumers with distribution through authorized resellers. As part of our distribution model, we apply appropriate digital rights management (DRM) technologies to the content in an effort to ensure that the P2P networks benefit creators and legitimate customers, not just pirates.

This chapter is organized as follows. Section 2 gives relevant background information on P2P networks and DRM technologies. In particular, we describe the requirements of a DRM system that is suitable for P2P networks. We also outline the design goals for our system. This section concludes with a brief review of related work.

Section 3 provides the detailed design of our proposed system. We include justification of our design decisions. We also provide a description of the system architecture and the functional flow in our proposed system. Section 4 includes the implementation details of the components of our system. We do not cover the details of the security-related features, which are discussed in the subsequent section. Section 5 covers the security features in the proposed system. We discuss the implementation aspects and analyze the strengths and weaknesses of each significant security feature.

In Section 6 we consider the testing of our working prototype system. This section illustrates the underlying functionality of the prototype by going through the steps of a sample use case in detail. We conclude the chapter with Section 7 where we summarize the achievements of the project and present various ideas that could be developed as extensions of this project.

Key Terms in this Chapter

Digital Content: Consists of goods (such as music, video, software, books and documents) that have been converted into an electronic format (digitized) to be used on a computer and delivered via a computer network.

Reselling: The distribution of both digital and non-digital goods by intermediaries who are authorized by the original owners to re-distribute for a share of profits.

BOBE Resistance: Refers to the ability of a DRM system to remain usable in spite of successful attack on individual pieces of content.

Encryption: Deals with the transformation of content into an unreadable form by using well-known algorithms based on some confidential information (i.e., a key).

Content Wrapper: Consists of content that has been packaged with additional items such as authentication information and advertisements.

License: Refers to the consent granted by an owner of an object that enables an end-user to legitimately use that object (e.g., authenticate and make payments to obtain a license to play audio file).

Scrambling: The transformation of content into an unreadable form by using a proprietary algorithm.

Digital Rights Management: Consists of the rules that can be enforced at the various stages of digital content delivery and use.

Transaction Security: Refers to the safety of confidential information when multiple entities communicate to complete a transaction (e.g., credit card payment).

Peer-to-peer Network: A network in which the computer nodes are connected in an ad-hoc manner, with each node able to act as client and server. This is in contrast to a traditional client-server network in which all computers communicate with a central server.

Complete Chapter List

Search this Book:
Reset