Digital Rights Management for Untrusted Peer-to-Peer Networks

Digital Rights Management for Untrusted Peer-to-Peer Networks

Pallavi Priyadarshini (San Jose State University, USA) and Mark Stamp (San Jose State University, USA)
Copyright: © 2009 |Pages: 32
DOI: 10.4018/978-1-60566-262-6.ch006
OnDemand PDF Download:
$37.50

Abstract

Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and ease of content dissemination of such networks presents a potentially lucrative opportunity. However, content creators have been reluctant to adopt P2P networks as a distribution vehicle since these networks are plagued with piracy. This chapter focuses on developing a solution for distributing digital content in P2P networks in a way that established businesses and amateur artists alike can profit. We propose a content distribution system that employs Digital Rights Management (DRM) technologies and is independent of the underlying P2P network. Our system relies on innovative uses of security technologies to deter piracy. In addition, we include various non-technical features that encourage users to “play by the rules”.
Chapter Preview
Top

Introduction

Due to the Internet, there has been an exponential increase in the volume of digital content available to consumers. Apple iTunes (Distributed Computing Industry Association 2004) and YouTube (2006) exemplify the paradigm shift in music and video distribution. Users are increasingly obtaining digital content through downloads. Given the tremendous popularity of digital content, exploring new channels to enable content distribution and creating new non-traditional marketplaces is a logical step forward.

P2P networks are currently popular vehicles for digital content distribution. With the continued proliferation of P2P networks such as Kazaa (2006) and Gnutella (Gnutella clients 2006, Gnutella 2006), industry and academia are beginning to realize the potential of such networks in the dissemination of digital information. However, at present, P2P networks are rife with risks of copyright infringement. P2P networks lack many of the security features inherent in client-server networks that can be used to protect the rights of content owners.

This chapter focuses on exploring solutions that enable large-scale distribution of digital content in P2P networks such that intellectual property rights are not violated and the content creators are able to collect profits. We augment the basic distribution of content from creators to consumers with distribution through authorized resellers. As part of our distribution model, we apply appropriate digital rights management (DRM) technologies to the content in an effort to ensure that the P2P networks benefit creators and legitimate customers, not just pirates.

This chapter is organized as follows. Section 2 gives relevant background information on P2P networks and DRM technologies. In particular, we describe the requirements of a DRM system that is suitable for P2P networks. We also outline the design goals for our system. This section concludes with a brief review of related work.

Section 3 provides the detailed design of our proposed system. We include justification of our design decisions. We also provide a description of the system architecture and the functional flow in our proposed system. Section 4 includes the implementation details of the components of our system. We do not cover the details of the security-related features, which are discussed in the subsequent section. Section 5 covers the security features in the proposed system. We discuss the implementation aspects and analyze the strengths and weaknesses of each significant security feature.

In Section 6 we consider the testing of our working prototype system. This section illustrates the underlying functionality of the prototype by going through the steps of a sample use case in detail. We conclude the chapter with Section 7 where we summarize the achievements of the project and present various ideas that could be developed as extensions of this project.

Key Terms in this Chapter

Digital Content: Consists of goods (such as music, video, software, books and documents) that have been converted into an electronic format (digitized) to be used on a computer and delivered via a computer network.

Reselling: The distribution of both digital and non-digital goods by intermediaries who are authorized by the original owners to re-distribute for a share of profits.

BOBE Resistance: Refers to the ability of a DRM system to remain usable in spite of successful attack on individual pieces of content.

Encryption: Deals with the transformation of content into an unreadable form by using well-known algorithms based on some confidential information (i.e., a key).

Content Wrapper: Consists of content that has been packaged with additional items such as authentication information and advertisements.

License: Refers to the consent granted by an owner of an object that enables an end-user to legitimately use that object (e.g., authenticate and make payments to obtain a license to play audio file).

Scrambling: The transformation of content into an unreadable form by using a proprietary algorithm.

Digital Rights Management: Consists of the rules that can be enforced at the various stages of digital content delivery and use.

Transaction Security: Refers to the safety of confidential information when multiple entities communicate to complete a transaction (e.g., credit card payment).

Peer-to-peer Network: A network in which the computer nodes are connected in an ad-hoc manner, with each node able to act as client and server. This is in contrast to a traditional client-server network in which all computers communicate with a central server.

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Foreword
Borko Furht
Preface
Shiguo Lian, Yan Zhang
Acknowledgment
Shiguo Lian, Yan Zhang
Chapter 1
Pramod A. Jamkhedkar, Gregory L. Heileman
Rights expression languages (RELs) form a central component of digital rights management (DRM) systems. The process of development of RELs... Sample PDF
Rights Expression Languages
$37.50
Chapter 2
Deepali Brahmbhatt, Mark Stamp
This chapter presents a digital rights management (DRM) system designed for streaming media. A brief, general introduction to DRM is also provided... Sample PDF
Digital Rights Management for Streaming Media
$37.50
Chapter 3
Jean-Henry Morin
This chapter introduces and discusses much needed alternatives to the traditional either/or debate on total security of secure multimedia... Sample PDF
Rethinking DRM Using Exception Management
$37.50
Chapter 4
Mercè Serra Joan, Bert Greevenbosch, Anja Becker, Harald Fuchs
This chapter gives an overview of the Open Mobile AllianceTM Digital Rights Management (OMA DRM) standard, which allows for the secure distribution... Sample PDF
Overview of OMA Digital Rights Management
$37.50
Chapter 5
Hugo Jonker, Sjouke Mauw
The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider, and the user... Sample PDF
Discovering the Core Security Requirements of DRM Systems by Means of Objective Trees
$37.50
Chapter 6
Pallavi Priyadarshini, Mark Stamp
Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and... Sample PDF
Digital Rights Management for Untrusted Peer-to-Peer Networks
$37.50
Chapter 7
L. Badia, A. Erta, U. Malesci
Traditional analog video surveillance systems technology has recently become inadequate to face the massive demand of security systems consisting of... Sample PDF
Pervasive Video Surveillance Systems Over TCP/IP Networks
$37.50
Chapter 8
Ramya Venkataramu, Mark Stamp
Digital Rights Management (DRM) technology is used to control access to copyrighted digital content. Apple employs a DRM system known as Fairplay in... Sample PDF
P2PTunes: A Peer-to-Peer Digital Rights Management System
$37.50
Chapter 9
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
This chapter advocates the convergence between Access Control (AC) models, focusing on the granularity of sharing, and Digital Right Management... Sample PDF
A Hardware Approach for Trusted Access and Usage Control
$37.50
Chapter 10
Ionut Florescu
Regarding fundamental protocols in cryptography, the Diffie-Hellman (Diffie and Hellman, 1976) public key exchange protocol is one of the oldest and... Sample PDF
A Summary of Recent and Old Results on the Security of the Diffie-Hellman Key Exchange Protocol in Finite Groups
$37.50
Chapter 11
Guojun Wang, Yirong Wu, Geyong Min, Ronghua Shi
Secret sharing aims at distributing and sharing a secret among a group of participants efficiently. In this chapter, we propose a plane-based access... Sample PDF
Secret Sharing with k-Dimensional Access Structure
$37.50
Chapter 12
Supavadee Aramvith, Rhandley D. Cajote
Presently, both wireless communications and multimedia communications have experienced unequaled rapid growth and commercial success. Building on... Sample PDF
Wireless Video Transmission
$37.50
Chapter 13
M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza
Establishing hidden communication is an important subject of discussion that has gained increasing importance recently, particularly with the... Sample PDF
A Survey of Information Hiding
$37.50
Chapter 14
Fan Zhang
The digital multimedia, including text, image, graphics, audio, video, and so forth, has become a main way for information communication along with... Sample PDF
Digital Watermarking Capacity and Detection Error Rate
$37.50
Chapter 15
Digital Watermarking  (pages 277-297)
Aidan Mooney
As Internet usage continues to grow, people are becoming more aware of the need to protect the display and presentation of digital documents.... Sample PDF
Digital Watermarking
$37.50
Chapter 16
Pradeep K. Atrey, Abdulmotaleb El Saddik, Mohan Kankanhalli
Digital video authentication has been a topic of immense interest to researchers in the past few years. Authentication of a digital video refers to... Sample PDF
Digital Video Authentication
$37.50
Chapter 17
Tieyan Li
The multimedia community is moving from monolithic applications to more flexible and scalable proliferate solutions. Security issues such as access... Sample PDF
Flexible Multimedia Stream Authentication
$37.50
Chapter 18
K-G Stenborg
Media that is distributed digitally can be copied and redistributed illegally. Embedding an individual watermark in the media object for each... Sample PDF
Scalable Distribution of Watermarked Media
$37.50
Chapter 19
Hafiz Malik
This chapter provides critical analysis of current state-of-the-art in steganography. First part of the this chapter provides the classification of... Sample PDF
Critical Analysis of Digital Steganography
$37.50
Chapter 20
Esther Palomar, Juan M.E. Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
Perhaps the most popular feature offered by Peer-to-Peer (P2P) networks is the possibility of having several replicas of the same content... Sample PDF
Secure Content Distribution in Pure P2P
$37.50
Chapter 21
Andreas U. Schmidt, Nicolai Kuntze
Security in the value creation chain hinges on many single components and their interrelations. Trusted Platforms open ways to fulfil the pertinent... Sample PDF
Trust in the Value-Creation Chain of Multimedia Goods
$37.50
Chapter 22
Goo-Rak Kwon, Sung-Jea Ko
The objective of this chapter introduces an advanced encryption of MP3 and MPEG-4 coder with a quality degradation-based security model. For the MP3... Sample PDF
Copyright Protection of A/V Codec for Mobile Multimedia Devices
$37.50
Chapter 23
Frank Y. Shih, Yi-Ta Wu
Steganography is the art of hiding secret data inside other innocent media file. Steganalysis is the process of detecting hidden data which are... Sample PDF
Digital Steganography Based on Genetic Algorithm
$37.50
Chapter 24
Guangjie Liu, Shiguo Lian, Yuewei Dai, Zhiquan Wang
Image steganography is a common form of information hiding which embeds as many message bits into images and keep the introduced distortion... Sample PDF
Adaptive Image Steganography Based on Structural Similarity Metric
$37.50
Chapter 25
Shiguo Lian
Video watermarking technique embeds some information into videos by modifying video content slightly. The embedded information, named watermark, may... Sample PDF
A Survey on Video Watermarking
$37.50
Chapter 26
Minglei Liu, Ce Zhu
Digital watermarking is a useful and powerful tool for multimedia security such as copyright protection, tamper proofing and assessment, broadcast... Sample PDF
Multiple Description Coding with Application in Multimedia Watermarking
$37.50
Chapter 27
Hsuan T. Chang, Chih-Chung Hsu
This chapter introduces a pioneer concept in which multiple images are simultaneously considered in the compression and secured distribution... Sample PDF
Fractal-Based Secured Multiple-Image Compression and Distribution
$37.50
About the Contributors