Rights protection of digital content in the DRM environment
Cahya Prihandoko, Antonius (2015) Rights protection of digital content in the DRM environment. PhD thesis, James Cook University.
|
PDF (Thesis)
Download (3MB) | Preview |
Abstract
In electronic-business settings, content providers produce digital goods/services (such as, games, images, softwares, etc.) which consumers/users wish to purchase. In general, mass-production of digital goods/services is possible if an instance of the goods/services is made available. Digital Rights Management (DRM) mainly considers technological approaches to protect content providers' rights on their original products (also known as, intellectual property) against illegal reproduction of the goods/services (also known as, piracy). Due to the wide range and different types of digital goods, several DRM systems have been studied in the literature. Many existing DRM systems, however, focus on the security of the content provider and often neglect the users' privacy.
The problem statement of this thesis is devising DRM systems that protect users' privacy while content provider's security is maintained. To achieve this goal during the life-time of the digital content, we distinguish three phases/stages.
1. At the time of purchase – At this stage, user issues a request for purchasing, and payment is processed in accordance with the content provider's procedure. Protecting users' privacy is mainly achieved by minimising personal data acquisition. To construct a DRM system with this characteristic, I employ two mechanisms, namely anonymous cash and blind decryption. Anonymous cash allows anonymity of the user (similar to paying cash in daily shopping, which makes it impossible to trace the customer), while blind decryption is used to hide the identity of the purchased item (e.g., one may buy two items from video-shop without revealing their names to the shop-keeper). In this thesis, both schemes are improved to preserve security and privacy when price variation and buyer authorisation are applied in the content transaction.
2. At the time of content delivery – In daily shopping, customers possess purchased items, i.e., delivery is done directly and there is no doubt that the customer has received the goods. In electronic-business settings, however, the goods are delivered via electronic devices/channels. To make sure that unauthorised users cannot intercept the line and obtain a copy (which is identical to the original) of the goods, a common practice is to encrypt the content. Note that an unauthorised user still can intercept the line and obtain a copy of the encrypted material, but utilisation of the goods/services implies decryption of the material which is believed to be impossible by unauthorised users, while legitimate users who receive the key can decrypt the content and use it. Securing content delivery relies on the secrecy of the cryptographic keys. In this thesis, I employ two approaches, namely obfuscation and obliviousness, and present two schemes for securing content delivery in DRM systems.
3. At the time of usage – After the goods/services are delivered, decrypted, and made available to the customer/user, a dishonest/malicious user may wish to make profit by reproducing (e.g., simply generating a copy of it) and selling to others. This phase/stage of the system is the longest and more complicated. DRM systems have introduced several techniques (e.g., copyrights, watermarking, traitor tracing, etc.) to protect content providers and prevent piracy. In this project, I study these techniques and improve some of the existing techniques. First of all, I study digital watermarking that is viewed as a potential tool for preserving protection of digital content. I employ chaotic maps to construct some blind watermarking schemes and achieve perfect security of watermark. With the aid of digital watermarking and motivated by some traitor tracing schemes, I construct a traitor deterring scheme. This mechanism prevents users from constructing a pirate decoder and pirate content.
Item ID: | 39300 |
---|---|
Item Type: | Thesis (PhD) |
Keywords: | anonymous cash; blind decryption; chaotic maps; content provider's security; digital rights management; digital watermarking; DRM; oblivious content distribution; traitor deterring mechanism; traitor tracing schemes; users' privacy; white-box implementation |
Related URLs: | |
Additional Information: | For this thesis, Antonius Cahya Prihandoko received the Dean's Award for Excellence 2016. Publications arising from this thesis are available from the Related URLs field. The publications are: Cahya Prihandoko, Antonius, Litow, Bruce, and Ghodosi, Hossein (2012) DRM's rights protection capability: a review. In: Proceedings of the First International Conference on Computational Science and Information Management (ICoCSIM) (1), pp. 12-17. From: 2012 International Conference on Computational Science and Information Management (ICoCSIM), 3-5 December 2012, North Sumatera, Indonesia. Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Secure and private content distribution in the DRM environment. In: Proceedings of the Information System International Conference, pp. 659-664. From: ISICO 2013: Information System International Conference, 2-4 December 2013, Bali, Indonesia. Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Deterring traitor using double encryption scheme. In: Proceedings of the IEEE International Conference on Communication, Networks and Satellite, pp. 100-104. From: COMNETSAT 2013: IEEE International Conference on Communication, Networks and Satellite, 3-4 December 2013, Yogyakarta, Indonesia. Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2014) Blind image watermarking based on chaotic maps. IT in Industry, 2 (2). pp. 44-50. |
Date Deposited: | 17 Dec 2015 02:17 |
FoR Codes: | 08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080402 Data Encryption @ 70% 08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080499 Data Format not elsewhere classified @ 30% |
SEO Codes: | 89 INFORMATION AND COMMUNICATION SERVICES > 8903 Information Services > 890301 Electronic Information Storage and Retrieval Services @ 70% 89 INFORMATION AND COMMUNICATION SERVICES > 8903 Information Services > 890399 Information Services not elsewhere classified @ 30% |
Downloads: |
Total: 781 Last 12 Months: 41 |
More Statistics |