Controlled Sharing of Personal Content using Digital Rights Management

Claudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde

2005

Abstract

This paper describes a system which allows the controlled distribution of personal digital content by users. The system extends an existing Digital Rights Management system that protects commercial copyrighted content by essentially allowing users to become content providers. This fact however makes the system vulnerable to the illegal content distribution, i.e., distribution by users who do not own the content. To solve this problem a solution is proposed which involves the compulsory registration with a trusted authority of a user’s personal content. During registration, content identity is initially checked to verify whether the content is new. If it is, the association between user identity and content is securely recorded by the authority, with users also having the possibility to remain anonymous towards any other party. In this way, the trusted authority can always verify personal content ownership. Moreover, in case the initial content identification fails and content is illegally registered, the authority can ensure user accountability.

References

  1. Apple iTunes, http://www.apple.com/itunes.
  2. T. Kalker, D. H. J. Epema, P. H. Hartel, R. L. Lagendijk, and M. van Steen, “Music2Share - Copyright-Compliant Music Sharing in P2P Systems,” Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
  3. R. Grimm and J. Nützel, “A friendly peer-to-peer file sharing system with profit but without copy protection”, in Innovative Internet Computing Systems, Lecture Notes in Computer Science, Springer-Verlag, vol. 2346, 2002, pp. 133-142.
  4. S.A.F.A. van den Heuvel, W. Jonker, F.L.A.J. Kamperman, P.J. Lenoir, “Secure Content Management In Authorised Domains”, IBC 2002, Amsterdam 2002.
  5. C. Conrado, F. Kamperman, G.J. Schrijen and W. Jonker, “Privacy in an Identity-based DRM System”, Proceedings of the 14th International Workshop on Databases and Expert Systems Applications, Prague, Czech Republic, 2003.
  6. M. van der Veen, A. Lemma, and T. Kalker, “Watermarking and Fingerprinting for Electronic Music Delivery System”, SPIE 2004, San Jose, USA.
  7. Freedom to Tinker, March 2003. http://www.freedom-to-tinker.com/archives/000317.html.
  8. A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
  9. DRM Specification V2.0, Open Mobile Alliance, OMA-DRM-DRM-V2_0-20040716-C, 2004.
Download


Paper Citation


in Harvard Style

Conrado C., Petkovic M., van der Veen M. and van der Velde W. (2005). Controlled Sharing of Personal Content using Digital Rights Management . In Proceedings of the 3rd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2005) ISBN 972-8865-25-2, pages 173-185. DOI: 10.5220/0002573101730185


in Bibtex Style

@conference{wosis05,
author={Claudine Conrado and Milan Petkovic and Michiel van der Veen and Wytse van der Velde},
title={Controlled Sharing of Personal Content using Digital Rights Management},
booktitle={Proceedings of the 3rd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2005)},
year={2005},
pages={173-185},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002573101730185},
isbn={972-8865-25-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2005)
TI - Controlled Sharing of Personal Content using Digital Rights Management
SN - 972-8865-25-2
AU - Conrado C.
AU - Petkovic M.
AU - van der Veen M.
AU - van der Velde W.
PY - 2005
SP - 173
EP - 185
DO - 10.5220/0002573101730185