ABSTRACT
In this paper we look at the problem of interoperability of digital rights management (DRM)systems in home networks. We introduce an intermediate module called the Domain Interoperability Manager (DIM) to efficiently deal with the problem of content and license translation across different DRM regimes. We also consider the threat model specific to interoperability systems, and introduce threats such as the cross-compliancy and splicing attacks. We formalize the adversary model and define security of an interoperable DRM system with respect to this adversary. We finalize by proposing detailed protocols which achieve our security requirements. In order to achieve these requirements we provide novel applications of recently proposed proxy resignature and proxy re-encryption algorithms.
- G. Ateniese, K. Fu, M. Green, S. Hohenberger, Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, NDSS, 2005. 2 With an off-line attestation protocol, connection is only sporadic.Google Scholar
- G. Ateniese, S. Hohenberger, Proxy Re-Signatures: New Definitions, Algorithms, and Applications, ACM CCS'05. Google ScholarDigital Library
- M. Blaze, G. Bleumer, M. Strauss, Divertible Protocols and Atomic Proxy Cryptography, EUROCRYPT'98.Google Scholar
- T. Hauser and C. Wenz, DRM Under Attack: Weaknesses in Existing Systems, Digital Rights Management: Technological, Economic, Legal and Political Aspects, November 2003.Google Scholar
- N. Herberger, Virgin Media versus iTunes, http://www.indicare.org/tiki-read article.php?articleId=150, October 2005.Google Scholar
- P. A. Jamkhedkar, G. L. Heileman, DRM Interoperability Analysis from the Perspective of a Layered Framework, Proceedings of the ACM Digital Rights Management workshop DRM'05, 2005. Google ScholarDigital Library
- H. L. Jonker and S. Mauw, Core Security Requirements of DRM Systems, Symposium on Information Theory in the Benelux, June 2004.Google Scholar
- R. H. Koenen, J. Lacy, M. Mackey, S. Mitchell, The Long March to Interoperable Digital Rights Management, Proceedings of the IEEE, vol 92(6), June 2004.Google Scholar
- D. W. Kravitz, T. S. Messerges, Achieving Media Portability through Local Content Translation and End-to-End Rights Management, Proceedings of the ACM Digital Rights Management workshop DRM'05, 2005. Google ScholarDigital Library
- M. Mambo, K. Usuda, E. Okamoto, Proxy Signatures: Delegation of the Power to Sign Messages, IEICETrans. Fundamentals, 1996.Google Scholar
- S. Michiels, K. Verslype, W. Joosen, B. De Decker, Towards a Software Architecture for DRM, Proceedings of the ACM Digital Rights Management workshop DRM'05, 2005. Google ScholarDigital Library
- S. K. Nair, B. C. Popescu, C. Gamage, B. Crispo, A. S. Tanenbaum, Enabling DRM-preserving Digital COntent Redistribution, IEEE Conference on E-Commerce Technology (CEC'05), 2005. Google ScholarDigital Library
- B. C. Popescu, B. Crispo, A. Tanenbaum, F. Kamperman, A DRM Security Architecture for Home Networks, Proceedings of the ACM Digital Rights Management workshop DRM'04, 2004. Google ScholarDigital Library
- R. Safavi-Naini, N. P. Sheppard, T. Uehara. Import/Export in Digital Rights Management, Proceedings of the ACM Digital Rights Management workshop DRM'04, 2004. Google ScholarDigital Library
- A. U. Schmidt, O. Tafreschi, R. Wolf, Interoperability Challenges for DRM Systems, IFIP/GI Workshop on Virtual Goods, Ilmenau (Germany), May 2004.Google Scholar
- Z. Tan, Z. Liu, Provably Secure Delegation-by-Certification Proxy Signature Schemes, ACM International Conference on Information Security, 2004. Google ScholarDigital Library
- Susan Wegner, Prototype Description of an Open DRM Architecture, OPERA-Interoperability of Digital Rights Management Technologies, EURESCOM project report, December 2003.Google Scholar
- DVB - The Digital Video Broadcasting Consortium. http://www.dvb.org/Google Scholar
- Hymn Project. http://hymn-project.org/Google Scholar
- iTunes FairPlay. http://www.apple.com/lu/support/itunes/authorization.htmlGoogle Scholar
- Open Mobile Alliance. http://www.openmobilealliance.org/Google Scholar
- Secure Digital Container. http://www.digicont.com/Google Scholar
- Sharpmusique. http://www.nanocrew.net/Google Scholar
- Trusted Computing Group, Trusted Computing Platform Alliance Main Specification, February 2002, Version 1.1b, http://www.trustedcomputinggroup.orgGoogle Scholar
- Microsoft Windows Media Rights Manager. http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspxGoogle Scholar
- Windows Media DRM, wikipedia entry. http://en.wikipedia.org/wiki/Windows Media DRMGoogle Scholar
- Can we learn from Apple's success with iTunes Music services?. http://www.dk.capgemini.com/NewsmailSystem/Telecom/Ver1/Documents/ITunes.shtml.Google Scholar
- Intertrust's Coral and Marlin. http://www.intertrust.com/main/research/initiatives.htmlGoogle Scholar
- MPs in digital downloads warning. http://news.bbc.co.uk/2/hi/technology/5041684.stmGoogle Scholar
- http://www.coral-interop.org/Google Scholar
- Advanced access content system. http://www.aacsla.com/homeGoogle Scholar
- PachyDRM. http://www.pachydrm.com/Google Scholar
- The Informed Dialogue about Consumer Acceptability of DRM Solutions in Europe (INDICARE), "Consumer Survey on Digital Music and DRM", May 2005, www.indicare.org/surveyGoogle Scholar
Index Terms
- Towards a secure and interoperable DRM architecture
Recommendations
Towards a software architecture for DRM
DRM '05: Proceedings of the 5th ACM workshop on Digital rights managementThe domain of digital rights management (DRM) is currently lacking a generic architecture that supports interoperability and reuse of specific DRM technologies. This lack of architectural support is a serious drawback in light of the rapid evolution of ...
Secure interoperable digital content distribution mechanisms in a multi-domain architecture
Current DRM systems use the Authorized Domain concept to allow sharing of DRM-enabled multimedia contents across multiple devices. However, some devices in an authorized domain may support only a limited number of DRM systems of the content providers ...
Fairer usage contracts for DRM
DRM '05: Proceedings of the 5th ACM workshop on Digital rights managementDRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond the restrictions provided by copyright laws. In this paper we argue that ...
Comments