skip to main content
10.1145/1179509.1179524acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Towards a secure and interoperable DRM architecture

Published:30 October 2006Publication History

ABSTRACT

In this paper we look at the problem of interoperability of digital rights management (DRM)systems in home networks. We introduce an intermediate module called the Domain Interoperability Manager (DIM) to efficiently deal with the problem of content and license translation across different DRM regimes. We also consider the threat model specific to interoperability systems, and introduce threats such as the cross-compliancy and splicing attacks. We formalize the adversary model and define security of an interoperable DRM system with respect to this adversary. We finalize by proposing detailed protocols which achieve our security requirements. In order to achieve these requirements we provide novel applications of recently proposed proxy resignature and proxy re-encryption algorithms.

References

  1. G. Ateniese, K. Fu, M. Green, S. Hohenberger, Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, NDSS, 2005. 2 With an off-line attestation protocol, connection is only sporadic.Google ScholarGoogle Scholar
  2. G. Ateniese, S. Hohenberger, Proxy Re-Signatures: New Definitions, Algorithms, and Applications, ACM CCS'05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Blaze, G. Bleumer, M. Strauss, Divertible Protocols and Atomic Proxy Cryptography, EUROCRYPT'98.Google ScholarGoogle Scholar
  4. T. Hauser and C. Wenz, DRM Under Attack: Weaknesses in Existing Systems, Digital Rights Management: Technological, Economic, Legal and Political Aspects, November 2003.Google ScholarGoogle Scholar
  5. N. Herberger, Virgin Media versus iTunes, http://www.indicare.org/tiki-read article.php?articleId=150, October 2005.Google ScholarGoogle Scholar
  6. P. A. Jamkhedkar, G. L. Heileman, DRM Interoperability Analysis from the Perspective of a Layered Framework, Proceedings of the ACM Digital Rights Management workshop DRM'05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. L. Jonker and S. Mauw, Core Security Requirements of DRM Systems, Symposium on Information Theory in the Benelux, June 2004.Google ScholarGoogle Scholar
  8. R. H. Koenen, J. Lacy, M. Mackey, S. Mitchell, The Long March to Interoperable Digital Rights Management, Proceedings of the IEEE, vol 92(6), June 2004.Google ScholarGoogle Scholar
  9. D. W. Kravitz, T. S. Messerges, Achieving Media Portability through Local Content Translation and End-to-End Rights Management, Proceedings of the ACM Digital Rights Management workshop DRM'05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Mambo, K. Usuda, E. Okamoto, Proxy Signatures: Delegation of the Power to Sign Messages, IEICETrans. Fundamentals, 1996.Google ScholarGoogle Scholar
  11. S. Michiels, K. Verslype, W. Joosen, B. De Decker, Towards a Software Architecture for DRM, Proceedings of the ACM Digital Rights Management workshop DRM'05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. K. Nair, B. C. Popescu, C. Gamage, B. Crispo, A. S. Tanenbaum, Enabling DRM-preserving Digital COntent Redistribution, IEEE Conference on E-Commerce Technology (CEC'05), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. C. Popescu, B. Crispo, A. Tanenbaum, F. Kamperman, A DRM Security Architecture for Home Networks, Proceedings of the ACM Digital Rights Management workshop DRM'04, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Safavi-Naini, N. P. Sheppard, T. Uehara. Import/Export in Digital Rights Management, Proceedings of the ACM Digital Rights Management workshop DRM'04, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. U. Schmidt, O. Tafreschi, R. Wolf, Interoperability Challenges for DRM Systems, IFIP/GI Workshop on Virtual Goods, Ilmenau (Germany), May 2004.Google ScholarGoogle Scholar
  16. Z. Tan, Z. Liu, Provably Secure Delegation-by-Certification Proxy Signature Schemes, ACM International Conference on Information Security, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Susan Wegner, Prototype Description of an Open DRM Architecture, OPERA-Interoperability of Digital Rights Management Technologies, EURESCOM project report, December 2003.Google ScholarGoogle Scholar
  18. DVB - The Digital Video Broadcasting Consortium. http://www.dvb.org/Google ScholarGoogle Scholar
  19. Hymn Project. http://hymn-project.org/Google ScholarGoogle Scholar
  20. iTunes FairPlay. http://www.apple.com/lu/support/itunes/authorization.htmlGoogle ScholarGoogle Scholar
  21. Open Mobile Alliance. http://www.openmobilealliance.org/Google ScholarGoogle Scholar
  22. Secure Digital Container. http://www.digicont.com/Google ScholarGoogle Scholar
  23. Sharpmusique. http://www.nanocrew.net/Google ScholarGoogle Scholar
  24. Trusted Computing Group, Trusted Computing Platform Alliance Main Specification, February 2002, Version 1.1b, http://www.trustedcomputinggroup.orgGoogle ScholarGoogle Scholar
  25. Microsoft Windows Media Rights Manager. http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspxGoogle ScholarGoogle Scholar
  26. Windows Media DRM, wikipedia entry. http://en.wikipedia.org/wiki/Windows Media DRMGoogle ScholarGoogle Scholar
  27. Can we learn from Apple's success with iTunes Music services?. http://www.dk.capgemini.com/NewsmailSystem/Telecom/Ver1/Documents/ITunes.shtml.Google ScholarGoogle Scholar
  28. Intertrust's Coral and Marlin. http://www.intertrust.com/main/research/initiatives.htmlGoogle ScholarGoogle Scholar
  29. MPs in digital downloads warning. http://news.bbc.co.uk/2/hi/technology/5041684.stmGoogle ScholarGoogle Scholar
  30. http://www.coral-interop.org/Google ScholarGoogle Scholar
  31. Advanced access content system. http://www.aacsla.com/homeGoogle ScholarGoogle Scholar
  32. PachyDRM. http://www.pachydrm.com/Google ScholarGoogle Scholar
  33. The Informed Dialogue about Consumer Acceptability of DRM Solutions in Europe (INDICARE), "Consumer Survey on Digital Music and DRM", May 2005, www.indicare.org/surveyGoogle ScholarGoogle Scholar

Index Terms

  1. Towards a secure and interoperable DRM architecture

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            DRM '06: Proceedings of the ACM workshop on Digital rights management
            October 2006
            112 pages
            ISBN:159593555X
            DOI:10.1145/1179509

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 October 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader