DocumentCode :
1989715
Title :
A practical approach to impede key recovery and piracy in Digital Rights Management System (DRM)
Author :
Mehmood, Khawar ; Afzal, Mehreen ; Mukaram Khan, M. ; WaseemIqbal, M.M.
Author_Institution :
Nat. Univ. of Sci. & Technol. (NUST), Islamabad, Pakistan
fYear :
2015
fDate :
13-17 Jan. 2015
Firstpage :
349
Lastpage :
353
Abstract :
With the invention of high speed internet and content digitization, large scale content sharing has become exceptionally easy. This ease adds fuel to the fire of piracy, which causes a gigantic loss to content providers. Copyright laws only cause deterrence. Hence a technological solution was required to protect the rights of digital content owners. This inevitably gave birth to Digital Rights Management System (DRM). But DRM could not fulfill this obligation and is broken time to time. Two major types of attacks faced by DRM are the key recovery and unencrypted content capturing. In this paper a DRM model has been proposed which will employ elliptic curve integrated encryption system (ECIES) and a secure one-way hash function for generating a dynamic one time content encryption/decryption key. A portion of key is stored in license. With the proposed technique, the knowledge of a portion of key will reveal no information about the key itself. The key will never be reused and will never be stored on end user device. The proposed solution will raise the scale of difficulty for key recovery and piracy. If any effort is made to distribute the contents illegally, the contents will be locked cryptographically for both legal and illegal consumers. The proposed technique also provides protection against attacks, wherein an attacker becomes successful in extracting the content decryption key and publishes it on a public website database. With the help of any well-known technique like remote attestation, the proposed solution also allows checking the integrity of DRM client software which is executed in malicious host environment.
Keywords :
Internet; computer crime; copyright; digital rights management; public key cryptography; DRM model; ECIES; attacks; content digitization; content providers; copyright laws; digital content owners; digital rights management system; dynamic one time content encryption/decryption key; elliptic curve integrated encryption system; end user device; high speed Internet; illegal consumers; key recovery; large scale content sharing; license; malicious host environment; piracy; public Website database; rights protection; secure one-way hash function; unencrypted content capturing; Computational modeling; Computer architecture; Encryption;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applied Sciences and Technology (IBCAST), 2015 12th International Bhurban Conference on
Conference_Location :
Islamabad
Type :
conf
DOI :
10.1109/IBCAST.2015.7058528
Filename :
7058528
Link To Document :
بازگشت