DOI QR코드

DOI QR Code

A License Audit Model for Secure DRM Systems in IP-based Environments

  • Jang, Ui-Jin (Dept. of Computer Engineering, Soongsil University) ;
  • Lim, Hyung-Min (Dept. of Computer Engineering, Soongsil University) ;
  • Shin, Yong-Tae (Dept. of Computer Engineering, Soongsil University)
  • Received : 2010.05.06
  • Accepted : 2010.05.28
  • Published : 2010.06.30

Abstract

Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.

Keywords

References

  1. Kevin Mandia, Chris Prosise, Matt Pepe, “Incident response and computer forensic, Second Edition,” McGraw-Hill, 2003.
  2. Warren G, Kruse II, Jay G.Heiser, “COMPUTER forensic: Incident Response Essentials,” Addison Wesley, 2001.
  3. Qiong Liu, Reihaneh Safavi-Naini and Nicholas Paul Sheppard, “Digital rights management for content distribution,” AISW2003, 2003.
  4. OMA, “OMA DRM Requirements Version 2.0,” 2004.
  5. MPEG-21 Overview v.5, ISO/IEC JTC1/SC29/WG11 N5231, Shanghai, 2002.
  6. DMP, “TIRAMISU(IST-2003-506983) DRM Requirements,” 2004.
  7. RFC 3227, “Guidelines for Evidence Collecting and Archiving,” http://www.faqs.org/rfcs/rfc3227-.html. 2002.
  8. Mariusz Burdach, “Forensic Analysis of a Live Linux System I,” http://www.securityfocus.com/infocus/1769. 2004.
  9. Mariusz Burdach, “Forensic Analysis of a Live Linux System II,” http://www.securityfocus.com/infocus/1773 , 2004.
  10. Seok-Hee Lee, “A Study of Memory Information Collection and Analysis in a view of Digital forensic in Window System,” Center for Information Technologies, Korea University, 2006. 2.

Cited by

  1. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography vol.2015, 2015, https://doi.org/10.1155/2015/807213
  2. An enhanced security framework for reliable Android operating system vol.9, pp.6, 2016, https://doi.org/10.1002/sec.908