[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1029146.1029150acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A DRM security architecture for home networks

Published: 25 October 2004 Publication History

Abstract

This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establish dynamic groups, so called "Authorized Domains", where legally acquired copyrighted content can seamlessly move from device to device. This greatly improves the end-user experience, preserves "fair use" expectations, and enables the development of new business models by content providers. Key to our design is a hybrid compliance checking and group establishment protocol, based on pre-distributed symmetric keys, with minimal reliance on public key cryptographic operations. Our architecture does not require continuous network connectivity between devices, and allows for efficient and flexible key updating and revocation.

References

[1]
DVB - The Digital Video Broadcasting Consortium. http://www.dvb.org/.]]
[2]
Secure Hash Standard. FIPS 180-1, Secure Hash Standard, NIST, US Dept. of Commerce, Washington D. C. April 1995.]]
[3]
xCP Cluster Protocol. http://www.almaden.ibm.com/software/ds/ ContentAssurance/papers/xCP_DVB.pdf.]]
[4]
Smartright technical white paper. http://www.smartright.org/images/SMR/ content/SmartRight_tech_whitepaper_jan28.pdf, Jan. 2003.]]
[5]
C. Boyd. A Class of Flexible and Efficient Key Management Protocols. In Proc. 9th IEEE Computer Security Foundation Workshop, 1996.]]
[6]
M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. ACM Trans. Comput. Syst., 8(1):18--36, 1990.]]
[7]
C. Conrado, F. Kamperman, G. J. Schrijen, and W. Jonker. Privacy in an Identity-based DRM System. In Proc. 14th Intl. Workshop on Database and Expert Systems Applications, pages 389--395, Sept. 2003.]]
[8]
B. Crispo, B. Popescu, and A. Tanenbaum. Symmetric key authentication services revisited. In Proc. 9th Australasian Conference on Information Security and Privacy, July 2004.]]
[9]
Call for proposals for content protection & copy management technologies, July 2001.]]
[10]
A. Eskicioglu and E. Delp. An overview of multimedia content protection in consumer electronic devices. Signal Processing: Image Communication, 16(5):681--699, April 2001.]]
[11]
A. Eskicioglu, J. Town, and E. Delp. Security of Digital Entertainment Content from Creation to Consumption. Signal Processing: Image Communication, 18(4):237--262, April 2003.]]
[12]
A. Fiat and M. Naor. Broadcast Encryption. In Advances in Cryptology - CRYPTO '93, pages 480--491, 1993.]]
[13]
F.L.A.J. Kamperman and S.A.F.A.van den Heuvel and M.H.Verberkt. Digital Rights Management in Home Networks. In Proc. IBC 2001, pages 70--77, Sept. 2001.]]
[14]
J. A. Halderman. Evaluating New Copy-Prevention Techniques for Audio CDs. In Proc. 2002 ACM Workshop on Digital Rights Management, 2002.]]
[15]
J. Kohl and B. Neuman. The Kerberos Network Authentication Service (Version 5). Technical report, IETF Network Working Group, 1993. Internet Request for Comments RFC-1510.]]
[16]
H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104 - HMAC: Keyed-Hashing for Message Authentication. Internet RFC 2104, Feb. 1997.]]
[17]
J. B. Lotspiech, S. Nusser, and F. Pestoni. Broadcast encryption's bright future. IEEE Computer, 35(1), 2002.]]
[18]
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.]]
[19]
D. Naor, M. Naor, and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. In Advances in Cryptology - CRYPTO '01, pages 41--62, 2001.]]
[20]
M. Ripley, C. Traw, S. Balogh, and M. Reed. Content Protection in the Digital Home. Intel Technology Journal, 6(9):49--56, 2002.]]
[21]
B. Rosenblatt, B. Trippe, and S. Mooney. Digital Rights Management, Business and Technology. M&T Books, 2002.]]
[22]
S. Sovio, N. Asokan, and K. Nyberg. Defining Authorization Domains Using Virtual Devices. In SAINT Workshops 2003, pages 331--336, 2003.]]
[23]
S. G. Stubblebine and R. N. Wright. An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. IEEE Trans. Softw. Eng., 28(3):256--285, 2002.]]
[24]
S. van den Heuvel, W. Jonker, F. Kamperman, and P. Lenoir. Secure Content Management in Authorized Domains. In Proc. IBC 2002, pages 467--474, Sept. 2002.]]
[25]
C. Wong, M. Gouda, and S. Lam. Secure Group Communications Using Key Graphs. In Proc. of the ACM SIGCOMM, pages 68--79, 1998.]]

Cited By

View all
  • (2020)Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM systemMultimedia Tools and Applications10.1007/s11042-020-08683-2Online publication date: 16-Apr-2020
  • (2017)Design of a Secure Digital Recording Protection System with Network Connected Devices2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA)10.1109/WAINA.2017.15(375-378)Online publication date: Mar-2017
  • (2017)Generic and agile service function chain verification on cloud2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS.2017.7969150(1-10)Online publication date: Jun-2017
  • Show More Cited By

Index Terms

  1. A DRM security architecture for home networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DRM '04: Proceedings of the 4th ACM workshop on Digital rights management
    October 2004
    120 pages
    ISBN:1581139691
    DOI:10.1145/1029146
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 October 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DRM architectures
    2. compliant CE devices
    3. digital content protection

    Qualifiers

    • Article

    Conference

    CCS04
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 15 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM systemMultimedia Tools and Applications10.1007/s11042-020-08683-2Online publication date: 16-Apr-2020
    • (2017)Design of a Secure Digital Recording Protection System with Network Connected Devices2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA)10.1109/WAINA.2017.15(375-378)Online publication date: Mar-2017
    • (2017)Generic and agile service function chain verification on cloud2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS.2017.7969150(1-10)Online publication date: Jun-2017
    • (2017)Which DRM grade could BYOD users employ? A differentiated DRM service between the cloud and mobile devices2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS.2017.7969124(1-6)Online publication date: Jun-2017
    • (2017)Enabling accurate and efficient modeling-based CPU power estimation for smartphones2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS.2017.7969112(1-10)Online publication date: Jun-2017
    • (2016)Content sharing schemes in DRM systems with enhanced performance and privacy preservationJournal of Computer Security10.3233/JCS-1574624:6(667-688)Online publication date: 1-Dec-2016
    • (2016)Broadcast encryption with dealershipInternational Journal of Information Security10.1007/s10207-015-0285-x15:3(271-283)Online publication date: 1-Jun-2016
    • (2015)A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systemsElectronic Commerce Research10.1007/s10660-015-9176-515:1(49-71)Online publication date: 1-Mar-2015
    • (2014)Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environmentMultimedia Tools and Applications10.1007/s11042-013-1452-673:2(841-855)Online publication date: 1-Nov-2014
    • (2014)Efficient and Enhanced Solutions for Content Sharing in DRM SystemsProceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 856610.1007/978-3-662-43936-4_25(373-381)Online publication date: 14-Jul-2014
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media