Skip to main content

Securing Peer-to-Peer Distributions for Mobile Devices

  • Conference paper
Information Security Practice and Experience (ISPEC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4991))

Abstract

Peer-to-peer (P2P) architectures offer a flexible and user-friendly way to distribute digital content (e.g., sharing, rental, or superdistribution). However, the parties involved have different interests (e.g., user privacy vs. license enforcement) that should be reflected in the P2P security architecture.

We identify characteristic P2P scenarios and demonstrate how these can be realized by applying a few basic licensing operations. We present a security architecture to realize these basic license operations (i) in a generalized fashion and (ii) employing the ARM TrustZone technology, which is popular for embedded systems. Lastly, we extend existing superdistribution schemes for offline application, allowing a mobile peer to access superdistributed content without the need to first contact the actual licensor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ARM Ltd. ARM TrustZone. www.arm.com/products/esd/trustzone_home.html

  2. Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the Art of Virtualization. In: SOSP 2003: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)

    Google Scholar 

  3. Ginzboorg, P., Ekberg, J.-E., Laitinen, P., Ylä-Jääski, A.: Charging for Broadband Access. In: ICTEC’98: Proceedings of the 1st International Conference on Telecommunications and Electronic Commerce (November 1998)

    Google Scholar 

  4. Kauer, B.: OSLO: Improving the Security of Trusted Computing. In: Proceedings of the 16th USENIX Security Symposium, pp. 229–237 (August 2007)

    Google Scholar 

  5. Kent, S.T.: Protecting Externally Supplied Software in Small Computers. PhD thesis, Massachusetts Institute of Technology (1980)

    Google Scholar 

  6. Liedtke, J.: Towards Real Microkernels. Communications of the ACM 39(9), 70–77 (1996)

    Article  Google Scholar 

  7. Mori, R., Kawahara, M.: Superdistribution: The Concept and the Architecture. Transactions of the IEICE E 73(7), 1133–1146 (1990)

    Google Scholar 

  8. Nair, S.K., Popescu, B.C., Gamage, C., Crispo, B., Tanenbaum, A.S.: Enabling DRM-preserving Digital Content Redistribution. In: Proceedings of the 7th International IEEE Conference on E-Commerce Technology (July 2005)

    Google Scholar 

  9. Open Mobile Alliance. OMA DRM Version 2.0 (March 2006), http://www.openmobilealliance.org

  10. Sadeghi, A.-R., Wolf, M., Stüble, C., Asokan, N., Ekberg, J.-E.: Enabling Fairer Digital Rights Management with Trusted Computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Sandhu, R., Zhang, X.: Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In: SACMAT 2005, Stockholm, Sweden (June 2005)

    Google Scholar 

  12. Sarmenta, L.F.G., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: STC 2006: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, pp. 27–42 (2006)

    Google Scholar 

  13. Smith, S.W.: Secure Coprocessing Applications and Research Issues. Los Alamos Unclassified Release LA-UR-96-2805, Los Alamos National Laboratory (1996)

    Google Scholar 

  14. Stewin, P., Sadeghi, A.-R., Unger, M., Gasmi, Y., Asokan, N.: Beyond Secure Channels. In: STC 2007: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing (2007)

    Google Scholar 

  15. Suh, G., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing. In: Proceedings of the Annual USENIX Technical Conference (2003)

    Google Scholar 

  16. Trusted Computing Group. TPM Main Specification. Technical Report Version 1.2 Revision 94 (2006)

    Google Scholar 

  17. Trusted Computing Group. TCG Mobile Trusted Module Specification (June 2007)

    Google Scholar 

  18. Tygar, J.D., Yee, B.S.: Strongbox: A System for Self-Securing Programs. In: CMU Computer Science: A 25th Anniversary Commemorative, pp. 163–197. Addison-Wesley, Reading (1991)

    Google Scholar 

  19. Tygar, J.D., Yee, B.S.: Dyad: A System for Using Physically Secure Coprocessors. In: Proceedings of the IP Workshop (1994)

    Google Scholar 

  20. White, S.R., Comerford, L.D.: ABYSS: A Trusted Architecture for Software Protection. In: Proceedings of the IEEE Symposium on Security and Privacy (1987)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Liqun Chen Yi Mu Willy Susilo

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Osterhues, A., Sadeghi, AR., Wolf, M., Stüble, C., Asokan, N. (2008). Securing Peer-to-Peer Distributions for Mobile Devices. In: Chen, L., Mu, Y., Susilo, W. (eds) Information Security Practice and Experience. ISPEC 2008. Lecture Notes in Computer Science, vol 4991. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79104-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79104-1_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79103-4

  • Online ISBN: 978-3-540-79104-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics