Skip to main content

A Geometric Approach for Efficient Licenses Validation in DRM

  • Conference paper
Book cover Secure Data Management (SDM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6358))

Included in the following conference series:

  • 830 Accesses

Abstract

In DRM systems contents are distributed from the owner to consumers, often through multiple middle level distributors. The owner issues redistribution licenses to its distributors. The distributors using their received redistribution licenses can generate and issue new redistribution licenses to their sub-distributors and new usage licenses to consumers. For the rights violation detection, all the newly generated licenses must be validated. The validation process becomes complex when there exist multiple redistribution licenses for a content with the distributors. In such cases, it requires the validation using an exponential number of validation equations, which makes the validation process much computation-intensive. Thus to do the validation efficiently, in this paper we propose a method to geometrically derive the relationship between different validation equations to identify the redundant validation equations. These redundant validation equations are then removed using graph theory concepts. Experimental results show that the validation time can be significantly reduced using our proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Conrado, C., Petkovic, M., Jonker, W.: Privacy-preserving digital rights management. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 83–99. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Diehl, E.: A four-layer model for security of digital rights management. In: Proceedings of the 8th ACM workshop on Digital rights management, pp. 19–28 (2008)

    Google Scholar 

  3. Gross, J., Yellen, J.: Handbook of Graph Theory and Applications. CRC Press, Boca Raton (2003)

    Book  Google Scholar 

  4. Hilty, M., Pretschner, A., Basin, D., Schaefer, C., Walter, T.: A policy language for distributed usage control. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 531–546. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Hwang, S.O., Yoon, K.S., Jun, K.P., Lee, K.H.: Modeling and implementation of digital rights. The Journal of Systems and Software 73(3), 533–549 (2004)

    Article  Google Scholar 

  6. Iannella, R.: Digital rights management (DRM) architectures. D-Lib Magazine 7(6) (2001)

    Google Scholar 

  7. Knuth, D.E.: The art of computer programming. Sorting and searching, vol. 3. Addison Wesley Longman Publishing Co., Inc., Redwood City (1998)

    Google Scholar 

  8. Liu, G., Lu, H., Lou, W., Xu, Y., Yu, J.X.: Efficient mining of frequent patterns using ascending frequency ordered prefix-tree. Data Mining and Knowledge Discovery 9(3), 249–274 (2004)

    Article  MathSciNet  Google Scholar 

  9. Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient license validation in MPML DRM architecture. In: 9th ACM workshop on digital rights management(DRM 2009), Chicago, pp. 73–82 (2009)

    Google Scholar 

  10. Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient aggregate licenses validation in DRM. In: Kitagawa, H., Ishikawa, Y., Li, Q., Watanabe, C. (eds.) DASFAA 2010. LNCS, vol. 5982, pp. 313–319. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Safavi-Naini, R., Sheppard, N.P., Uehara, T.: Import/export in digital rights management. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 99–110. ACM, New York (2004)

    Chapter  Google Scholar 

  12. West, D.: Introduction to graph theory. Prentice Hall, Upper Saddle River (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sachan, A., Emmanuel, S., Kankanhalli, M.S. (2010). A Geometric Approach for Efficient Licenses Validation in DRM. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2010. Lecture Notes in Computer Science, vol 6358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15546-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15546-8_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15545-1

  • Online ISBN: 978-3-642-15546-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics