Skip to main content
Log in

An anonymous DRM scheme for sharing multimedia files in P2P networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Peer-to-Peer (P2P) systems enable efficient multimedia file sharing and are inherently scalable on the Internet. However, the absence of a centralized authority and a suitable Digital Right Management (DRM) mechanism prompts many securities-related challenges and discourages the widespread use of P2P networks for distributing copyright-protected multimedia files. To address these issues, we adopt the concept of a group Diffie-Hellman group key and threshold scheme to propose a novel anonymous DRM scheme for P2P users that wish to share multimedia files. Our scheme has four features: (1) the P2P users remain anonymous while sharing their files, (2) no online server is needed to perform the DRM operations, (3) an adjustable mechanism exists for efficiently distributing multimedia files with different popularities, and (4) users enjoy low communication and computation costs. In addition to explaining the operations of this scheme, we also compare its performance and security with Zhang et al.’s design, TLMS and Lua’s Scheme within the context of this study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Chaum D (1982) Blind signatures system. In: Advances in cryptology, CRYPTO’82, pp 153–156

  2. Chaum D (1983) Blind signatures for untraceable payments. In: Advances in cryptology, CRYPTO’83, vol 82, pp 199–203

  3. Chaum D (1988) Blinding for unanticipated signatures. In: Advances in cryptology, EUROCRYPT’87, pp 227–233

  4. Chen H, Hsueh S (2003) Light-weight authentication and billing in mobile communications. In: IEEE 37th annual 2003 international carnahan conference on security technology, Proceedings. IEEE, pp 245–252

  5. Chu C, Su X, Prabhu B, Gadh R, Kurup S, Sridhar G, Sridhar V (2006) Mobile DRM for multimedia content commerce in P2P networks. In: IEEE consumer communications and networking conference, pp 1119–1123

  6. Douceur JR (2002) The sybil attack. In: Peer-to-peer systems, pp 251–260

  7. Einhorn MA, Rosenblatt B (2005) Peer-to-peer networking and digital rights management: how market tools can solve copyright problems. Cato Institute Policy Analysis

  8. Iwata T, Abe T, Ueda K, Sunaga H (2003) A DRM system suitable for P2P content delivery and the study on its implementation. In: The 9th Asia-Pacific conference on communications, 2003. APCC 2003, vol 2, pp 806–811

  9. Koo S, Lee C, Kannan K (2005) Using P2P to distribute large-volume contents’ research problems, solutions and future directions. In: Proceedings of the 9th world multi-conference on systemics, cybernetics and informatics, pp 10–13

  10. Lee J, Chang C (2007) Secure communications for cluster-based ad hoc networks using node identities. J Netw Comput Appl 30(4):1377–1396

    Article  Google Scholar 

  11. Levine BN, Shields C, Margolin NB (2006) A survey of solutions to the sybil attack. Tech. rep.

  12. Lua EK (2007) Securing peer-to-peer overlay networks from sybil attack. In: International symposium on communications and information technologies, 2007. ISCIT’07. IEEE, pp 1213–1218

  13. Schneier B (1996) Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. Wiley, New York

    MATH  Google Scholar 

  14. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MATH  MathSciNet  Google Scholar 

  15. Steiner M, Tsudik G, Waidner M (1996) Diffie-Hellman key distribution extended to group communication. In: Proceedings 3rd ACM conference on computer and communications security, pp 31–37

  16. Steiner M, Tsudik G, Waidner M (1997) Cliques: A new approach to group key agreement. In: The 18th IEEE international conference on distributed computing systems, pp 380–387

  17. Steiner M, Tsudik G, Waidner M (2000) Key agreement in dynamic peer groups. IEEE Trans Parallel Distrib Syst 11(8):769–780

    Article  Google Scholar 

  18. Sung J, Jeong J, Yoon K (2006) Drm enabled P2P architecture. In: The 8th international conference advanced communication technology, vol 1, pp 487–490

  19. Wu WC, Chen YM (2009) TLMS: a novel drm scheme for multimedia sharing in P2P networks. In: The 5th international conference on intelligent information hiding and multimedia signal processing, pp 873–876

  20. Zhang X, Liu D, Chen S, Zhang Z, Sandhu R (2008) Towards digital rights protection in bittorrent-like P2P systems. In: The 15th SPIE/ACM multimedia computing and networking, vol 6818, pp 68180F.1–68180F.12

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei-Chen Wu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, YM., Wu, WC. An anonymous DRM scheme for sharing multimedia files in P2P networks. Multimed Tools Appl 69, 1041–1065 (2014). https://doi.org/10.1007/s11042-012-1166-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1166-1

Keywords

Navigation