Skip to main content
Log in

Secure interoperable digital content distribution mechanisms in a multi-domain architecture

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Current DRM systems use the Authorized Domain concept to allow sharing of DRM-enabled multimedia contents across multiple devices. However, some devices in an authorized domain may support only a limited number of DRM systems of the content providers due to their heterogeneous capabilities. Lack of interoperability among DRM systems enforces these devices to stick to a common DRM system which restricts the sharing of different DRM-enabled multimedia contents among them. Most of the current solutions use a translation entity to provide interoperability among different DRM standards with a trust assumption over that entity. This assumption may not assure the content providers that their contents and licenses will be translated and distributed in a secure and legal way. In this paper, we propose a secure interoperable content distribution mechanism for commercial and user generated contents among multiple authorized domains without any trust assumption on the translation entity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. AACS, Advanced Access Content System. http://www.aacsla.com/home

  2. Alawneh M, Abbadi IM (2008) Sharing but protecting content against internal leakage for organizations. LNCS 5094:238–253

    Google Scholar 

  3. Che S, Che Z, Ma B (2008) An improved image scrambling algorithm. In: Proceedings of the 2008 second international conference on genetic and evolutionary computing, pp 495–499

  4. Coral Consortium Whitepaper, Tech. Report, February 2006. http://www.coral-interop.org

  5. DVB—The Digital Video Broadcasting Consortium. http://www.dvb.org/

  6. DVD Copy Control Association and the Content Scramble System. http://www.dvdcca.org/

  7. Jeong Y, Park J, Kim J, Yoon K (2007) DRM content adaptation scheme between different DRM systems for seamless content service. In: Proceedings of ICME 2007, pp 867–870

  8. Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: Proceedings of the 9th IEEE international conference on network. Bangkok, Thailand

  9. Kiaei MS, Ghaemmaghami S, Khazaei S (2006) Efficient fully format compliant selective scrambling methods for compressed video streams. In: Advanced international conference on telecommunications and international conference on internet and web applications and services (AICT-ICIW 06)

  10. Koenen RH, Lacy J, Mackay M, Mitchell S (2004) The long march to interoperable digital rights management. Proc IEEE 92(6):883–897

    Article  Google Scholar 

  11. Kravitz DW, Messerges TS (2005) Achieving media portability through local content translation and end-to-end rights management. In: Proceedings of the ACM workshop on digital rights management, pp 27–36

  12. Kulkarni NS, Raman B, Gupta I (2009) Multimedia encryption: a brief overview. In: Recent advances in multimedia signal processing and communications, pp 417–449

  13. Lee S, Heejin P, Jong K (2010) A secure and mutual-profitable DRM interoperability scheme. In: 2010 IEEE symposium on computers and communications (ISCC), pp. 75–80. Riccione, Italy

    Google Scholar 

  14. Li H, Petkovic M (2007) DRM for protecting personal content. In: Security, privacy, and trust in modern data management (book), data-centric systems and applications (book series), pp 333–346

  15. Nam DW, Lee JS, Kim JH (2007) Interlock system for DRM interoperability of streaming contents. In: Proceedings of IEEE international symposium on consumer electronics 2007 (ISCE 2007)

  16. ODRL, Open Digital Rights Language, version 1.1, 2002. http://www.w3.org/TR/odrl/

  17. OMA, Open Mobile Alliance DRM specifications, version 2.0, July 2004. http://www.openmobilealliance.org/technical/release_program/drm_v2_0.aspx

  18. Popescu BC, Crispo B, Tanenbaum AS, Kamperman FLAJ (2004) A DRM security architecture for home networks. In: Proceedings of the 4th ACM workshop on digital rights management, pp 1–10

  19. RealSystem Media Commerce Suite, 2001 Technical White Paper, RealNetworks, Inc., 2001. http://docs.real.com/docs/drm/DRM_WP1.pdf

  20. Sachan A, Emmanuel S, Das A, Kankanhalli M (2009) Privacy preserving multiparty multilevel DRM architecture. In: Workshop on digital rights management, 6th annual IEEE consumer communications and networking conference, CCNC 2009, 10–13 Jan 2009

  21. Security Overview of Microsoft Windows Media Rights Manager, Microsoft, Microsoft Digital Media Division, 2001. http://download.microsoft.com/download/3/7/3/3731217a-7949-4571-8f22-03528ae398ff/WMRM_security.pdf

  22. Serrao C, Dias M, Delgado J (2005) Bringing DRM interoperability to digital content rendering applications, CISSE05. The international joint conferences on computer, information, and system sciences, and engineering, Univ. Bridgeport, USA

  23. Serrao C, Rodriguez E, Delgado J (2010) Approaching the rights management interoperability problem using intelligent brokerage mechanisms. Computer and Communications 34(2):129–139

    Article  Google Scholar 

  24. Taban G, Cardenas AA, Gligor VD (2006) Towards a secure and interoperable DRM architecture. In: Proceedings of the ACM workshop on digital rights management, pp 69–78

  25. Takayama M, Tanaka K, Takagi K, Nakajima Y (2008) A scalable video scrambling method in MPEG compressed domain. In: ISCCSP 2008, Malta

  26. TCG specification architecture overview, specification revision 1.4, 2 August 2007. http://www.trustedcomputinggroup.org/developers/trusted_platform_module/specifications

  27. The MPEG-21 Rights Expression Language, A White Paper, 2003. http://www.xrml.org/reference/MPEG21_REL_whitepaper_Rightscom.pdf

  28. Video demonstration, video can be accessed through the link Interoperable Content Distribution under Project Demos at http://www3.ntu.edu.sg/home/asemmanuel/ or at http://www.youtube.com/watch?v=_KONGNTEDSc

  29. Win LL, Thomas T, Emmanuel S, Kankanhalli MS (2009) Secure domain architecture for interoperable content distribution. In: PCM 2009, LNCS 5879, pp 1313–1318

  30. Xrml technical overview, version 1.0, 2002. http://www.xrml.org/Reference/XrMLTechnicalOverviewV1.pdf

  31. Yan W-Q, Fu W-G, Kankanhalli MS (2008) Progressive audio scrambling in compressed domain. IEEE Transactions on Multimedia 10(6):960–968

    Article  Google Scholar 

Download references

Acknowledgements

Thanks to the Agency for Science, Technology and Research (A*STAR), Singapore for supporting this work under the project ‘Digital Rights Violation Detection for Digital Asset Management’ (Project No: 0721010022).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Lei Win.

Appendices

Appendix A: Registration process

In the registration process, the Local Domain Manager, Content Providers, Authorized Domain Managers and the End Devices register to the Registration Server (RS) by sending their public-key certificate (PKI) to the Registration Server. The detailed protocols are given below.

1.1 A.1 Registration of a Content Provider (CP)

  1. 1.

    CP sends its PKI certificate and its adopted DRM system to the RS.

  2. 2.

    After verification of the CP’s authenticity, RS adds its details to a list that shows the available Content Providers and its DRM agents.

1.2 A.2 Registration of Local Domain Manager (LDM) and Authorized Domain Managers (ADM)

For registration of a device that is going to function as an Local Domain Manager or an Authorized Domain Manager, the device has to be TPM-enabled and has a pair of public-key cryptographic keys called \(\mathcal{AIK}\) keys generated by the TPM. The LDM/ADM obtains an \(\mathcal{AIK}\)-certificate which contains its \(\mathcal{AIK}\) public key signed by a trusted Certifying Authority.

  1. 1.

    TPM sends its \(\mathcal{AIK}\)-certificate and platform configuration state to the RS.

  2. 2.

    RS verifies the authenticity of TPM using \(\mathcal{AIK}\)-certificate and LDM/ADM device’s trust level using the remote attestation protocol described in Section 2.1.2.

  3. 3.

    In the case of LDM after successful verifications, RS installs the DRM agent DRM LDM in the LDM device and sends an LDM-certificate that contains general description about its services and security properties signed by the RS.

  4. 4.

    In the case of ADM after successful authentication, RS installs a DRM agent DRM ADM in the ADM and sends to the ADM a set of domain credentials (i.e., a unique domain key, a domain certificate consisting of a unique domain ID and the maximum number of devices allowed for that domain, public key of the ADM device etc.) for the domain that the ADM device is going to manage.

1.3 A.3 Registration of an End Device (ED)

An End Device that wants to join an Authorized Domain first registers to the Registration Server as follows.

  1. 1.

    ED sends its PKI certificate to the RS.

  2. 2.

    RS verifies the authenticity of the ED, stores the credentials of the ED in its database and sends the list of available Authorized Domains and DRM systems to the ED.

  3. 3.

    ED selects a DRM system from the list which it can support and informs RS.

  4. 4.

    RS installs the selected DRM system in ED.

Appendix B: Multi-domain creation process

The creation of a multi-domain involves the following processes: Local Domain Manager adding to it various Content Providers who are willing to distribute their contents; joining and registration of End Devices to various Authorized Domains. The detailed protocols are given below.

1.1 B.1 Local Domain Manager (LDM) adding a Content Provider (CP)

After the registration, the Local Domain Manager can proceed to add Content Providers who are willing to distribute their contents.

  1. 1.

    LDM selects a desired CP from the available list of CPs with the RS.

  2. 2.

    RS forwards the LDM to the selected CP for authentication and agreement.

  3. 3.

    TPM of LDM sends its \(\mathcal{AIK}\) certificate and platform configuration state to the CP.

  4. 4.

    CP verifies authenticity of TPM using \(\mathcal{AIK}\) certificate and the trust level of the LDM device using the remote attestation protocol described in Section 2.1.2.

  5. 5.

    CP sends its PKI certificate to the LDM.

  6. 6.

    LDM verifies the authenticity of the CP.

  7. 7.

    After successful mutual authentication, CP grants its approval and sends its specific DRM rules and mechanisms to the LDM securely.

  8. 8.

    LDM’s Content Provider Support Module stores the DRM rules and mechanisms of that CP.

  9. 9.

    LDM repeats steps 1–8 for all the CPs for which it wants to do content negotiation.

1.2 B.2 End Device (ED) joining an Authorized Domain

  1. 1.

    ED selects a desired ADM from the available ADM list and sends the request to the RS to join that domain.

  2. 2.

    RS approves the request and sends a digitally signed user certificate which contains the information of the device and its owner, the public key of the device and the approval from RS to the device.

  3. 3.

    ED forwards the certificate and request for joining the domain to the ADM.

  4. 4.

    After verification of the certificate, if the device satisfies the rules of that domain, ADM approves the device as a domain member and stores the certificate in its database.

  5. 5.

    ADM sends a domain user certificate and a domain key to the device.

  6. 6.

    ADM updates its domain device list and sends the list to the RS and all the current domain members.

Appendix C: Multi-domain modification process

A multi-domain gets modified when one of the following happens:

  • an End Device joins/leaves/removed from an Authorized Domain;

  • an End Device gets transferred from the Authorized Domain AD cur to the Authorized Domain AD new ;

  • a Content Provider leaves/joins the multi-domain.

We describe in detail the protocols for the following three cases. The other cases are repetitions of earlier protocols given in the section.

1.1 C.1 Leaving/removing of an End Device (ED) from a Authorized Domain

When an End Device wants to leave its Authorized Domain, it sends a digitally signed Leave Domain Request to Authorized Domain Manager (ADM). When an End Device belonging to an Authorized Domain is found to be violating the U-License for any content, Registration Server will request the corresponding Authorized Domain Manager to remove the device from the domain. Registration Server then adds the device identity to the list of revoked devices. The remaining of the protocols in both cases are the following.

  1. 1.

    ADM verifies the request, approves the request and removes the certificate of ED from the database.

  2. 2.

    ADM updates its domain device list and sends the list to the RS and all the current domain members.

  3. 3.

    ADM updates the domain keys and sends the updated keys to the members of the domain.

1.2 C.2 Transferring an End Device (ED) between Authorized Domains

There are some situations in which an End Device has to be transferred from an Authorized Domain AD cur to another domain AD new . In OMA DRM [17], transferring of devices across Authorized Domains requires to execute a leave domain and a join domain protocols which is inefficient and requires more network resources. In our case, the device need not have to again get authenticated by the Registration Server. Instead of executing the join and leave domain protocols, the device can be directly transfered to AD new with a simpler transfer domain protocol. Devices can check the free slot availability of any AD new with the Registration Server and can send the request of transferring to the Authorized Domain Manager of AD cur . We will denote the Authorized Domain Manager of AD cur as ADM cur and the Authorized Domain Manager of AD new as ADM new . The protocol for transferring an End Device from AD cur to AD new is as follows.

  1. 1.

    ED sends a digitally signed Transfer Domain Request to ADM cur .

  2. 2.

    ADM cur verifies the request, attests the state of ED and approves the request. It sends to ED a digitally signed Transfer Certificate showing the device’s attestation status and the eligibility to join another domain.

  3. 3.

    ADM cur removes the domain user certificate of ED from the database.

  4. 4.

    ADM cur updates its domain device list and sends the list to the RS and all the current domain members.

  5. 5.

    ADM cur updates the domain keys and sends the updated key to domain member devices.

  6. 6.

    ED sends the Transfer Certificate to the ADM new .

  7. 7.

    ADM new verifies the Transfer Certificate and generates a domain user certificate and sends along with the domain key to the device.

  8. 8.

    ADM new updates its domain device list and sends the updated list to RS and all the domain members.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Win, L.L., Thomas, T. & Emmanuel, S. Secure interoperable digital content distribution mechanisms in a multi-domain architecture. Multimed Tools Appl 60, 97–128 (2012). https://doi.org/10.1007/s11042-011-0802-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-011-0802-5

Keywords

Navigation