ANALYSIS OF POSITIVE INCENTIVES FOR PROTECTING SECRETS IN DIGITAL RIGHTS MANAGEMENT

Jianwen Xiang, Weiqiang Kong, Kokichi Futatsugi, Kazuhiro Ogata

2006

Abstract

A common problem to current DRM-based services that usually offer streaming digital content and support period pricing (monthly or yearly subscription) systems is how to prevent secret (e.g., account and password) sharing beyond authorized consumers. Traditional technical solutions such as binding the secrets with specific devices can only solve this problem to some extent at the cost of user’s portability. Current legal measures also encounter some difficulties such as detecting the difference in the physical identity of the user. We propose a protocol, IBSPS (Incentives-based Secrets Protection System), to encourage the consumers to keep the secrets private rather than to share them among friends. With IBSPS, a content provider can also get more revenue by attracting more honest and authorized consumers in return, even the provider has to pay an amount of money as a positive incentive for the consumers to protect the secrets. An escrow service is used in IBSPS to receive registrations and allocate the incentive. We analyze this system and show that multiple registration and collusion between users can not get a higher payment than honest one-time registration and not sharing.

References

  1. Bao, F., Deng, R. H., and Mao, W. (1998). Efficient and practical fair exchange protocols with off-line ttp. In 1998 IEEE Symposium on Security and Privacy, pages 77-85, Oakland, CA. IEEE Computer Society.
  2. Bradley, W. B. and Maher, D. P. (2004). The NEMO P2P service orchestration framework. In Proceedings of The 37th Annual Hawaii International Conference on System Sciences (HICSS-37). IEEE.
  3. EC (2002). Digital rights: Background, systems, assessment. European Commission Staff Working Paper. Brussels, 14.02.2002, SEC(2002) 197.
  4. Golle, P., Leyton-Brown, K., Mironov, I., and Lillibrdge, M. (2001). Incentives for sharing in peer-to-peer networks. In EC'01, 3rd ACM Conference on Electronic Commerce, pages 264-267, Tampa, Florida, USA. ACM Press New York, NY, USA.
  5. Horne, B., Pinkas, B., and Sander, T. (2001). Escrow services and incentives in peer-to-peer networks. In EC'01, 3rd ACM conference on Electronic Commerce, pages 85-94, Tampa, Florida, USA. ACM Press New York, NY, USA.
  6. IBM (2001). IBM response to DVB-CPT call for proposals for content protection & copy management: xCP cluster protocal. Technical report.
  7. Margolin, N. B., Wright, M. K., and Levine, B. N. (2004). Analysis of an incentive-based secrets protection system. In DRM'04, 4th Internation Workshop on Digital Rights Management, pages 22-30, Washing, DC, USA. ACM.
  8. Microsoft (2004). A technicall overview of Windows Media DRM 10 for devices. Technical report, Microsoft Corporation.
  9. Mulligan, D. K., Han, J., and Burstein, A. J. (2003). How DRM-based content delivery systems disrupt expectations of “personal use”. In DRM'03, 3rd International Workshop on Digital Rights Management, pages 77- 89, Washington DC, USA. ACM.
  10. MusicAlly (2005). Napster users sharing passwords to save cash. http://www.theregister.co.uk/2005/04/08/ napster password sharing/.
  11. OMA (2005). OMA DRM V2.0 Candidate Enabler. http://www.openmobilealliance.org/release program/ drm v2 0.html.
  12. Zhou, Y.-B., Zhang, Z.-F., Qing, S.-H., and Liu, J. (2004). A new cembs based on rsa signatures and its application in constructing fair exchange protocol. In EEE'04, 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, pages 1-5. IEEE Computer Society.
Download


Paper Citation


in Harvard Style

Xiang J., Kong W., Futatsugi K. and Ogata K. (2006). ANALYSIS OF POSITIVE INCENTIVES FOR PROTECTING SECRETS IN DIGITAL RIGHTS MANAGEMENT . In Proceedings of WEBIST 2006 - Second International Conference on Web Information Systems and Technologies - Volume 2: WEBIST, ISBN 978-972-8865-47-4, pages 5-12. DOI: 10.5220/0001250000050012


in Bibtex Style

@conference{webist06,
author={Jianwen Xiang and Weiqiang Kong and Kokichi Futatsugi and Kazuhiro Ogata},
title={ANALYSIS OF POSITIVE INCENTIVES FOR PROTECTING SECRETS IN DIGITAL RIGHTS MANAGEMENT},
booktitle={Proceedings of WEBIST 2006 - Second International Conference on Web Information Systems and Technologies - Volume 2: WEBIST,},
year={2006},
pages={5-12},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001250000050012},
isbn={978-972-8865-47-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of WEBIST 2006 - Second International Conference on Web Information Systems and Technologies - Volume 2: WEBIST,
TI - ANALYSIS OF POSITIVE INCENTIVES FOR PROTECTING SECRETS IN DIGITAL RIGHTS MANAGEMENT
SN - 978-972-8865-47-4
AU - Xiang J.
AU - Kong W.
AU - Futatsugi K.
AU - Ogata K.
PY - 2006
SP - 5
EP - 12
DO - 10.5220/0001250000050012