A DRM Architecture for Securing User Privacy by Design
Daniel Kadenbach, Carsten Kleiner, Lukas Grittner
2007
Abstract
Privacy considerations are one serious point against current DRM systems, because they would allow the License-Issuers to collect large amounts of user data, up to the time a user listens to a song or which users are reading which kind of books. This sort of data could be used for marketing purposes but also for malicious deeds. This paper addresses this threat and establishes a DRM architecture which protects user privacy by the core of its design by adding a third trusted party and an appropriate communication protocol. The work was influenced by a project in mobile DRM based on the OMA specification [1].
References
- Open Mobile Alliance: OMA Digital Rights Management V2.0 Specifications (2006) http://www.openmobilealliance.org/release program/drm v2 0.html.
- Free Software Foundation: Digital restrictions management and treacherous computing (2006) http://www.fsf.org/campaigns/drm.html.
- Erickson, J.S.: Fair use, drm, and trusted computing. Commun. ACM 46 (2003) 34-39
- Cooper, A., Martin, A.: Towards an open, trusted digital rights management platform. In: DRM 7806: Proceedings of the ACM workshop on Digital rights management, New York, NY, USA, ACM Press (2006) 79-88
- Cohen, J.E.: DRM and privacy. Commun. ACM 46 (2003) 46-49
- Grimm, R., Puchta, S., Mü ller, M.: privacy4drm (2005) https://www.datenschutzzentrum.de/drm/privacy4drm.pdf.
- Grimm, R.: Privacy for digital rights management products and their business cases (2005) http://www.uni-koblenz.de/ grimm/texte/Privacy4DRM Tech-Axmedis-Grimm-final.pdf.
- Michiels, S., Verslype, K., Joosen, W., Decker, B.D.: Towards a software architecture for drm. In: DRM 7805: Proceedings of the 5th ACM workshop on Digital rights management, New York, NY, USA, ACM Press (2005) 65-74
- Arnab, A., Hutchison, A.: Fairer usage contracts for drm. In: DRM 7805: Proceedings of the 5th ACM workshop on Digital rights management, ACM Press (2005) 1-7
- Vora, P., Reynolds, D., Dickinson, I., Erickson, J., Banks, D.: Privacy and digital rights management. In: In Proceedings of the W3C Workshop on Digital Rights Management (Sophia-Antipolis, France, Jan. 22-23, 2001). (2001)
- Choudhury, S.: Public Key Infrastructure Implementation and Design. Wiley & Sons (2002)
- Iwasa, K., Durand, J., Rutt, T., Peel, M., Kunisetty, S., Bunting, D.: Web services reliable messaging tc, ws-reliability 1.1 (2004) http://docs.oasis-open.org/wsrm/wsreliability/v1.1/wsrm-ws reliability-1.1-spec-os.pdf.
Paper Citation
in Harvard Style
Kadenbach D., Kleiner C. and Grittner L. (2007). A DRM Architecture for Securing User Privacy by Design . In Proceedings of the 5th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2007) ISBN 978-972-8865-96-2, pages 188-195. DOI: 10.5220/0002422301880195
in Bibtex Style
@conference{wosis07,
author={Daniel Kadenbach and Carsten Kleiner and Lukas Grittner},
title={A DRM Architecture for Securing User Privacy by Design},
booktitle={Proceedings of the 5th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2007)},
year={2007},
pages={188-195},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002422301880195},
isbn={978-972-8865-96-2},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 5th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2007)
TI - A DRM Architecture for Securing User Privacy by Design
SN - 978-972-8865-96-2
AU - Kadenbach D.
AU - Kleiner C.
AU - Grittner L.
PY - 2007
SP - 188
EP - 195
DO - 10.5220/0002422301880195