Digital Rights Management in the Internet



Similar documents
A Robust Multimedia Contents Distribution over IP based Mobile Networks

Three short case studies

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop Presented by An In seok

PDF security - a brief history of development

Multicast vs. P2P for content distribution

Digital Rights Management

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011

Guidance Regarding Skype and Other P2P VoIP Solutions

How To Use A College Computer System Safely

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

DIRECTV Set Top Box and Content Protection Description

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Insight Guide. Encryption: A Guide

Advanced Peer to Peer Discovery and Interaction Framework

MovieLabs Specification for Enhanced Content Protection Version 1.0

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Cmix solution. CMix Japan Co. Ltd. Copyright (C) 2007 CMix Japan Co. Ltd. All Rights Reserved.

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Peer-to-Peer Replication

Digital Rights Management. Introduction

Adaptive Bitrate Multicast: Enabling the Delivery of Live Video Streams Via Satellite. We Deliver the Future of Television

Configuring Security Features of Session Recording

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Vs Encryption Suites

7 Key Management and PKIs

Digital Rights Management - The Difference Between DPM and CM

Best Practices in Digital Rights Management:

CipherShare Features and Benefits

Online Transaction Processing in SQL Server 2008

Bit Chat: A Peer-to-Peer Instant Messenger

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

White Paper. Enhancing Website Security with Algorithm Agility

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Top. Reasons Legal Firms Select kiteworks by Accellion

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching

GoToMyPC Corporate Advanced Firewall Support Features

Module 1: Facilitated e-learning

Content Teaching Academy at James Madison University

Managed Encryption Service

AT&T Connect Video conferencing functional and architectural overview

Savitribai Phule Pune University

Executable Integrity Verification

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

Seclore FileSecure. Securing Information Wherever it Goes. Extending Information Security Beyond Your Border

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Security vulnerabilities in the Internet and possible solutions

Mitel MiCollab Audio, Web and Video Conferencing

Measuring the Performance of Prefetching Proxy Caches

REGION 19 HEAD START. Acceptable Use Policy

Sync Security and Privacy Brief

Smart LNB. White Paper. May 2014

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Securing and protecting the organization s most sensitive data

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

BMC s Security Strategy for ITSM in the SaaS Environment

GROUPWARE. Ifeoluwa Idowu

A Proxy-based Architecture for Multimedia Transmission

Service Overview CloudCare Online Backup

What s New in Centrify DirectAudit 2.0

Classroom Management, part of Intel Education User Manual

List of Projects in Application

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Threat Events: Software Attacks (cont.)

Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale

Top. Enterprise Reasons to Select kiteworks by Accellion

IBM Security Privileged Identity Manager helps prevent insider threats

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Windows Remote Access

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

Digital Video Broadcasting Conditional Access Architecture

Foxit Reader Deployment and Configuration

Chapter 23. Database Security. Security Issues. Database Security

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications

How To Secure Shareware Kiteworks By Accellion

Computer System Management: Hosting Servers, Miscellaneous

Transcription:

Digital Rights Management in the Internet Jason But jbut@swin.edu.au Internet Applications Email Text/data transfer between individuals (one-to-one distribution of content) WWW Content publication (one-to-many distribution of content) Interactive Conferencing (private peer-to-peer communications) Games (Data typically not subject to theft) 2

Profitability of Applications Internet Applications involve costs Content development costs Artistic (Intellectual) Property Service Provision Costs Services will only remain viable if costs are recouped and a profit is made 3 Intellectual Property Content intellectually belongs to artist who created it Can be bought and sold (Copyright ownership) Copyright ownership can be viewed as an investment Return is required Typically involves payment by the consumer for the privilege of accessing the content 4

Copyright Generating Returns Traditional Methods of Generating Returns Public broadcase paid for by broadcaster via advertisers Pay-per-access paid for by viewers and pontentially advertisers Purchase CD or DVD type purchase involves purchase of right to access content, not to own it Potential Methods of Generating Returns on Digital Availability Pay-per-access by customers Public availability paid for by advertisements on web sites 5 Copyright Protection Digital copies are easy to make Theft is easy witness Napster Protection against digital theft is imperative If protection is not offered, Copyright owners will not make content available online and these types of applications will not exist 6

Copyright Protection Passive Watermarking (Message Hiding) Dependent on content type Used to help prosecute after theft has occurred Active Encryption (Message Scrambling) Theft of content occurs but decryption is hard Key Management becomes an issue Used to discourage theft through required outlay 7 Digital Rights Management Not just copy protection Collection of money for right to access content Determination of license provisions Delivery of license Enforcement of license provisions Copy Protection Watermarking Distribution of monies to content/service providers Framework above underlying delivery applications 8

Traditional Content Delivery Model Content Server Cache/Distributed Server Internet ISP/Local Network Content Flow 9 Cached Content Delivery Model Content Server Cache/Distributed Server Internet ISP/Local Network Content Flow 10

Cached Delivery Model with DRM Content Server Cache/Distributed Server Content Owner Network Internet ISP/Local Network Content and Copyright Management Content Flow Content Management 11 Encryption in Application Space Basic encryption of content is OK for simple storeand-forward type data Stored at cache in encrypted form Forwarded to authorised used for decryption and usage What about complex data access? Streaming Audio/Video Access to databases Interactive Applications 12

Encryption in Application Space Caches must be smart, provide more functionality than just store-and-forward Distributed Server Architectures Encryption becomes integral part of caching problem Content must be protected Caches must still provide complex functionality. Caching digital content has implications for how Copyright protection is done 13 Encryption of Cached Content Encrypted Content must be stored on caches Real-time encryption of data has scalability issues Caches vulnerable to attack for theft purposes Cache implementations will be provided by numerous vendors Not all will agree to implement a complex encryption algorithm Incompatibilities between implementations Selection of implementation by a content/service provider locks them into a monopoly Less competition amongst platform providers => higher costs 14

Encryption of Cached Content Selected cipher must be compatible with all caching implementations Including those with no encryption capabilities No problem for store-and-forward, an encrypted file is treated the same as a plaintext file Advanced functionality, encrypt data but leave metadata as plaintext so existing products can continue to deliver services Examples Streaming Audio/Video Distributed servers should still provide advanced playback functionality Database accesses Queries into encrypted data without knowing the contents of that data must be supported 15 Summary Internet will continue to grow, supporting new applications Digital Rights Management must be implemented on applications that seek to be profitable Copy protection is an aspect of Digital Rights Management Caching entails multiple digital copies of content are littered throughout the network Copy protection schemes must be compatible with existing caching schemes If caching involves advanced functionality, then this must be taken into account Copy protection, particularly encryption and watermarking schemes must be implemented with compatibility with existing systems in mind 16