TY - JOUR
T1 - Content sharing schemes in DRM systems with enhanced performance and privacy preservation
AU - Davidson, Michal
AU - Tassa, Tamir
AU - Gudes, Ehud
N1 - Publisher Copyright:
© 2016 - IOS Press and the authors. All rights reserved.
PY - 2016
Y1 - 2016
N2 - We present a solution to the problem of content sharing in digital rights management (DRM) systems. Users in DRM systems purchase content from content providers and then wish to distribute it between their own devices or to other users. The goal is to allow the sharing of such content, with the control of the content provider, while ensuring that it complies with the content's usage rules. We also address in this paper the subject of protecting users' privacy during the content sharing; to the best of our knowledge no study thus far addressed this topic. While most of the previous studies on content sharing in DRM systems assume the existence of authorized domains, ours does not make that assumption. The solutions that we present here are based on Certified Sharing Requests which are used when devices request from the content provider to share content with other devices. Our solutions enhance the usability of DRM, from both the users' and content provider's perspective, by supporting on-the-fly sharing, sharing and re-sharing of controlled content, a pay-per-share business model, and privacy preservation.
AB - We present a solution to the problem of content sharing in digital rights management (DRM) systems. Users in DRM systems purchase content from content providers and then wish to distribute it between their own devices or to other users. The goal is to allow the sharing of such content, with the control of the content provider, while ensuring that it complies with the content's usage rules. We also address in this paper the subject of protecting users' privacy during the content sharing; to the best of our knowledge no study thus far addressed this topic. While most of the previous studies on content sharing in DRM systems assume the existence of authorized domains, ours does not make that assumption. The solutions that we present here are based on Certified Sharing Requests which are used when devices request from the content provider to share content with other devices. Our solutions enhance the usability of DRM, from both the users' and content provider's perspective, by supporting on-the-fly sharing, sharing and re-sharing of controlled content, a pay-per-share business model, and privacy preservation.
KW - Digital rights management
KW - authorized domain
KW - certified sharing requests
KW - content sharing and re-sharing
KW - proxy re-encryption
UR - http://www.scopus.com/inward/record.url?scp=85002157897&partnerID=8YFLogxK
U2 - 10.3233/JCS-15746
DO - 10.3233/JCS-15746
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85002157897
SN - 0926-227X
VL - 24
SP - 667
EP - 688
JO - Journal of Computer Security
JF - Journal of Computer Security
IS - 6
ER -