DOI QR코드

DOI QR Code

The method for protecting contents on a multimedia system

멀티미디어 시스템에서 콘텐츠를 보호하기 위한 방법

  • Published : 2009.07.31

Abstract

As a DRM is recently being removed from many sites, the content protection on a video server becomes important. However, many protection methods have their own limitations, or aren't used due to the deterioration of the streaming performance. This paper proposes a content protection method that uses both the eCryptFS and the SELinux at the same time, and measures the performance of the proposed method by using various benchmarks. Then, this paper verifies that the method doesn't significantly decrease the streaming performance although the proposed method decreases the other performances, so it can be used for the content protection in a multimedia system.

DRM이 최근에 많은 사이트에서 제거되어짐에 따라 비디오 서버 상에서 콘텐츠 보호는 중요해졌다. 그러나 기존에 존재하는 보호 방법들은 한계 들을 가지거나 스트리밍 성능을 저하시키므로 사용되어지지 않는다. 본 논문은 eCryptFS와 SELinux를 사용하는 콘텐츠 보호 방법을 제안하고 다양한 벤치마크들을 사용하여 제안한 방법의 성능을 측정한다. 그런 후 본 논문은 제안한 방버이 다른 성능 들은 저하시키지만 스트리밍 성능은 저하시키지 않아서 콘텐츠 보호를 위하여 사용할 수 있다는 것을 증명한다.

Keywords

References

  1. EMI group, EMI Music launches DRM-free superior sound quality downloads across its entire digital repertoire, http://www.emigroup.com/Press/2007/press18.htm, April 2007.
  2. Erin. J., Amazon To Sell DRM-Free Music, http://www.internetnews.com/ec-news/article.php/3678181, May 2007.
  3. Rosenblatt. B. & Dykstra. G., "Integrating content management with digital rights management: Imperatives and opportunities for digital content lifecycles", Technical report, Giantsteps Media Technology and Dykstra Research. May 14 2003.
  4. Zadok, E., Badulescu, I., & Shender, A., "Cryptfs: A stackable vnode level encryption file system", Technical Report CUCS-021-98, Computer Science Department, Columbia University, 1998.
  5. Halcrow, M., "eCryptfs: a stacked cryptographic filesystem", Linux Journal. Vol. 2007, Issue 156, April 2007.
  6. Spencer. R., Smalley, S., Loscocco, P., Hibler. M., Andersen, D., & Lepreau, J., "The Flask Security Architecture: System support for diverse security policies", Proc. of the 8th USENIX Security Symposium, pp. 123-139, Washington, DC, August 1999.
  7. Arnab. A., & Hutchison. A., "Digital rights management-a current review", Departmental Technical Report No. cs04-04-00, University of Cape Town, 2004.
  8. Felten, E. W., "A skeptical view of DRM and fair use", Communications of the ACM. Vol. 46, No. 4, pp. 56-59, 2003.
  9. Schneier. B., "Applied Cryptography", 2nd Ed., John Wiley & Sons, 1995.
  10. Daemen, J., & Rijmen, V., "The Design of Rijndael: AES - The Advanced Encryption Standard", Springer-Verlag, 2002.
  11. Adams, C., "The CAST-128 encryption algorithm", RFC 2144, Network Working Group, May 1997.
  12. Schneier, B., Kelsey, J., Whiting. D., Wagner, D., Hall, C., & Ferguson, N., "The Twofish Encryption Algorithm: A 128-Bit Block Cipher", John Wiley & Sons, 1999.
  13. Wright, C. P., Dave, J., & Zadok, E., "Cryptographic file system performance: What you don't know can hurt you", Proc. of 2003 IEEE Security In Storage Workshop, pp. 47-61, October 2003.
  14. 고영웅, "보안 운영체제를 위한 강제적 접근 제어 보호 프로파일", 한국컴퓨터정보학회 논문지, 제 10권, 제 1호, 141-148쪽, 2005년 3월.
  15. Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R., "Proposed NIST standard for role-based access control", ACM Transactions on Information System Security, Vol. 4, No. 3, pp. 224-274, 2001. https://doi.org/10.1145/501978.501980
  16. Niemi, D. C., Unixbench 4.1.0, http://www.tux.org/pub/tux/niemi/unixbench
  17. McVoy, L., & Staelin, C., lmbench 2, http://sourceforge.net/projects/lmbench
  18. textuality-Bonnie, http://www.coker.com.au/bonnie++/
  19. Darwin Streaming Server, http://dss.macosforge.org/post/previous-releases/
  20. WinDump: tcpdump for Windows, http://www.mirrorservice.org/sites/ftp.wiretapped.net/pub/security/packet-capture/winpcap/windump/
  21. 고영웅, "보안 운영체제의 오버헤드 분석", 한국 컴퓨터정보학회 논문지, 제 10권, 제 2호, 11-19쪽, 2005년 5월.