Browse > Article
http://dx.doi.org/10.9728/dcs.2011.12.2.165

Design and Evaluation of DRM Model with Strong Security Based on Smart Card  

Park, Jong-Yong (금오공과대학교 컴퓨터공학과)
Kim, Young-Hak (금오공과대학교 컴퓨터공학과)
Choe, Tae-Young (금오공과대학교 컴퓨터공학과)
Publication Information
Journal of Digital Contents Society / v.12, no.2, 2011 , pp. 165-176 More about this Journal
Abstract
Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.
Keywords
Smart card; Security; Digital Contents; Digital right management;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 L. Hu, Y. Yang, X. Niu. "Improved remote user authe ntication scheme preserving anonymity," Fifth Annual Conference on Communication Network and Servi ces Research, pp.323-328, 2007.
2 S Kim, H Rhee, J Chun, D Lee, "Anonymous and Traceable Authentication Scheme using Smart Cards," International Conference on Information Security and Assurance, pp.162-165, April, 2008.
3 M. L Das, A. Saxena, V. P Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Tra nsactions on Consumer Electronics, Vol.50, No. 2, pp. 629-631, May 2004.   DOI   ScienceOn
4 J. J Tardo, K. Alagappan, "SPX: Global Authenticati on Using Public Key Certificates," IEEE Symposium on Security and Privacy, pp.232-244, 1991.
5 S. Bhatkar, D. C DuVarney, and R. Sekar, "Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits," 12th USENIX, pp.105-120, 2003.
6 Announcing the Advanced Encryption Standard (A ES) [S]. FIPS Publication 197.
7 유경인, 김민재, 이진영, 조성제, 김준모, "모바일 콘텐츠의 안전한 부분암호화 방법에 대한 연구," 한국컴퓨터종합학술대회 논문집, Vol.35, No.1(D), 2008.
8 저작권 보호협회,"2010 저작권 보호 연차보고서," http:// www.cleancopyright.or.kr/data/document/2010_data_ mon0422.pdf, 2010.
9 최동현, 이병희, 김승주, 원동호, "DRM(Digital Rights Management) 기술," 한국정보과학회, 정보과학회지, 제25권 제5호(통권 제216호) May 2007.
10 Jiaming He, Hongbin Zhang, "Digital Right Manage ment Model Based on Cryptography and Digital Wat ermarking," December 2008 CSSE '08 : Proceedings of the 2008 International Conference on Computer Sc ience and Software Engineering - Volume 03, Dece mber 2008.
11 박종용, Offline 환경에서 스마트카드를 이용한 복제 방지 기법에 관한 연구, 금오공과대학교 석사논문, 20 10.
12 "Microsoft DRM", http://www.microsoft.com/windows/windowsmedia/drm/default.aspx
13 Hung-Min Sun, Chi-Fu Hung, Chien-Ming Chen, "An Improved Digital Rights Management System Based on Smart Cards," Digital EcoSystems and Technologies Conference, 2007. DEST '07. Inaugural IEEE-IES.
14 임영이, 이윤철, 강회일, 이동일, "스마트카드 시스템의 보안 기술," [ETRI]전자통신동향분석 제14권 제5호, June 2001.