Browse > Article
http://dx.doi.org/10.3745/JIPS.2010.6.2.253

A License Audit Model for Secure DRM Systems in IP-based Environments  

Jang, Ui-Jin (Dept. of Computer Engineering, Soongsil University)
Lim, Hyung-Min (Dept. of Computer Engineering, Soongsil University)
Shin, Yong-Tae (Dept. of Computer Engineering, Soongsil University)
Publication Information
Journal of Information Processing Systems / v.6, no.2, 2010 , pp. 253-260 More about this Journal
Abstract
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.
Keywords
Digital Forensic; DRM; IP-Based Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kevin Mandia, Chris Prosise, Matt Pepe, “Incident response and computer forensic, Second Edition,” McGraw-Hill, 2003.
2 Warren G, Kruse II, Jay G.Heiser, “COMPUTER forensic: Incident Response Essentials,” Addison Wesley, 2001.
3 Qiong Liu, Reihaneh Safavi-Naini and Nicholas Paul Sheppard, “Digital rights management for content distribution,” AISW2003, 2003.
4 OMA, “OMA DRM Requirements Version 2.0,” 2004.
5 MPEG-21 Overview v.5, ISO/IEC JTC1/SC29/WG11 N5231, Shanghai, 2002.
6 DMP, “TIRAMISU(IST-2003-506983) DRM Requirements,” 2004.
7 RFC 3227, “Guidelines for Evidence Collecting and Archiving,” http://www.faqs.org/rfcs/rfc3227-.html. 2002.
8 Mariusz Burdach, “Forensic Analysis of a Live Linux System I,” http://www.securityfocus.com/infocus/1769. 2004.
9 Mariusz Burdach, “Forensic Analysis of a Live Linux System II,” http://www.securityfocus.com/infocus/1773 , 2004.
10 Seok-Hee Lee, “A Study of Memory Information Collection and Analysis in a view of Digital forensic in Window System,” Center for Information Technologies, Korea University, 2006. 2.