Rights Protection of Digital Content in the DRM Environment
Total Page:16
File Type:pdf, Size:1020Kb
ResearchOnline@JCU This file is part of the following reference: Cahya Prihandoko, Antonius (2015) Rights protection of digital content in the DRM environment. PhD thesis, James Cook University. Access to this file is available from: http://researchonline.jcu.edu.au/39300/ The author has certified to JCU that they have made a reasonable effort to gain permission and acknowledge the owner of any third party copyright material included in this document. If you believe that this is not the case, please contact [email protected] and quote http://researchonline.jcu.edu.au/39300/ Thesis Rights Protection of Digital Content in the DRM Environment submitted by: Antonius Cahya Prihandoko under supervision: Associate Professor Bruce Litow Dr Hossein Ghodosi for the degree of Doctor of Philosophy at the Discipline of Information Technology College of Business, Law and Governance James Cook University 2015 ii Keywords Anonymous cash, Blind decryption, Chaotic maps, Content provider’s security, Digi- tal rights management, Digital watermarking, Oblivious content distribution, Trai- tor deterring mechanism, Traitor tracing schemes, Users’ privacy, White-box imple- mentation. iii iv Statement of the Contribution of Others 1. Editorial assistance from a professional editor is used in preparing the final thesis. I have read and complied with the Guidelines for the Editing of Re- search Theses by Professional Editors. Professional editors, Alan and Jean Dartnall, provided copy editing and proofreading services, according to the guidelines laid out in the university-endorsed national Guidelines for editing research theses. This editorial work was funded by School of Business, James Cook University. 2. All published papers within my candidature were prepared under supervision Dr Hossein Ghodosi and Associate Professor Bruce Litow. Antonius Cahya Prihandoko March 2015. v vi Declaration I declare that 1. I have stated clearly and fully in the thesis the extent of any collaboration with others. To the best of my knowledge and belief, the thesis contains no material previously published or written by any other person except where due reference and acknowledgement has been made. 2. Every reasonable effort has been made to gain permission and acknowledge the owners of copyright material. I would be pleased to hear from any copyright owner who has been omitted or incorrectly acknowledged. 3. This thesis is my own work and has not been submitted in any form for another degree or diploma at any university or other institution of tertiary education. Information derived from the published or unpublished work of others has been acknowledged in the text and a list of references is given. Antonius Cahya Prihandoko March 2015. vii viii Acknowledgments Praise to the Lord Jesus Christ for He has been a constant source of strength and help throughout my life, including study and this project. All I have and reach are because of His mercy. The Directorate General of Higher Education of Republic of Indonesia, deserves much appreciation for their generous scholarship and other non-material assistance. Without them, I would not be here. I gratefully acknowledge the assistance of my supervisors, Associate Professor Bruce Litow and Dr Hossein Ghodosi, and my research student monitor, Dr Steve Campbell, during the conduct of this research and for their careful reading of this thesis during preparation. Sincere thanks must go to all staffs of the Discipline of Information Technology, the College of Business, Law and Governance (School of Business), the Graduate Research Study, the Teaching and Learning Development, and the International Office of the James Cook University for their warmest treat- ment during my study at JCU. Special thanks to Dr Liz Tynan and Ms Kellie Johns who generously conducted supporting programs to improve my writing and research skills. I would like to thank also some experts. Dr Renato Ianella from W3C ODRL Community Group, Dr Ghita Stefan and Professor Victor Patriciu from Military Technical Academy, Bucharest, Romania, for their explanation of Digital Rights Management. Dr Brecht Wyseur from Nagra, Belgium, for his valuable insight into white-box cryptography. Professor Ingemar J. Cox from University College London, ix Dr Alessandro Piva from University of Florence, Italy, and Dr Jeffrey Bloom, for useful information about digital watermarking for copy protection. Dr Jae Park from University of Texas at San Antonio, for his explanation of the concept of usage control. Dr Jeff Lotspiech from IBM for his valuable clarification of his traitor tracing scheme. Some images used in Chapter 5 are taken from the University of Southern California - Signal and Image Processing Institute (USC-SIPI) Image Database (sipi.usc.edu/database). The USC-SIPI provide this image database for free to sup- port research in image processing, image analysis and machine vision. Much appreciation goes to my parents, Bapak J.B. Mulyono and Ibu M. Sri Mulyati, my parents-in-law, Bapak J.B. Elias and Ibu M.V. Roesmi, and all relatives. Their great support has a special place in my heart. I owe them a debt that can never be repaid. Finally, and most importantly, I dedicate this thesis to my dearest wife Juliana Ririet Ellyperwati, my lovely son, Stanislaus Jiwandana Pinasthika, and my lovely daughter, Beatrix Jayanimittakirana Anindyakencana, who always encouraged and inspired me while I was studying here. They gave me the spirit and support while they were away, and brought colorful days when they were beside me. It showed me how important they are in my life. Forever. Antonius Cahya Prihandoko March 2015. x Abstract In electronic-business settings, content providers produce digital goods/services (such as, games, images, softwares, etc.) which consumers/users wish to purchase. In ge- neral, mass-production of digital goods/services is possible if an instance of the goods/services is made available. Digital Rights Management (DRM) mainly consi- ders technological approaches to protect content providers’ rights on their original products (also known as, intellectual property) against illegal reproduction of the goods/services (also known as, piracy). Due to the wide range and different types of digital goods, several DRM systems have been studied in the literature. Many existing DRM systems, however, focus on the security of the content provider and often neglect the users’ privacy. The problem statement of this thesis is devising DRM systems that protect users’ privacy while content provider’s security is maintained. To achieve this goal during the life-time of the digital content, we distinguish three phases/stages. 1. At the time of purchase – At this stage, user issues a request for purchasing, and payment is processed in accordance with the content provider’s procedure. Protecting users’ privacy is mainly achieved by minimising personal data ac- quisition. To construct a DRM system with this characteristic, I employ two mechanisms, namely anonymous cash and blind decryption. Anonymous cash allows anonymity of the user (similar to paying cash in daily shopping, which makes it impossible to trace the customer), while blind decryption is used to hide the identity of the purchased item (e.g., one may buy two items from xi video-shop without revealing their names to the shop-keeper). In this thesis, both schemes are improved to preserve security and privacy when price va- riation and buyer authorisation are applied in the content transaction. The improvements are discussed in Chapter 3. 2. At the time of content delivery – In daily shopping, customers possess purcha- sed items, i.e., delivery is done directly and there is no doubt that the customer has received the goods. In electronic-business settings, however, the goods are delivered via electronic devices/channels. To make sure that unauthorised users cannot intercept the line and obtain a copy (which is identical to the original) of the goods, a common practice is to encrypt the content. Note that an unauthorised user still can intercept the line and obtain a copy of the encrypted material, but utilisation of the goods/services implies decryption of the material which is believed to be impossible by unauthorised users, while legitimate users who receive the key can decrypt the content and use it. Se- curing content delivery relies on the secrecy of the cryptographic keys. In this thesis, I employ two approaches, namely obfuscation and obliviousness, and present two schemes for securing content delivery in DRM systems. Each of these schemes has been presented at, and appeared in, the Proceedings of the International Conference on Computer Science and Information Technology (CSIT) 2013 and the Information System International Conference (ISICO) 2013, respectively. Their details are presented in Chapter 4. 3. At the time of usage – After the goods/services are delivered, decrypted, and made available to the customer/user, a dishonest/malicious user may wish to make profit by reproducing (e.g., simply generating a copy of it) and selling to others. This phase/stage of the system is the longest and more complicated. DRM systems have introduced several techniques (e.g., copyrights, watermar- king, traitor tracing, etc.) to protect content providers and prevent piracy. In xii this project, I study these techniques and improve some of the existing tech- niques. First of all, I study digital watermarking that is viewed as a potential tool for preserving protection of digital content. I employ chaotic maps to construct some blind watermarking schemes and achieve perfect security of watermark. These schemes are presented in Chapter 5. One of the schemes has been presented at the IEEE International Conference on Information Tech- nology and Applications (ICITA) 2014. With the aid of digital watermarking and motivated by some traitor tracing schemes, I construct a traitor deterring scheme. This mechanism prevents users from constructing a pirate decoder and pirate content. This scheme was presented at the IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) 2013. The detail of this scheme is presented in Chapter 6.