Abstract
Digital Rights Management (DRM) is the term associated with the set of technologies to prevent illegal multimedia content distribution and consumption. DRM systems generally involve multiple parties such as owner, distributors, and consumers. The owner issues redistribution licenses to its distributors. The distributors in turn using their received redistribution licenses can generate and issue new redistribution licenses to other distributors and new usage licenses to consumers. As a part of rights violation detection, these newly generated licenses must be validated by a validation authority against the redistribution license used to generate them. The validation of these newly generated licenses becomes quite complex when there exist multiple redistribution licenses for a media with the distributors. In such cases, the validation process requires validation using an exponential number (to the number of redistribution licenses) of validation inequalities and each validation inequality may contain up to an exponential number of summation terms. This makes the validation process computationally intensive and necessitates to do the validation efficiently. To overcome this, we propose validation tree, a prefix-tree-based validation method to do the validation efficiently. Theoretical analysis and experimental results show that our proposed technique reduces the validation time significantly.
- Agrawal, R. and Srikant, R. 1994. Fast algorithms for mining association rules. In Proceedings of the 20th International Conference on Very Large Data Bases (VLDB). Vol. 1215. 487--499. Google Scholar
Digital Library
- Alessi, A. 2007. Internet protocol television (IPTV). Ph.D. thesis.Google Scholar
- Arnab, A. and Hutchison, A. 2005. Fairer usage contracts for DRM. In Proceedings of the 5th ACM Workshop on Digital Rights Management. 1--7. Google Scholar
Digital Library
- Burdick, D., Calimlim, M., Flannick, J., Gehrke, J., and Yiu, T. 2005. Mafia: A maximal frequent itemset algorithm. IEEE Trans. Knowl. Data Engin. 1490--1504. Google Scholar
Digital Library
- Chiariglione, L. A walkthrough in the interoperable DRM platform v. 3.0 specification. Tech. rep. http://www.dmpf.org/documents/walkthrough_in_idp-3.htmGoogle Scholar
- Chuang, K. T., Huang, J. L., and Chen, M. S. 2008. Mining top-k frequent patterns in the presence of the memory constraint. VLDB J. 17, 5, 1321--1344. Google Scholar
Digital Library
- Chui, C. K., Kao, B., and Hung, E. 2007. Mining frequent itemsets from uncertain data. In Advances in Knowledge Discovery and Data Mining, Vol. 4426, Springer, 47--58. Google Scholar
Digital Library
- Eavis, T. and Zheng, X. 2009. Multi-Level frequent pattern mining. In Proceedings of the Conference on Database Systems for Advanced Applications (DASFAA). 369--383. Google Scholar
Digital Library
- Garcia, R. and Gil, R. 2010. Content value chains modelling using a copyright ontology. Inf. Syst. 35, 4, 483--495. Google Scholar
Digital Library
- Han, J., Pei, J., Yin, Y., and Mao, R. 2004. Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Min. Knowl. Discov. 8, 1, 53--87. Google Scholar
Digital Library
- Hwang, S. O., Yoon, K. S., Jun, K. P., and Lee, K. H. 2004. Modeling and implementation of digital rights. J. Syst. Softw. 73, 3, 533--549. Google Scholar
Digital Library
- Iannella, R. 2006. Digital rights management. In Handbook of Information Security, H. Bidgoli, Ed, Vol. 3, Wiley.Google Scholar
- Iannella, R. 2008. Rights management and licensing multimedia services. Intelligence (sci) 120, 327--349.Google Scholar
- Jamkhedkar, P. A. and Heileman, G. L. 2009. Digital rights management architectures. Comput. Electric. Engin. 35, 2, 376--394. Google Scholar
Digital Library
- Knuth, D. E. 1998. The Art of Computer Programming, Vol. 3: Sorting and Searching. Addison Wesley Longman Publishing Co., Inc. Redwood City, CA. Google Scholar
Digital Library
- Li, H., Zhao, L., Wang, C., and Ma, F. 2010. DRM system for multiple cascaded business operators. In Proceedings of the International Conference on Multimedia and Expo (ICME).Google Scholar
- Liu, G., Lu, H., Lou, W., Xu, Y., and Yu, J. X. 2004. Efficient mining of frequent patterns using ascending frequency ordered prefix-tree. Data Min. Knowl. Discov. 9, 3, 249--274.Google Scholar
Cross Ref
- Mahanta, V. S. 2010. Multi-level supply chain disruption and coordinated response. Ph.D. thesis, Drexel University.Google Scholar
- O'Driscoll, G. 2008. Next Generation IPTV Services and Technologies. Wiley-Interscience. Google Scholar
Digital Library
- Rojas, C. and Nasraoui, O. 2007. Summarizing evolving data streams using dynamic prefix trees. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence. IEEE Computer Society Los Alamitos CA, 221--227. Google Scholar
Digital Library
- Sachan, A., Emmanuel, S., and Kankanhalli, M. 2010. Efficient aggregate licenses validation in DRM. In Proceedings of the Conference on Database Systems for Advanced Application(DASFAA'2010). Springer, 313--319. Google Scholar
Digital Library
- Sachan, A., Emmanuel, S., and Kankanhalli, M. S. 2009. Efficient license validation in MPML DRM architecture. In Proceedings of the 9th ACM Workshop on Digital Rights Management(DRM'09). 73--82. Google Scholar
Digital Library
- Sans, T., Cuppens, F., and Cuppens-Boulahia, N. 2007. OPA: Onion policy administration model-Another approach to manage rights in DRM. Int. Fed. Inf. Process. 349--360.Google Scholar
- Van der Veen, J. and Venugopal, V. 2005. Using revenue sharing to create winwin in the video rental supply chain. J. Oper. Res. Soc. 56, 7, 757--762.Google Scholar
Cross Ref
Index Terms
Aggregate licenses validation for digital rights violation detection
Recommendations
Efficient license validation in MPML DRM architecture
DRM '09: Proceedings of the nineth ACM workshop on Digital rights managementMultiparty multilevel DRM architecture (MPML-DRM-A) involves multiple parties such as owner, multiple levels of distributors and consumers. The owner issues redistribution licenses to its distributors, who in turn generate and issue variations of these ...
Rights violation detection in multi-level digital rights management system
A multi-level digital rights management (DRM) system consists of owner, multiple levels of distributors and consumers. The distributors and consumers are given redistribution and usage rights using redistribution and usage licenses respectively. However,...
Computation time efficient approach for licenses validation in DRM systems
Digital rights management (DRM) systems are employed to securely deliver the digital contents from owners/creators to consumers. Often multiple middle level distributors are involved in the distribution process. Initially, the owner issues ...








Comments