Autosoft Journal

Online Manuscript Access


Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario


Authors



Abstract

A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefits of two stakeholders, which are DRM Providers and contents Sharer who is a category of consumers. A dynamic and mixed game and its algorithm were proposed, where Sharer’s strategies were whether to employ the trusted computing enabling devices and related components or not, as well as Providers’ strategies included entirely general security, entirely enhanced security and dynamic security policies. We concluded from both game-theoretic analyses and Swarm simulation experiments that the number of acquired sharable digital rights and security cost have a direct effect on Sharers choices of the enhanced security policy, and also their different basic sharing modes including partial, modest and extensive sharing, further influence the choice of Providers. Besides, with respect to the mixed sharing mode far more similar to a real contents sharing scenario, Dynamic security strategy is superior to the entirely enhanced security in the context of limited sharable rights and higher security costs, but with the acquisition of much more rights and the decrease of enhanced security overhead, the latter strategy would be optimal and stable as a Nash Equilibrium for stakeholders, in combination with the exploitation of effective business models of contents industry.


Keywords


Pages

Total Pages: 13
Pages: 191-203

DOI
10.1080/1079-8587.2011.10643142


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 17
Issue: 2
Year: 2011

Cite this document


References

DRM Rights Expression Language Candidate Version 2.l.Open Mobile Alliance, 2007.

R. Pucella and V. Weissman, “A formal foundation for ODRL,” Proceedings of Workshop on Issues in the Theory of Security, Barcelona, Spain, 2004.

Z. Y. Zhang, Q. Q. Pei, J. F. Ma, L. Yang, and K F. Fan, “A Fine-grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement,” Proceedings of International Conference of Computational Intelligence and Security, Suzhou, China, 2008.

C. Hibbert, “A copy protection and content management system from The DVB. The DVB Consortium,” http://www.dvb.org/documents/newsletters/DVB-SCENE-OS-CopyProtectionArticle.pdf, 2005.

DRM Architecture Candidate Version 2. l .Open Mobile Alliance, 2007.

P. Koster, J. Montaner, N. Koraichi, and S. Iacob, “Introduction of the domain issuer in OMA DRM,” Proceedings of 2007 4th Annual IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, USA, pp.940–944, 2007.

H. KIM, Y. Lee, B. Chung, H. Yoon, J. Lee, and K Jung, “Digital Rights Management with right delegation for home networks,” Proceedings of 9th International Conference on Information Security and Cryptology, M.S. Rhee and B. Lee (Eds.): LNCS 4296, pp. 233–245, 2006.

P. Koster, F. Kamperman, P. Lenoir, and K Vrielink, “Identity-based DRM: personal entertainment domain,” Proceeding of Transactions on Data Hiding and Multimedia Security, LNCS 4300, pp. 104–122, 2006.

B. Popescu, B. Crispo, A. Tanenbaum, and F. Kamperman, “A DRM security architecture for home networks,” Proceedings of 4th ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 1–10, Oct. 2004.

A. Cooper and A Martin, “Towards an Open, Trusted Digital Rights Management Platform,” Proceedings of 2006 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, 2006.

TCG PC Specific Implementation Specification Version 1.1, https://www.trusted computinggroup.org/specs/PCClient, 2003.

TCG Mobile Reference Architecture Specification Version 1.0, https://www.trusted computinggroup.org/specs/mobilephone, 2008.

Heileman, Gregory L. et al. "The Drm Game." Proceedings of the 2007 ACM workshop on Digital Rights Management - DRM ”07 (2007): n. pag. Crossref. Web. https://doi.org/10.1145/1314276.1314287

Z. Y. Zhang, Q. Q. Pei, J. F. Ma, L. Yang, and K. F. Fan, “Cooperative and Non-cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM,” Proceedings of 5th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications, Satellite Workshop of 6th IEEE Consumer Communications & Networking Conference, Las Vegas, Nevada, USA, 2009.

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/