Piracy Protection for Streaming Content in Home Networks
نویسندگان
چکیده
In this paper we study content protection techniques to defend against piracy for streaming content in home networks where multiple digital devices are connected into a peer-based cluster and seamlessly work together. We are particularly interested in the anonymous re-broadcasting attack where pirates re-distribute the per-content encrypting key or the decrypted plain content. In literature, to defend against an anonymous attack, content is usually built with different variations. For example, content is divided into multiple segments, each segment comes with multiple variations (e.g., watermarks), and each variation is differently encrypted. Each device only has the key to decrypt and play back one variation per segment through the content. The re-distributed keys can be linked back and used to identify the original devices (terms as traitors) who were given those keys and involved in the piracy. This technology works well for prerecorded content scenarios in which a trusted party outside the device pool can deliberately author the content with multiple variations. However it cannot be applied to a peer-based home network when the streaming content is brought into the home network via a peer device who is not a special trust party and who is not allowed to know the secret keys of other peer devices. On the other hand, the trend of the consumer appetite for digital content is increasingly switching from physical media to streaming and internet consumption. In this paper we have designed the first content protection system that allows a recording device inside the home network to bring the streaming content into the home network in a secure way that devices and only devices in the same home network can playback the recording. More importantly, the recorded content without variations can still be used to obtain forensic information, when anonymous piracy attacks occurs, to identify the source devices that participated in the piracy attack. The identified traitorous devices can be revoked for future content access. The technology described in this paper is used to enable the secure sharing of premium quality High Definition content across a consumer’s all audio-video devices at its home
منابع مشابه
Proactive Content Poisoning To Prevent Collusive Piracy in P2P File Sharing
Today’s peer-to-peer (P2P) networks are grossly abused by Illegal distributions of music, games, video streams, and popular software. These abuses have resulted in heavy financial loss in media and content industry. Collusive piracy is the main source of intellectual property violations within the boundary of P2P networks. This problem is resulted from paid clients (colluders) illegally sharing...
متن کاملIf Piracy Is the Problem, Is DRM the Answer?
security, content protection, digital rights management, trust, privacy, piracy Piracy of digital content is considered a serious problem by content companies. Digital Rights Management is considered a potential solution to this problem. In this paper we study to what degree DRM can live up to this expectation. We conclude that given the current and foreseeable state of technology the content p...
متن کاملDemand and Supply-side Dynamics of Piracy Diffusion in P2P Networks
Digital piracy, the sharing files of music on peer-to-peer (P2P) networks has been cited as the key threat to the music industry by distorting promoting plans of albums (Billboard.biz, 2009). To combat widespread digital piracy on file-sharing networks, the content industries have employed diverse anti-piracy strategies including pollution technologies and stronger copyright legislation for mus...
متن کاملCopyright-Protected Content Delivery in Open Peer-to-Peer Networks
Open peer-to-peer (P2P) networks are being grossly abused by illegal distribution of copyrighted music, games, video streams, and popular software. These abuses are resulted from lack of proper peer authentication, modifiable file indices, and unauthorized file access in a P2P network. Peer collusion is a major source of illegal sharing of content files among clients and pirates. We propose a n...
متن کاملThe Impact of Technical Copy Protection and Internet Services Usage on Software Piracy - An International Survey on Sequencer Software Piracy -
Software piracy has recently gained enormous attention, not only in the context of P2P-networks. As one countermeasure against software piracy, publishers have been implementing Digital Rights Management systems such as technical copy protection measures into their software products. This paper examines the impact of different technical copy protection measures and Internet services usage on so...
متن کامل