Multimedia Tools and Applications

, Volume 69, Issue 3, pp 1041–1065 | Cite as

An anonymous DRM scheme for sharing multimedia files in P2P networks

  • Yi-Ming Chen
  • Wei-Chen Wu


Peer-to-Peer (P2P) systems enable efficient multimedia file sharing and are inherently scalable on the Internet. However, the absence of a centralized authority and a suitable Digital Right Management (DRM) mechanism prompts many securities-related challenges and discourages the widespread use of P2P networks for distributing copyright-protected multimedia files. To address these issues, we adopt the concept of a group Diffie-Hellman group key and threshold scheme to propose a novel anonymous DRM scheme for P2P users that wish to share multimedia files. Our scheme has four features: (1) the P2P users remain anonymous while sharing their files, (2) no online server is needed to perform the DRM operations, (3) an adjustable mechanism exists for efficiently distributing multimedia files with different popularities, and (4) users enjoy low communication and computation costs. In addition to explaining the operations of this scheme, we also compare its performance and security with Zhang et al.’s design, TLMS and Lua’s Scheme within the context of this study.


Anonymity P2P DRM Group key Digital content sharing 


  1. 1.
    Chaum D (1982) Blind signatures system. In: Advances in cryptology, CRYPTO’82, pp 153–156Google Scholar
  2. 2.
    Chaum D (1983) Blind signatures for untraceable payments. In: Advances in cryptology, CRYPTO’83, vol 82, pp 199–203Google Scholar
  3. 3.
    Chaum D (1988) Blinding for unanticipated signatures. In: Advances in cryptology, EUROCRYPT’87, pp 227–233Google Scholar
  4. 4.
    Chen H, Hsueh S (2003) Light-weight authentication and billing in mobile communications. In: IEEE 37th annual 2003 international carnahan conference on security technology, Proceedings. IEEE, pp 245–252Google Scholar
  5. 5.
    Chu C, Su X, Prabhu B, Gadh R, Kurup S, Sridhar G, Sridhar V (2006) Mobile DRM for multimedia content commerce in P2P networks. In: IEEE consumer communications and networking conference, pp 1119–1123Google Scholar
  6. 6.
    Douceur JR (2002) The sybil attack. In: Peer-to-peer systems, pp 251–260Google Scholar
  7. 7.
    Einhorn MA, Rosenblatt B (2005) Peer-to-peer networking and digital rights management: how market tools can solve copyright problems. Cato Institute Policy AnalysisGoogle Scholar
  8. 8.
    Iwata T, Abe T, Ueda K, Sunaga H (2003) A DRM system suitable for P2P content delivery and the study on its implementation. In: The 9th Asia-Pacific conference on communications, 2003. APCC 2003, vol 2, pp 806–811Google Scholar
  9. 9.
    Koo S, Lee C, Kannan K (2005) Using P2P to distribute large-volume contents’ research problems, solutions and future directions. In: Proceedings of the 9th world multi-conference on systemics, cybernetics and informatics, pp 10–13Google Scholar
  10. 10.
    Lee J, Chang C (2007) Secure communications for cluster-based ad hoc networks using node identities. J Netw Comput Appl 30(4):1377–1396CrossRefGoogle Scholar
  11. 11.
    Levine BN, Shields C, Margolin NB (2006) A survey of solutions to the sybil attack. Tech. rep.Google Scholar
  12. 12.
    Lua EK (2007) Securing peer-to-peer overlay networks from sybil attack. In: International symposium on communications and information technologies, 2007. ISCIT’07. IEEE, pp 1213–1218Google Scholar
  13. 13.
    Schneier B (1996) Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. Wiley, New YorkMATHGoogle Scholar
  14. 14.
    Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613CrossRefMATHMathSciNetGoogle Scholar
  15. 15.
    Steiner M, Tsudik G, Waidner M (1996) Diffie-Hellman key distribution extended to group communication. In: Proceedings 3rd ACM conference on computer and communications security, pp 31–37Google Scholar
  16. 16.
    Steiner M, Tsudik G, Waidner M (1997) Cliques: A new approach to group key agreement. In: The 18th IEEE international conference on distributed computing systems, pp 380–387Google Scholar
  17. 17.
    Steiner M, Tsudik G, Waidner M (2000) Key agreement in dynamic peer groups. IEEE Trans Parallel Distrib Syst 11(8):769–780CrossRefGoogle Scholar
  18. 18.
    Sung J, Jeong J, Yoon K (2006) Drm enabled P2P architecture. In: The 8th international conference advanced communication technology, vol 1, pp 487–490Google Scholar
  19. 19.
    Wu WC, Chen YM (2009) TLMS: a novel drm scheme for multimedia sharing in P2P networks. In: The 5th international conference on intelligent information hiding and multimedia signal processing, pp 873–876Google Scholar
  20. 20.
    Zhang X, Liu D, Chen S, Zhang Z, Sandhu R (2008) Towards digital rights protection in bittorrent-like P2P systems. In: The 15th SPIE/ACM multimedia computing and networking, vol 6818, pp 68180F.1–68180F.12Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Department of Information ManagementNational Central UniversityJhongli City, Taoyuan CountyRepublic of China
  2. 2.Computer CenterHsin Sheng College of Medical Care and ManagementTaoyuan CountyRepublic of China

Personalised recommendations