Ravish Progress 1
Ravish Progress 1
Ravish Progress 1
PRESENTATION
A NEW MODEL FOR PROTECTION OF
COPYRIGHT MATERIAL IN DIGITAL
LIBRARY
SUPERVISOR:- Submitted by:-
Ms. Rekha Saraswat Ravish Singh
00611804813
M-Tech CSE
Problem Statement
Over the last 2-3 decades digital libraries have been evolving at a great
pace. These libraries have served the very first objective of
information sharing and e-learning but despite of these advantages
these digital libraries suffer from many problems one of the problem
associated with these libraries is COPYRIGHT PROTECTION
problem specifically known as DIGITAL RIGHTS MANAGEMENT
problem.
Background
Digital content in the digital world differ from objects in the real
world. The main difference is the dissemination- it can be easily
copied, altered and distributed to a large number of recipients.
Content owners thus want a technology that can control the use of
their content.
This gave birth to the concept called Digital Rights Management in
2003.
Digital Rights Management is a term used for technology that control
how digital content is used.
Objective
Development of a DRM framework.
Target is to reduce the network load in the DRM framework.
To develop an Access control method to limit the use of digital
content to increase digital privacy.
Brief Literature Survey
Literature survey
Paper title Authors and publication Work Details
The DSpace Open Source Digital
Asset Management System:
Challenges and Opportunities
Robert Tansley, MacKenzie Smith
and Julie Harford Walker,2005 MIT
libraries and Hewlett Packard
laboratory
Shows issues and development in
Dspace
Research on the Application of
Open Source Software in
Digital Library
Zhaohui Wei, Procedia Engineering
15 (2010)
Gives history and development of
open source libraries management
system and legal concerns
Google Library: Some Copyright
Infringement Concerns
Yimei Guo, Yixuan Liu and Zhou Yu,
IEEE, International Conference on
E-Business and E-Government,2011
Discusses copyright infringement
issues related with Google library
IPR Management Models for
Cultural Heritage on ECLAP
Pierfrancesco Bellini, Paolo Nesi,
Michela Paolucci, IEEE International
Conference on Communications
2011
Describe system adopted in
European Collected library of
Artistic performance to publish and
distribute digital content.
Paper title Authors and publication Work Details
DRM framework towards
prevention of digital piracy
Ravi Sankar Veerubhotla and
Ashutosh Saxena, Senior Member,
IEEE, 2011
Provides a frame work to secure
digital content and applications.
The Security Design of Digital
Library
Wei Hongchang, Wang Qian, Wu
Xuefang, International Conference
on Computer Science and Service
System, 2012
Ways to make digital library safer
and provide document protection.
Detailed Overview Of Related Work
The DSpace Open Source Digital Asset Management
System: Challenges and Opportunities
This paper describes he development and history of one of the open
source library management software system, Dspace.
This paper also presents some implementation and legal issues
associated with it.
DSpace is a digital asset management system, most commonly used
as an institutional repository system by research universities. The
system was initially developed by a joint HP and MIT Libraries
development team.
This paper describes how we have made the transition from regular
co-located team-based development to a broader open source
development model
Research on the Application of Open Source
Software in
Digital Library
This paper provides general history of open source library
management software system.
This paper presents the challenges of integration traditional and
emerging technologies and formats, load balancing, resource
allocation, copyright protection, etc.
This paper presents the features of Dspace such as emphasis on
preservation of all types digital information including journal papers,
electronic reports, conference posters, video and images.
Google Library: Some Copyright Infringement
Concerns
Discusses Googles plan- Google Book Service (including Google Book
Search and Google Library) and analyses what the Google Book and
Google Library are and their legal controversy in the copyright area,
and the difference between Google Book Search and Google
Library as well.
This paper discusses various controversies associated with Google
books it also suggests some solution on copyright law.
Contd
Google uses three different schemes for copyright protection
Full view, it is able to display the full book.
Limited view, a book that is still under copyright, so you'll see only a small
portion of the book at a time.
No preview available.
Advantage
Simple
Disadvantage
Only for pdf and doc.
Different country have different criteria for copyright infringement thus not
universally accepted.
IPR Management Models for Cultural Heritage on
ECLAP
This paper describes the DRM system with all possible use of digital
contents and Conditional Access Control providing access to the
digital source with some encryption.
This model have different components:-
Content provider
IPR model
In this model only content having sufficient conditions and license will
be published
Contd
Advantages
Support images, pdf and doc files.
IPR models can be customized according to specific needs.
Content Provider (CP) can change the IPR model whenever CP has a need for
the same
Disadvantage
Inconsistency in Access Rights assignment between content aggregator and
content provider.
Not for audio and video
DRM framework towards prevention of digital
piracy
This paper presents a Digital Rights Management
(DRM) framework to secure digital content and
software applications. The DRM framework uses
cryptographic techniques and supports protection of
digital content viz., PDF, image and audio files by
encrypting them with a key.
Contd
The framework discussed provide
A common framework to protect digital objects and software libraries
Extensibility of DRM framework to protect multiple digital formats and
support for variety of clients on different platforms
The proposed DRM design consists of a DRM server that is
responsible for managing key. The users classified as publisher have
the right to publish their content and assign rights to others.
Consumers are end users of the content.
Contd
DRM model encryption @server
send content server send consumer request key server grant key
to server for encryption encrypted content
published content
DRM Server
Publisher
Consumer/user
Decryption
and use
Library
server
Access
content
Contd
Advantages of this model
It is possible to protect multiple formats
Authorized consumers can consume the content
Disadvantages of this model
Unnecessary network traffic between publisher and DRM server
Access Right and key management.
The Security Design of Digital Library
This paper provides provisions for improving of contents over digital
library.
This paper provide Content Based Access Control methods to improve
security.
The contents is presented to various users based on the severity and
its appropriateness for various users.
Contd
Digital Library Structure
Library server
Library user
Request
content
Send content
Contd
Advantage
This method can restrict access to a content which is not appropriate for
particular class of users
Disadvantage
This method cannot handle diverse contents stored in a real library server
thus cannot be used practically.
Previous approach
Previous method is based on the Digital Rights Management model in
which a publisher post the content to DRM server.
On this server encryption of content takes place.
This encrypted content is again send to the publisher.
The publisher distributes this content for consumption by user.
No provisions for digital right have been there in digital libraries till
now.
Proposed Approach
To reduce the unnecessary network load between publisher and DRM
server.
In this approach on key will be transferred between DRM server and
publisher instead of the whole document.
This key will be shared with the user or consumer also for decryption
of content at their site.
Diagram
Proposed model
DRM server
Publisher
Library server
User
1.Key
published
4.Request for
key
2.Encrypti
on
3.Publish
7.Decrypti
on and use
6.access
5.Server
validates and
grant key
Contd
For Rights
User will be assigned different roles.
These roles define different permissions associated with them.
Different user permission have different operations.
Diagram
Library server
permissions
Objects operation
2.Permi
ssion
assignm
ent
Roles
User
1. Role
assignment
Final Diagram
Proposed model
DRM server
Publisher
operation
Library server
Objects
permissions
Roles User
1.Key
published
4.Request for
license
7.Permi
ssion
assignm
ent
2.Encrypti
on
6.Role
assignment
8.Decrypti
on and use
3.Publish
5.Server
validates and
return user
license
References
Wei Hongchang, Wang Qian, Wu Xuefang, The Security Design of Digital
Library IEEE International Conference on Computer Science and Service
System, 2012
Pierfrancesco Bellini, Paolo Nesi, Michela Paolucci, IPR Management Models
for Cultural Heritage on ECLAP, IEEE International Conference on
Communications 2011
Ravi Sankar Veerubhotla and Ashutosh Saxena, A DRM Framework Towards
Preventing Digital Piracy IEEE 2011.
Yimei Guo, Yixuan Liu and Zhou Yu, Google Library: Some Copyright
Infringement Concerns , IEEE International Conference on E-Business and E-
Government 2011
Zhaohui Wei, Research on the Application of Open Source Software in Digital
Library Procedia Engineering 15, 2010
Robert Tansley, MacKenzie Smith and Julie Harford The DSpace Open Source
Digital Asset Management System: Challenges and Opportunities, 2005 MIT
libraries and Hewlett Packard laboratory
Thank you