RES701, Week 6, Exercise Reading Article

For the reading exercise, I choose the article “Digital Rights Management System Based on Cloud”. The article abstract was succeeded to mention the basic questions which need to be answered in it such as What the article topic is, What the author did and what the author concluded? In the article, the author tried to explain the propose of DRM system based on cloud and concluded that it will take advantage of cloud infrastructure which further speed up the watermarking process and thus the system will be more modular and scalable. The author is a student/tutor at the University of Sannio – Department of Engineering and the article is published in the journal TELKOMNIKA (Telecommunication, Computing, Electronics and Control) which is peer-reviewed scientific journal published by the University of Ahmad Dahlan in collaboration with Institute of Advanced Engineering and Science. All the articles published here are peer-reviewed by the experts of the same fields. Hence the article is credible to those who want to know about the DRM system based on the cloud. In the Conclusion part, the author mentioned the current issue of Digital contents and the proposed DRM system will be best suited for the Web Context. The author is also trying to say that since the proposed DRM system is based on cloud environment and hence the proposed DRM system can take advantage of the cloud infrastructure to speed up the process resulting modular and scalable DRM system. I am convinced with the explained system since the author succeeded almost to consider every detail of it.

  1. What is Digital Copyright protection?

Digital Copyright protection means a way of protecting the digital content from illegal copying of it. Since the usage of digital content is high the usage of illegal content is also increasing. In order to avoid the copying of someone else’s work (such as software, audio, video, digital documents) it is essential to create digital signatures. The way of creating and managing of such signatures are termed as Digital Copyright protection.

2. What is DRM?

Digital Rights Management which shortly known as DRM is a set of schemes that allow sellers of digital media files to associate those files with a license. This license will have certain constraints on the buyers for what they can do and what cannot according to the type of license the buyer purchased. 

A short description based on the above article: 

The article describes the copyright protection, need in the current digital environment and a DRM system based on a watermarking protocol to ensure copyright protection to the digital contents from the duplications of a valid license and gaining outlawed access to the proprietary contents. The digital contents such as audio or video files are becoming easily accessible thanks to the provision of assorted digital devices with low price and by every year the standard and performance of broadband connection with low-cost expense are increasing. Thus, the web users are a lot into the utilization of digital content and the need to protect the creativity and to reduce the cost of production and distribution the content providers should be able to sell as many products they can. For this, it is required to initiate certain legal measure, coerce mechanisms and digital techniques to enforce the protection of copyrighted contents. This ensures the fair use of contents and minimizes privacy conflicts while managing copyright protection. For this, a DRM system based on the watermarking protocol is proposed with the execution of the same in a cloud environment. The cloud environment makes the system more flexible and scalable. The proposed DRM system is using a watermarking protocol which enable the user with valid license only can open or use the digital content. The proposed DRM system is buyer friendly and involves 3 web entities. First one is the buyer, the second one is the content provider (CP – holds the digital rights) and the last Registration Authority (RA – to identify the buyer, the CO and the purchase content & transaction). In this environment of buyer and seller, both must insert the watermark and if any unauthorized parties tried to have the content the watermark detection and extraction algorithm will find who has legal and illegal ownership and will trace back to the illegal user (Chang & Chung, 2003). 

References:

  1. Chin-Chen, C., & Chi-Yien. C. (2003). An enhanced buyer seller watermarking protocol. International Conference on Communication Technology Proceedings. 


Advertisement