DRM Mechanism without Third Party using System Verification Technique

Sheryl D'mello, Bidisha Roy, Pradnya Rane
2015 International Journal of Engineering Research and  
The advance in computing and easy availability of technology has led to an increase in the consumption of digital content. It has also led to illegal replication and distribution of digital contents. This poses to huge threat to organizations dealing with highly confidential digital contents and could drastically affect its financial standing. Digital Rights Management (DRM) technologies aim to provide protection and secure distribution of the digital contents. The proposed DRM mechanism
more » ... s on protecting and securing the distribution of digital content in a small organization. It aims to benefit the small organizations by providing security, privacy, accountability as well revocation of malicious users. It eliminates the need for third party by using the system details to provide controlled access and prevent illegal redistribution of the digital content. Various security layers have been proposed at each level that enhance the security of digital content and simultaneously achieve privacy, accountability and revocation of a malicious user without the use of third party.
doi:10.17577/ijertv4is080691 fatcat:h5ef6hgxvzepdpxdaxv6zni6pu