[ieee 2008 international conference on consumer electronics (icce) - las vegas, nv, usa...

2
9.1-4 A Model for Privacy Preserving Metering Service Bo Gyeong Kang, Je Hong Park, Seung Chul Chae, and Seonman Kim, NonMember, IEEE Abstract--In this paper, we propose a DRM system to protect users' privacy. The proposed system utilizes special protocols designed to preserve privacy using pseudonyms and an obfuscation mechanism. Those provide different levels of controls on metered data and personal identifiers, by expressing their preference on privacy sensitive information. I. INTRODUCTION In DRM system, by service provider, every purchase of contents is recorded in name of the real identifier. Now, things are getting worse by metering service for DRM system. Metering subscription is defined as a service where the device returns detailed usage information to the license issuer for the purpose of royalty collection [1]. So user preference analyzed from metered data gets delivered to service providers through various networks if a user once agrees the metering subscription. Of course, the more to know about users' behavior and preference certainly help in marketing, customized service and other value-added service deduced from data mining. However, privacy fundamentalists and pragmatists have tendency to deny the customized or metering service which requires private data representing their preference. To date, proposed solutions [3, 4, 5, 6] to remedy those negative aspects have been mainly focused on the privacy violation while purchasing contents, and made a use of only anonymous approaches. Unfortunately, anonymous approach by itself has seemed to somehow fail in the industry not only because of complex implementation but also the lack of understanding user's sensitiveness about privacy problems. In this paper, we propose a new privacy preserving DRM system with metering service that achieves pseudonymity and user controllability on his personal data. The followings are derived requirements to strengthen privacy preserving properties. RI. Instead of device identifiers, it should be possible to use pseudonyms as identifiers to obtain valid license. So users are relieved from being identified for each purchase of media contents. R2. In some situation, it should be possible to trace the user's real identifier from his pseudonym. This matching should only happen when an appropriate authorized process is satisfied. R3. Metered data should not be reported back to the servers without users' consent. R4. Granularity in the choice to reveal users' metered data should be provided. II. PRIVACY PRESERVING DRM WITH METERING SERVICE Our system to meet the above requirements consists of 4 explicit entities: Pseudonym Authority, License Server, Payment Service and User Device. Fig. 1 describes the proposed system. The special protocols between each entity are explained as follows: Pseudonym License Server Payment Authority 3-1 Lies evrService Pseudonym Credential (D Pseu( Cred Generate Pseudonym ltential_. License - (for Pseudonym) . Device Initiate Metering X Storage Fig. 1 Overall Description A. Protocols 1) Pseudonym Credential Issuing At first, the User Device should register to Pseudonym Authority with its real identifier, and then the pseudonym credential for the pseudonym and its corresponding keys is issued. There are two approaches according to the trust level for Pseudonym Authority: pseudonym is known to Pseudonym Authority or not. If Pseudonym Authority acts as a trusted third party, it is much simple for License Server to check the validity of pseudonym credential through making query to Pseudonym Authority as (3-1) in Fig. 1. However, to meet anonymity, the link between issued pseudonym credential and its usage should be broken. Fortunately, we have several candidates to achieve anonymous credential system such as blind signatures, group signatures and oblivious transfer [1, 2]. In this paper, we use partially blind signatures [2] with time or n-time usages limitation, which allows the signer to explicitly include common information into blind signature. 2) License Acquisition Protocol To issue a proper license corresponding to media contents, first, the authentication through pseudonym credential should be completed. For this, License Server checks the status of the credential by making a query to Pseudonym Authority or checks time or n-time usages limitation. If it is okay, License Server generates a license binding to the pseudonym and its corresponding key within pseudonym credential. As soon as the protocol is completed, the license is installed safely by the agent within the device. 3) Metering Report Procedure The DRM agent residing in User Device consumes contents according to user's choice and records the information of 1-4244-1459-8/08/$25.00 ©2008 IEEE en en .S_ co Fo .1 a.f I

Upload: seonman

Post on 06-Mar-2017

217 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: [IEEE 2008 International Conference on Consumer Electronics (ICCE) - Las Vegas, NV, USA (2008.01.9-2008.01.13)] 2008 Digest of Technical Papers - International Conference on Consumer

9.1-4A Model for Privacy Preserving Metering Service

Bo Gyeong Kang, Je Hong Park, Seung Chul Chae, and Seonman Kim, NonMember, IEEE

Abstract--In this paper, we propose a DRM system to protectusers' privacy. The proposed system utilizes special protocolsdesigned to preserve privacy using pseudonyms and anobfuscation mechanism. Those provide different levels of controlson metered data and personal identifiers, by expressing theirpreference on privacy sensitive information.

I. INTRODUCTION

In DRM system, by service provider, every purchase ofcontents is recorded in name of the real identifier. Now, thingsare getting worse by metering service for DRM system.Metering subscription is defined as a service where the devicereturns detailed usage information to the license issuer for thepurpose of royalty collection [1]. So user preference analyzedfrom metered data gets delivered to service providers throughvarious networks if a user once agrees the meteringsubscription. Of course, the more to know about users'behavior and preference certainly help in marketing,customized service and other value-added service deducedfrom data mining. However, privacy fundamentalists andpragmatists have tendency to deny the customized or meteringservice which requires private data representing theirpreference. To date, proposed solutions [3, 4, 5, 6] to remedythose negative aspects have been mainly focused on theprivacy violation while purchasing contents, and made a useof only anonymous approaches. Unfortunately, anonymousapproach by itself has seemed to somehow fail in the industrynot only because of complex implementation but also the lackof understanding user's sensitiveness about privacy problems.In this paper, we propose a new privacy preserving DRMsystem with metering service that achieves pseudonymity anduser controllability on his personal data.

The followings are derived requirements to strengthenprivacy preserving properties.

RI. Instead of device identifiers, it should be possible touse pseudonyms as identifiers to obtain valid license.So users are relieved from being identified for eachpurchase ofmedia contents.

R2. In some situation, it should be possible to trace theuser's real identifier from his pseudonym. Thismatching should only happen when an appropriateauthorized process is satisfied.

R3. Metered data should not be reported back to theservers without users' consent.

R4. Granularity in the choice to reveal users' metereddata should be provided.

II. PRIVACY PRESERVING DRM WITH METERING SERVICE

Our system to meet the above requirements consists of 4explicit entities: Pseudonym Authority, License Server,Payment Service and User Device. Fig. 1 describes theproposed system. The special protocols between each entityare explained as follows:

Pseudonym License Server PaymentAuthority 3-1 Lies evrService

PseudonymCredential (D

Pseu(Cred

GeneratePseudonym

ltential_.

License -(for Pseudonym) .

DeviceInitiate Metering X

Storage

Fig. 1 Overall Description

A. Protocols1) Pseudonym Credential Issuing

At first, the User Device should register to PseudonymAuthority with its real identifier, and then the pseudonymcredential for the pseudonym and its corresponding keys isissued. There are two approaches according to the trust levelfor Pseudonym Authority: pseudonym is known to PseudonymAuthority or not. If Pseudonym Authority acts as a trustedthird party, it is much simple for License Server to check thevalidity of pseudonym credential through making query toPseudonym Authority as (3-1) in Fig. 1. However, to meetanonymity, the link between issued pseudonym credential andits usage should be broken. Fortunately, we have severalcandidates to achieve anonymous credential system such asblind signatures, group signatures and oblivious transfer [1, 2].In this paper, we use partially blind signatures [2] with time orn-time usages limitation, which allows the signer to explicitlyinclude common information into blind signature.

2) License Acquisition ProtocolTo issue a proper license corresponding to media contents,

first, the authentication through pseudonym credential shouldbe completed. For this, License Server checks the status of thecredential by making a query to Pseudonym Authority orchecks time or n-time usages limitation. If it is okay, LicenseServer generates a license binding to the pseudonym and itscorresponding key within pseudonym credential. As soon asthe protocol is completed, the license is installed safely by theagent within the device.

3) Metering Report ProcedureThe DRM agent residing in User Device consumes contents

according to user's choice and records the information of

1-4244-1459-8/08/$25.00 ©2008 IEEE

enen

.S_

co

Fo.1

a.f

I

Page 2: [IEEE 2008 International Conference on Consumer Electronics (ICCE) - Las Vegas, NV, USA (2008.01.9-2008.01.13)] 2008 Digest of Technical Papers - International Conference on Consumer

rendering action. Then, metered data is reported in a variousform depending on user's preference at a scheduled time.

4) Bill Issuing ProtocolAfter a pre-agreed number of metering reports, a bill is

delivered to the agent. It is possible to obtain the bill which isissued to the real identifier by using partially blind signaturescheme in a similar sense with pseudonym credential issuingprotocol. Then the agent un-blinds bill for the payment.

5) Payment ProtocolThe agent submits the un-blinded bill, pays the bill to

Payment Service and obtains the bill confirmation message.Later, the bill confirmation message should be submitted tothe Pseudonym Authority as the evidence of the valid behavior.

III. PRIVACY PRESERVING FRAMEWORKInstall License

InstallerManagerUpdaer Keyfev Reporter

Pseudonymm Renderer ObiuscatedManager I i Save Liens Ma

Peuror n RetrMenve Metering Mnuser PolicyUManaereandBillManager,hManager Manager

p seudonyms,h biln informdatinan thBetrdl aa.O

_Credenlials Reposiory_- Manage r UsrPl., IeyA/A

Fig. 2 Privacy Preserving Agent Framework

Fig. 2 shows the DRM agent framework for the proposedsystem. It is composed of 5 modules, License Manager,Pseudonym Manager, Metering Manager, User PolicyManager and Bill Manager, which manage and controlpseudonyms, the billing information and the metered data. Onthe license installation, the agent first checks the ownership ofpseudonym specified in the license whether it is listed up itsown pseudonyms. If so, it starts installing procedure of thelicense in the name of the pseudonym and then consumes themedia contents using the key corresponding to the pseudonym.On the scheduled time for metering report, it is obfuscatedfollowing the user preference. The agent can delete or reducethe amount of the metered data only when the paymentconfirmation message is checked as a valid one. Theconfirmation message should be kept securely and laterpresented to Pseudonym Authority as a proof for thelegitimate usage and payment.

MID Actions

CID1 Genre# 1 Play 2 Copy 1 CD Burn 3 Time lh 20m Other Parameters

CID2 Genre# 2 Play 1 Copy 3 CD Burn 0 Time 2h 14m Other Parameters

CID3 Genre# 2 Play 2 Copy 0 CD Burn 2 Time Oh 30m Other Parameters

Fig. 3 Example of Metered Data

A. User Preference ModelFor R4, we propose the preference model in Fig. 4 for the

leveled metered data description. In terms of our model,current metering subscription is expressed by the policy [MID,CID, level 3] when MID is an identifier for metered data. If auser sets user policy [MID, Genre #, level 1], it implies thatthe total number and time regardless of action type is countedin terms of Genre #.

No metering subscription No metering subscription Level 0

No identifier Total # and time Level I

Sub Actions # and time Level 2

Other Identifiable Metadata Genre#

Each Action #time Level 3

ECIDFig. 4 The Preference Model

Then the processed metered data from the original data inFig. 3 becomes as follows:Genre 1 Action all. Counts 6. Time lh 20mGenre 2 Action all. Counts 8. Time 2h 44m

If [MID, No identifier, level 1] is chosen, thenNo identifier Action all. Counts 14. Time 4h 04m

is reported. In this way, users can reflect own preference foreach MID, and only blurred metered data is delivered tolicense issuer.

IV. ANALYSIS

Our model satisfies the privacy requirements described inSection I. RI is easily obtained by adopting pseudonymcredential system. For R2, time limitation or n-time usablecredentials are used. As R3 says, unified consent at once doesnot seem to relieve user's concern about privacy. Hence, at thetime of reporting metered data, a certain notificationmechanism or consent decider based on user's pre-settingshould be provided. In addition, users can control thegranularity of metered data through user policy. This meetsthe requirement R4.

V. CONCLUSION

In this paper, we propose a new privacy preserving DRMwhich combines privacy preserving protocols usingpseudonyms, and an obfuscation mechanism which definesuser policy on preference model. It is possible to extend ourmodel for each user to have different privacy policies againstdifferent services. The research about more detailed schemafor user policy is still in progress as the further research topic.

REFERENCE

[1] M. Abe and T. Okamoto, "Provable secure partially blind signatures,"Proc. ofCRYPTO 2000, LNCS vol. 1880, pp. 271-286.

[2] J. Camenisch and A. Lysyanskaya, "Efficient non-transferable multi-show credential system with optional anonymity," Proc. ofEUROCRYPT2001, LNCS vol. 2045, pp.93-118.

[3] C. Conrado, M. Petkovi and W. Jonker, "Privacy-preserving digitalrights management," Proc. ofSDM2004, LNCS vol. 3178, pp. 83-99.

[4] R. Grimm and P. Aichroth., "Privacy protection for signed media files:A separation-of-duty appraoch to the lightweight DRM (LWDRM)system, " Proc. ofMM&Sec'04, 2004, pp. 93-99.

[5] B.N. Park, J.W. Kim and W. Lee., "PrecePt: A privacy-enhancinglicense management protocol for digital rights management," Proc. ofAINA'04, 2004, pp. 574-579.

[6] H.-M. Sun, K.-H. Wang and C.-F. Hung., "Towards privacy preservingdigital rights management using oblivious transfer," Manuscript, 2006.Available at df.