Abstract
Several platform companies have been successful in competing with digital piracy by producing consumer-friendly services. Nowadays, however, the digital content service market has become more monopolized than ever, which forms barriers to the entry of new platform companies. The platform monopoly would cause considerable problems both to content providers and consumers as it limits the choice of consumers. To remove the platform monopoly in digital content markets, we propose a public blockchain-based digital content service method. The proposed method encrypts the digital content to a self-decryptable form, which we call Smart Propertized Digital Content (SPDC), and utilizes the decentralization and traceability of the public blockchain to provide a non-monopolistic ecosystem for the management and distribution of the SPDC license. The proposed method can be more beneficial both to content creators and users than the current winner-takes-all platform model. For instance, users can download SPDC once and play many times without requesting the decryption key, and SPDC owners can make SPDC licenses to be time-limited, device-limited, resellable, or terminated without resorting to help from other intermediaries. We conducted the threat analysis on the proposed method by examining possible attacks in various scenarios. Based on threat analysis, we conclude that the proposed method can provide a new type of digital content service ecosystem that can be operated in a completely decentralized way and neutrally beneficial to all participants.
1. Introduction
The rapid development of information communication technologies (ICTs) in storing, managing, searching, and transmitting digital data has changed how people consume content such as book, music, video, and continues doing so. As of the year 2021, a great portion of content is now being stored in digital format and distributed and sold to users via the Internet, and digital data-specific services such as subscription-based streaming have become ever more popular. For instance, the International Federation of the Phonographic Industry (IFPI) 2019 annual report showed that global recorded music revenues posted growth of 8.2%, which was the fifth consecutive year of global growth, and the digital streaming revenue alone accounted for 56.1% of the global recorded music market after increasing by 22.9% in 2019 [1]. The report from Grand View Report also showed that the global digital video streaming market size was valued at USD 42.6 billion in 2019 and is projected to grow at a compound annual growth rate of 20.4% from 2020 to 2027 [2].
1.1. Problem Statement
As compared with analog content, digital content is easy to manage and suitable for massive distribution. Such advantages of digital content, however, become disadvantages in the presence of digital piracy. Digital content can be copied identically to original versions and massively distributed to potential content consumers freely through the Internet. Most people are unlikely to pay for digital content that can be downloaded from the Internet or copied from one device to another. This has been a major problem for content industries such as the music, movie, and publishing industries. It has been a common belief that without legal and technological protection against digital piracy, content sales revenues will plummet, content creators will consequently not receive royalties and hesitate to make new content. Consequently, the content industries can be in jeopardy, and consumers will eventually suffer from the lack of high-quality content. Some research works [3,4,5] challenged this by claiming that the elimination of digital piracy would not transform illegal users to the content buyers substantially. They also claimed that digital piracy gives some ‘positive effects’ (e.g., an effective promotion and publicity vehicle, et cetera) to consumers and artists. The majority of research works, however, support the common belief [6,7,8,9,10,11,12,13].
To protect digital content against digital piracy, content industries have adopted various forms of the ‘digital rights management’ system (DRM). The DRM technology allows the content provider to restrict consumers to playing digital content under specific rules (such as on a streaming service only, a limited number of plays, or specified devices, et cetera). The DRM technology has contributed to the development of digital content services by alleviating widespread fear of digital piracy. Some consumers, however, criticize DRM for restricting their content usage under consumer-unfriendly rules.
Several platform companies have been successful in competing with digital piracy. Examples include the ebook service employed by Amazon and Barnes and Nobles, the Apple iTunes’ music download service, the music streaming by Spotify, and the video streaming by Netflix, et cetera. Those platform companies do not impose powerful DRM technologies to fight against digital piracy (but their DRM methods are strong enough to keep most consumers from attempting to make illegal content copies) but give consumer-friendly platform services to honest consumers. They vigorously use consumer data and the scale of economies to attract more consumers. Such efforts mean that digital content markets are dominated by few platforms nowadays. This phenomenon is often called the natural monopoly in digital content markets.
1.2. Key Contributions
To remove the natural monopoly in digital content markets, we propose a public blockchain-based digital content service method. To be specific, we use the decentralization and traceability of the public blockchain to provide a non-monopolistic content service ecosystem. In particular, contributions of the proposed digital content service model are as follows:
- The license management and payment collection of digital content can be performed in decentralized public blockchain networks.
- Digital content owners can have detailed control of the use condition. For example, they can make licenses which are time-limited, device-restricted, playing number-limited, resellable, or, if necessary, terminated, et cetera.
- Users can have more freedom in playing digital content. For example, they can download digital content once and play it many times or pay only for what they want to have or rent.
2. Background
2.1. Natural Monopoly in Digital Content Markets
There have been two opposite opinions on the platform monopoly in digital content markets. One opinion is that the market dominance by few platforms is a temporary phenomenon, and the seeming monopolies in current digital content markets will disappear once markets are mature. The other opinion is that the platform monopoly is a present danger in digital content markets and will cause serious problems not only to content providers but also to consumers, unless proper antitrust regulations and technical improvements are introduced. This study is based on the latter opinion. Specific issues that motivate this study are as follows:
- Platform monopoly: Platform companies massively collect user data in the process of distributing digital content and use collected data vigorously in personalized content marketing. While the user data-driven personalized marketing can benefit users, it can also introduce switching costs for users. The more the platform company learns about its users’ preferences, the more accurately it can market content based on their specific preferences. It makes a formidable barrier to entry for new platform companies since they do not have the user data necessary to compete with the dominant platform company. Platform companies also limit purchased content to their ecosystem by employing the DRM system. In such a case, users would prefer to have all their digital content on a single platform rather than spread it out on many platforms. It makes another formidable barrier to entry for new platform companies. It also makes it difficult for users to switch to other platforms since they want to continue to use purchased digital content. This is called the ‘platform lock-in’ effect [14]. Based on these arguments, there has been the warning (e.g., see [15]) that digital content platform markets tend to be naturally monopolized.
- Dilemmas of content creators: Digital content platforms have benefited content creators by providing new kinds of distribution channels. With these channels, creators can distribute and advertise their content to customers without using the channels provided by content companies, which often demand a high price. The natural monopoly in content platform markets, however, has introduced significant risk to content creators. Nowadays, it is not unusual to hear complaints of content creators about platforms, for taking too large a portion of revenues or not giving clear log information which determines the revenue share of content creators. As individual sellers, content creators are more vulnerable than content companies to predatory business practices performed by platforms.
- Dilemmas of content users: In the initial days, platforms rapidly gained user acceptance by providing digital content, with low prices and data-driven personalized services. Such benevolence given by platforms is brought to users not only by technological improvement but also by sacrifices in content companies and creators. Those sacrifices will make content companies and creators hesitate to make high-quality digital content and hence will eventually harm users.
2.2. Related Works
There have been several approaches that use blockchain technology in protecting intellectual rights management or providing new ecosystems for digital content services. Examples are as follows:
- Ujo music [16] uses the Ethereum blockchain technology [17] to keep track records of digital content owners and assign a unique identity to each uploaded music. The payment process in Ujo music is carried out by Ethereum smart contracts. In Ujo music, however, digital content is not protected against illegal copying.
- Resonate music [18] provides subscription-based music streaming services and uses blockchain technology to make digital music owners take participate in publishing their music and managing royalties on them.
- The platform proposed by SingularDTV [19], which describes itself to be a decentralized ‘Netflix’ on Ethereum, is somewhat similar to the proposed method of this paper. The difference is in the fact the SingularDTV platform is designed to charge for each streaming, while the proposed method of this paper allows digital content owners to charge as they wish. For instance, they can demand the payment for each watch, a fixed rate for a limited number of views or a limited period, et cetera. It is also true that the proposed platform of this paper is not restricted to streaming services, unlike SingularDTV.
- Methods proposed in [20,21] are also quite similar to the proposed method of this paper. The method in [20] is designed to identify malicious users, with the hope that this kind of identification might discourage attempts at malicious activity from users. On the other hand, the method in [21], however, allows the user to access the digital content decryption key. In other words, the user can perform the duplication of decrypted digital content. This is not good. This kind of scenario is not allowed in our method.
- Methods in [22,23,24,25] proposed to store the digital watermark of contents in blockchain to implement copyright registration. For instance, the method in [22] proposed a watermarking-based multimedia blockchain framework to provide a trusted mechanism to retrieve the transaction trails or the modification histories on digital content. The study in [23] proposed an artwork image DRM for Internet misusing detection. The method in [24] combined digital watermarking, blockchain, perceptual hash function, quick response code, and InterPlanetary File System (IPFS) for copyright management. Among them, blockchain was used to securely store watermark information and provide timestamp authentication for multiple watermarks to confirm the creation order. The method in [25] used digital fingerprint technology, an Inter-planetary File System (IPFS), and blockchain technology to create a digital system to optimize traditional processes and improve the efficiency of digital media copyright solidification.
- Methods in [26,27,28,29,30,31] used the blockchain for secure data sharing. For instance, the method in [26] proposed a privacy-preserving DRM system. The method in [27] proposed a data sharing protocol over different DRM systems. The study in [28] proposed a blockchain-based system to implement a superdistribution-based ideal content distribution system. The methods in [29] used blockchain technology to enable the user to have full control over their multimedia files such as storing, querying, sharing, and auditing data. The study in [30] proposed a blockchain-enabled DRM system to share and manage multimedia resources of online education, while the method in [31] used blockchain technology to share and reuse scholars’ datasets securely.
- Methods in [32,33,34,35] proposed blockchain-based DRM systems for various content types for secure data sharing. To be specific, the study in [32] used digital watermarking and a scalable blockchain model. The study in [33] proposed a blockchain-based solution for the identification, attribution, and payment for digital work. The study in [34] proposed an integrated trading system, to provide a transparent privacy-preserving, and tamper-proof transaction history for registration, provenance, and traceability of art assets. The method in [35] proposed a blockchain-based scheme for digital rights management, to provide trusted and high-level credible content protection and conditional traceability of violation content service.
- There were several hybrid blockchain-based approaches for the copyright protection of digital content. The method in [36] proposed a new zero watermarking construction method based on the angular features of vector data that store the zero watermarking and copyright information on the blockchain. The study in [37] explained blockchain and tangle technologies, along with an extended application to the copyright protection of digital content. The study in [38] proposed multi-authority attribute-based encryption (MA-ABE) schemes to make a relevant user obtain the final decryption attribute key only after all attribute authorities have issued their keys to the blockchain publicly.
One of the main differences between the described examples and our method is in the way how the proposed blockchain is used. To be specific, those described examples use blockchain as a database to record ownership or identity of digital content or as a payment collecting system. Their blockchains, however, are not the main reason for the prevention the illegal copying of digital content. For example, in [19] the illegal copying of digital content can be suppressed not by blockchain but by the streaming service. Similarly, in [22,23,24,25] blockchains do not prevent illegal copying, but the possibility of legal accusation with a watermark as proof of illegal use does. On the other hand, our method uses the blockchain as a virtual machine to determine which digital content can be used by whom and how. In other words, in our method, the blockchain itself makes illegal copying of digital content useless.
3. Proposed Method
The proposed method uses a blockchain system to allow digital content creators to directly control the whole procedure of content distribution. To do so, the proposed method encrypts digital content to a self-decryptable form and makes the content player follows the use condition recorded in the system of blockchains.
The proposed ecosystem consists of the following three components:
- Smart Propertized Digital Contents (SPDC);
- Manager Program (MP);
- Hierarchical Multi-Blockchain System (HMBS).
The proposed method of this paper transforms the digital content to SPDC which can be self-decryptable and playable only by the MP with the HMBS. To be specific, the HMBS stores the license information of SPDC, the MP sends a signal to the SPDC according to license information of the SPDC in the HMBS (here the term ‘license’ is used to specifically mean ‘the right to play a specific SPDC’), and SPDC continues to play or stops the self-decryption based on the received signal from the MP.
The HMBS itself consists of AC (accountchain), MC (mainchain), and multiple pairs of SC (sidechain) and dSC (dual sidechain). Roughly speaking, the proposed method encapsulates the digital content in SPDC, and defines the MP to follow the SPDC license rule recorded in the AC, and provides the integrity of AC by using SCs, dSCs, and MC.
This section is outlined as follows. In Section 3.1 we shall explain how SPDC is formed. In Section 3.2 we shall explain the structure of the HMBS, which consists of MC, AC, multiple SCs and dSCs. Finally, in Section 3.3 we shall explain how the SPDC license is bought, transferred, or terminated through the HMBS.
In this study, we shall use the following abbreviations in Table 1.
Table 1.
A list of abbreviations.
In this study, we shall assume that entities listed in Table 2 participate in the HMBS:
Table 2.
A list of notations that represent participants.
In Table 2, the SPDC storage provider D is not confined to rules defined by the HMBS and can be any ordinary data storage provider on the Internet. In other words, we assume that SPDC (the self-decryptable encrypted version of digital content) itself is freely available to anyone through the Internet.
3.1. Smart Propertized Digital Content
Let m be a digital content to be protected under the HMBS, and P be the owner of m. To protect m from the illegal copying, the proposed method makes P take the following step:
where c is the encrypted data by a symmetric encryption function E (for example, Advanced Encryption Standard (AES) [39]) with a secret key K. In (1), P is included to indicate that P performs the encryption process of computing c from m and K. The secret key K is randomly selected by P and used as input in the encryption process.
A standard form of many DRM systems sells digital content in an encrypted format (for, e.g., c in (1)) and controls secret keys (for, e.g., K in (1)) to be used only by content users without disclosing them to anyone, including content users. A weak point of this approach is the fact that it is not easy to hide secret keys from content users who need them for their legitimate use. Many approaches have been proposed to solve this dilemma. One of them is the streaming service, which allows only a small portion of digital content to be available to users and hence does not need to provide whole encrypted digital content and corresponding secret keys to users. The streaming technology is, however, not perfect in removing digital piracy, just as in any DRM technology ever introduced so far.
To deal with the weak point in secret key transfer from the content owner P to the user U, the proposed method makes P compute a secret key embedded decryption function by replacing many computation parts of the decryption with transformation by randomized lookup tables (it is an example of white-box cryptography technologies [40,41]) and by implementing reverse engineering resilient obfuscated codes [42]. The process of making is described as follows:
where is a random number chosen by P to secretly hide K in .
The proposed method puts the encrypted digital content c, the decryption function , and a control program which initiates the use of on c only under predetermined conditions in one package. This control program is called the ‘immobilizer’ and denoted by from now on. The package formed by c, , and is called ‘smart propertized digital content’ (SPDC) of m. The process of making SPDC s is described as follows:
where is a random number chosen by P to make it infeasible to distinguish c, , and in s.
The computation of SPDC s of a digital content m can be carried out consecutively:
where is the program that performs computations in (1)–(3) consecutively. The content owner P of the digital content m will use to make SPDC s of m by selecting randomly. The proposed method does not require P to store . Those random numbers are disposable once they are used.
Figure 1 illustrates a SPDC s (the one that has c, , and ), where is a decrypted bitstream by . It illustrates that controls the decryption of s by communicating only with MP.
3.2. Hierarchical Multi-Blockchain System
As mentioned earlier, the HMBS itself consists of AC (accountchain), MC (mainchain), and multiple pairs of SC (sidechain) and dSC (dual sidechain). The main role of each blockchain is summarized as follows:
- MC records underlying cryptocurrency (we shall call it ‘HMBS coin’) transfer transactions and controls the initiation and connection of ‘segment’ (we shall explain it in Section 3.2.3) of multiple SCs and dSCs.
- AC records the SPDC license use condition to determine who can play SPDC and how.
- SC and dSC validate the creation, transfer, and termination of the SPDC license.
The proposed method uses HMBS coins recorded in MC only. In other words, the proposed method regards transactions in SC or dSC segments as valid only after they are connected to MC.
Figure 2 illustrates components of the HMBS. The block chaining process in MC controls the initiation and connection of multiple SC and dSC segments. AC expands its blocks independently from MC.
Figure 2.
Components of the HMBS: MC, AC, SCs and dSCs.
3.2.1. Mainchain
We assume that the MC network appends a new block to MC every certain time on average. We call that certain time the ‘MC block period’ and the corresponding time duration ‘MC epoch’. We now denote the MC epoch by with the order index n (), the MC block by , and the updated MC by . This process can be described as follows: when the MC epoch starts, MC in each node is and miners (nodes that try to find new blocks) compete in computing the new block. Afterwards, the first miner who successfully computes a new block announces it to the MC network. Other nodes show their consensus on the announced block by updating their MCs (which are all assumed to be equal to ) to by appending to after checking its validity (For details, e.g., see Section 5 in [43]):
where the notation ‘’ is the concatenation.
We shall explain the mining process of MC in the following setting: The current MC epoch is , a miner collects transactions to record them in MC, and is the hash value of the latest block . The mining of the next block needs to find a nonce r that makes
where H is the cryptographic hash function SHA-256 [44], is the number transactions to be collected in , and represents ‘a condition’. Throughout this paper, we shall use the notation ‘∈’ to indicate that the left term ‘satisfies’ the condition written in the right hand side. The condition is imposed by the consensus algorithm of MC. For example, if the ‘Proof of Work’ consensus algorithm is used, then the condition demands the hash value in (6) be smaller than a fixed small number (for details, e.g., see Section 2.4 in [45]).
The hash value of the block is defined by
with a nonce which satisfies (6).
3.2.2. Accountchain
After the content owner P transforms their digital content m to SPDC s as described in Section 3.1, they request the creation of the account of s to the AC network. Table 3 shows a list of information stored in the account of SPDC s.
Table 3.
A list of information stored in the account of SPDC s owned by P.
In Table 3, , the hash value of SPDC s, can be used as an identification number of s. The public key of P defines the owner of s and the license fee receiving address in MC. In this work, we assume that the user must play s under a certain rule. The notation in Table 3 represents that certain rule. The owner P of s must determine what rules are to be imposed on the use of s and write them in as readable codes by smart contracts of the HMBS. Examples of usage rules include the maximum number of plays, the maximum number of devices, the time duration to play, the transferability of license (a user can resell his license to other users), et cetera. The set in Table 3 contains so-called ‘registration keys’. These keys are used as the user identity in purchasing the license of SPDC s. Detailed explanation will be given in Section 3.3.1.
When the account of s is created for the first time, the target value w in Table 3 is computed by
where is the first -bit truncation of the SHA-256 hash function H, where , and is the all zero bitstream of length 512 bits. The input value q in Table 3 is a bitstream of length 256 bits designed to make
holds for each non-empty registration key set . In other words, q is said to be the input value of for s if and only if q satisfies (9). The parameter in (9) determines how difficult the computation of the input value q is. For some , say , finding an input value q for a given non-empty set would be a very difficult task, but it can be done with collective computation, as shown in block mining in Bitcoin.
Each element of the registration key set has the following form:
where h is the hash value of the SC block containing the transaction that requests the inclusion of in (10) to . The inclusion of h in (10) is designed not to have head start in computing the input value q. More detailed explanation will be given in Section 3.3.3.
The proposed method uses AC, which has a modifiable blockchain structure [46], to record SPDC account information in Table 3. The modifiability of AC is used to efficiently record frequently changing account information, for example, . Just as in MC, we assume that the AC network appends a new block to AC every certain time on average, and define terms ‘AC block period’, ’AC epoch’, and ’AC block’ accordingly. We also denote AC epoch by with the order index n (), AC block by , and AC at the moment when is connected to AC by .
The AC block records the information of multiple accounts. The process of block mining in AC can be similar to that in MC. Suppose that the current AC epoch is , a miner collects an account representing bitstreams (each represents the account of one SPDC), where
and is the number of accounts representing bitstreams to be recorded in , and is the hash value of the latest block in AC. The mining of the next block needs to find a nonce that makes
where represents the condition determined by the consensus algorithm of AC. The hash value of the block is defined by
with a nonce which satisfies (12).
The modifiability of AC comes from (11). Suppose that we want to modify to to respond to a new license purchase of SPDC s. If we can find q that satisfies (9) with in the place of , then we can replace with in the account of SPDC s without destroying the chaining structure (imposed by (13)) in AC.
When an AC block is mined, all accounts in it are assumed to be created for the first time. The proposed method uses a separate cryptocurrency for AC. The AC-specific cryptocurrency will be used for the AC block reward and SPDC account creation request fee. It is also possible that the AC-specific cryptocurrency can be designed to be exchangeable with the HMBS coin at a fixed rate.
3.2.3. Sidechain and Dual Sidechain
The proposed method uses multiple pairs of SC (sidechain) and dSC (dual sidechain) to validate the creation, transfer, and termination of the SPDC license. We assume that there is a predetermined rule assigning each SPDC license to be validated through only one SC and dSC pair.
Let us use the notation to indicate one of the SCs with as an SC identifier. In the proposed method, each SC consists of a series of ‘segments’, and each segment consists of ‘SC blocks’. We denote the n-th segment of by , and the j-th SC block of the segment by .
The proposed method uses a predetermined rule based on tail bits of MC block hash value to select one SC in which the old segment (being mined in the SC network) is to be terminated and a new segment is to be initiated. To explain this, let us assume that the hash value of the MC block , based on the predetermined rule, initiates the n-th segment of . Let us also assume that is the next MC block that initiates the next segment of . Let
be SC blocks mined in the SC network during the time interval that to are computed in the MC network.
In the proposed method, each SC must have its dual dSC. Let us use the notation to indicate the dSC corresponding to . Just like , each dSC consists of a series of ‘segments’, and each segment consists of ‘dSC blocks’. We denote the n-th segment of by , and the j-th dSC block of the segment by . Let
be dSC blocks mined in the -SC network during the time interval that to are computed in the MC network.
Let us assume that the block chaining in the SC segment has the same structure in MC. To be specific, the mining of the SC block in the SC segment needs to find a nonce that makes
where is the number transactions to be included in , is the hash value of the SC block , and represents the condition determined by the consensus algorithm of SC. The hash value of the SC block is defined by
with a nonce which satisfies (16).
The block chaining structure of the dSC segment is almost identical to that of the SC segment. One difference is that the dSC block records only one ‘smart contract’, while the SC block records multiple transactions. Detailed explanation will be given in Section 3.3.3.
The SC segment and dSC segment are connected to MC starting from and ending at as follows:
- When is announced, miners in and networks stop block mining for and , and initiate the block mining for the new SC segment and dSC segment starting from , by making be the first SC and dSC blocks in and :
- When is announced, the miner of connects SC segment and dSC segment to MC by updating the hash value aswhere and are hash values of the last blocks in and , respectively.
3.3. Creation, Transfer, and Termination of SPDC License
In this section, we shall explain how the SPDC license is created, transferred, and terminated through the HMBS.
3.3.1. Registration Key
We use the term ‘registration key’ to refer to a public key associated with a fixed amount of HMBS coins. The proposed method uses the registration key as the SPDC license user identity. The fixed amount of HMBS coins assigned to the registration key is called ‘registration fee’. For simplicity of presentation, we assume that the registration key itself is ‘registered’ to make users not transfer HMBS coins to it. We also assume that the registration fee can be spent just like any other HMBS coins.
The proposed method follows the UTXO (Unspent Transaction Output) model of Bitcoin in recording transactions related to HMBS coin transfer. In such a case, the ‘address’ (the hash value of the public key), instead of the public key itself, is used as the identity of the payer or the receiver. In this paper, however, we shall ignore the described difference in the public key and the address for simplicity of presentation.
3.3.2. SPDC License
We shall use following notations to represent descriptions written on the right hand sides: (U: a user)
and
Let us consider the case when a user U tries to buy from an owner P of s by using his registration key . To fulfill this, the proposed method makes U to request the following transaction t is to be recorded in one of the SCs, say, SC:
where C is the price for . The proposed method uses the recording of t in SC as a necessary condition for the change in the SPDC account that allows the user U to play s.
Let us consider another case when a user V tries to resell the SPDC license assigned to his registration key to another user W by reassigning to , a registration key of W. Here we assume that P, the owner of s, made transferable when they made s from the beginning. They can specify rules for when to create, transfer, or terminate SPDC license of s in the license rule in Table 3.
To fulfill the transfer of between users V and W, the proposed method makes V and W request the following transaction to be recorded in SC:
where is the price to be paid by W to V as the license transfer fee. Here we note that SC must be the same SC where the transaction that generates was recorded. The proposed method uses the recording of in -SC as a necessary condition to change the SPDC account of s so that W is allowed to to play s, while V cannot play s any longer.
Finally, we consider the case where an HMBS participant, including the owner P of s, tries to terminate the SPDC license assigned to a registration key of a user Y, due to license misuse. Various misuses can cause the termination of the SPDC license. Among them, we shall consider the registration key sharing case here. In the proposed method, to play s, Y needs the private key paired with the registration key (see Section 3.3.4). Therefore, if Y discloses to another user, say, , then can play s without paying the license fee to P, the owner of s. At the same time, can spend the registration fee assigned to . Such a spending is easily detectable in the proposed HMBS. To punish this type of license misuse, anyone who finds the registration key sharing can request the termination of by submitting the following transaction to the SC network:
where the ‘evidence’ is the location of the transaction that spent the registration fee assigned to . Here we also note that SC must be the same SC where the transaction that generates was recorded.
Notice that the user , by knowing , can play not only s but also any SPDCs whose licenses are assigned to . Thus, the termination of must be requested for all SPDCs whose licenses are assigned to . However, it might require a large number of registration key sets to be changed. As explained in Section 3.2.2, it would be extremely difficult, if not impossible, to find inputs values q’s in (9) for a large number of registration key set changes. Considering this fact, the proposed method makes one transaction produce one request of terminating in each SPDC license . The termination of in other SPDCs whose licenses are assigned to can be completed as time progresses.
3.3.3. Smart Contracts in Dual Sidechains
Without loss of generality, we now assume that transactions t in (26), in (27), and in (28) are recorded in the i-th block of the n-th segment of SC, and itself was started from MC-block . The miner who connects to will receive the block reward and a part of the transaction fees for recording t and transactions (after is successfully connected to MC). The remaining part of transaction fees will be given to the miner who connects to MC.
When the n-th segment ends at the MC block , all transactions recorded in blocks of segment are almost recorded in MC. The realization of those transactions is firmly guaranteed as more blocks are appended to MC after . Notice that the recording of HMBS coin transfers in transactions t and can be almost completed at the moment when the n-th segment is connected to in MC, but requests of changing ownership of as in t, , and are not completed yet. To be specific, the transaction t in (26) demands the inclusion of in in Table 3 so that MP of U gives the ‘continue-to-play’ signal to IM (immobilizer) of s after verifying that U has , the private key paired with the registration key . In other word, is not yet included in which determines who can play s. Similarly, the transaction in (27) demands the inclusion of and the exclusion of in , and the transaction in (28) demands the exclusion of from . Those requests are not completed yet.
Considering frequent license change requests, the immediate response to each request is not efficient. To efficiently satisfy license change (e.g., creation, transfer, and termination) requests in , the proposed method uses the dSC-segment that started from immediately after the SC segment ended at . When the dSC segment starts being formed, a miner in network reviews license change requests in for an SPDC s and makes a dSC block, say, which consists of one ‘smart contract’
where and are registration key sets for s before and after license change requests in are applied, respectively, and is the bitstream that satisfies (9) with , i.e.,
The miner who finds first tries to connect the dSC block to the dSC segment by following the block chaining rule of SC.
The smart contract (29) is executed when the dSC segment is connected to MC. To be specific, in the account of SPDC s in AC, the registration key set and the input value q are replaced with and , respectively.
Figure 3 illustrates how the SPDC license change request is executed. In Step 1, SPDC license change requests are recorded in the SC segment . In Step 2, SPDC license change requests recorded in are sorted according to SPDC and form smart contracts in . Finally, in Step 3, smart contracts in are executed to change licenses sets in AC immediately after the dSC segment to MC.
Figure 3.
The process of changing an SPDC license in the HMBS.
3.3.4. Manager Program
The proposed method makes the MP (manager program) communicate with the (immobilizer) of SPDCs and use SPDC accounts in AC to determine who can play SPDCs. To explain this, let us consider the case when a user U uses the MP to play SPDC s. The user U does not need to pay the license fee for downloading s, since the downloading itself does not make s playable. At the moment when U plays s, The MP gives the ‘continue-to-play’ command to the inside the SPDC s if U can provide a correct response which can be made only by using the private key paired with one of the registration keys of s, and the ‘stop’ command to the of s, otherwise. Thus, to play s, U needs to pay the license fee by requesting the transaction t (26) be recorded in SC. It leads to the inclusion of a registration key of U in of s. After this, U can play s by proving the ownership of the private key paired with to the MP, without revealing the private key itself.
4. Discussion
In this section, we shall discuss the results of thought experiments on possible attacks on the proposed method. In this thought experiment, we assume that the license of SPDC s is assigned to a registration key of a user U.
Unauthorized SPDC license sharing: Suppose that U wants to share with many anonymous Internet users. As mentioned in Section 3.3.2, the sharing of the SPDC license needs the sharing of the private key paired with . In this case, any users who know can spend the registration fee assigned to . Such action is easily detectable in the HMBS. It would lead to the termination of all SPDC licenses assigned to . This scenario indicates that the attempt to perform Internet-wide license sharing would be strongly suppressed.
Attempt to use a terminated SPDC license: Suppose that the license is terminated and U attempts to play s by using a local HMBS copy at which is still in the registration set . The user U, however, cannot provide the up-to-dateness of to the manager program (MP), since the MP would refuse to play s by checking that is not from the latest HMBS.
Attempt to use the SPDC license without ever paying fee: Suppose that U attempts to use the license without ever paying the license fee to the owner P of s. In other words, U never has requested a transaction like (26) to be recorded in one of SC segments. We note that U can play s if his registration key is in the registration key set of s. Therefore, if U could find the solution q of (9) with containing , then this attempt might work at first glance. This approach is, however, worthless for following reasons:
- Even if U finds the solution q of (9), he can only modify in his local copy of the HMBS. He cannot verify the validity and the up-to-dateness of the modified to the MP, and hence the MP refuses to play s.
It is also conceivable that U could make the smart contract request to be in in some dSC segments, say, . In order for to be in the , however, the immediately preceding SC segment must have a transaction which shows the purchase of the by U from P. This contradicts our early assumption that U never has requested a transaction like (26) for the purchase of . Thus, it is impossible to use an SPDC license without ever paying the fee.
Attempt to use the SPDC license after reselling it: Suppose that U attempts to play s after reselling the SPDC license to a user V. The transfer of the SPDC license from U to V indicates that the registration key used in playing s is removed from . Therefore, U cannot play s anymore.
Double HMBS coin spending: Suppose that U makes two transactions and to spend the same HMBS coin. Here we can exclude the case when or are in dSC segments with the reason that dSCs record smart contracts only, and the dSC block reward must be given in MC after smart contracts are executed in AC (we can include this kind of rule in smart contracts in dSCs from the beginning).
We begin with the case when both and are requested for approval in MC. In this case, it is obvious that only one of and can be approved in the sequential chain of MC blocks.
Next, we consider the case when in MC and in segment that starts from and ends at in MC. If , then cannot be recorded in from the beginning. If , then cannot be recorded in from the beginning. Finally, if , then is recorded in , but regarded as invalid in MC. Therefore, only one of and can be used for the coin spending in the case when and .
We now consider the case when in the segment that starts from and ends at and in the segment that starts from and ends at . We first consider the case when and are in different SCs, i.e., . In this case, all , , , and are distinct, and hence it suffices to consider the following four cases. Each of them prevents double HMBS coin spending as follows:
- If , then cannot be recorded in from the beginning, while is recorded in and regarded as valid in MC.
- If , then is recorded in and regarded as valid in MC, while cannot be recorded in from the beginning.
- If , then is recorded in , but regarded as invalid in MC, while is recorded in and regarded as valid in MC.
- If , then is recorded in and regarded as valid in MC, while is recorded in , but regarded as invalid in MC.
On the other hand, in the case when and are in the same kind of SC, i.e., , it suffices to consider following three cases. Each of them prevents double HMBS coin spending as follows:
- If , then cannot be recorded in from the beginning, while is recorded in and regarded as valid in MC.
- If , then is recorded in and regarded as valid in MC, while cannot be recorded in from the beginning
- If and , i.e., and are in the same SC segment, then only one of and is recorded in that segment, and eventually regarded as valid in MC.
These arguments so far show that the proposed method allows only one of and to be regarded as valid in MC, and hence prevents double HMBS coin spending.
Double license reselling: Suppose that U attempts to resell to both users V and W by requesting two transactions ( to V) and ( to W) to be recorded in SCs. Here we note that and must be recorded in the same SC, since and are transactions related to the same SPDC s. Thus, only one of and can be recorded in the sequential chain of blocks in single SC.
Malicious coin transferring to another user’s registration key: Suppose U attempts to harm a user V by performing the following:
- U transfers a small amount of HMBS coin to a registration key of V, without V knowing, to make the HMBS coin assigned to not equal to the registration fee; and
- U requests the termination of with the evidence that the amount of coin assigned to is not equal to the registration fee.
At this point, is used at least twice; once in representing the coin of the registration fee for V and the other in representing the coin received from U. This could produce confusion; some miners might consider as invalid by judging that the latter one represents the registration fee.
To avoid this type of the wrong accusation, the proposed method lets the accused user V have an ‘appeal chance’. When V is informed that their registration key is to be unregistered, V will spend all coins assigned to except the original registration-fee-representing coin and request the nullification of the transaction that showed as invalid. Even in the case when is already unregistered, V can still reverse the termination of all SPDC licenses of s assigned to by using the described method.
Notice that this approach does not work for the case when the private key paired with the registration key is disclosed; whenever V fills the HMBS coin assigned to to be equal to the registration fee, someone who knows would spend the coin assigned to , and hence the registration key would be requested for the termination, again.
Head start block mining: The block mining in the proposed method, whether it is in MC, AC, SC or dSC, needs the hash value of the immediately preceding block. Therefore, the mining of the next block is worthless, in the case when the hash value of the current block is not computed yet.
Head start computation of the input value: In the proposed method, miners in dSC network must make smart contracts in the dSC segment, say, , by reviewing all transactions in the immediately preceding SC segment . For instance, to make the smart contract (29), miners in dSC network must check whether the request of changing to is correct, including the validity of hash values of SC blocks (in ) containing registration key change requesting transactions (recall the form (10) of the element of the registration key set). Therefore, miners cannot start the computation of the input value in at least before starts.
5. Conclusions
In this study, we propose a digital content service model based on a hierarchical multi-blockchain system (HMBS). The proposed method uses the HMBS as a tool to use the cryptocurrency for license fee collecting and manage content accounts defining license usage rules in the accountchain (AC). In addition, the proposed method uses several sidechains (SCs) and dual sidechains (dSCs) to efficiently record transactions and smart contracts of the HMBS by parallel processing. The transparent traceability and the tamper-proof nature of the proposed HMBS allow content owners to hire several promoters to increase content sale revenues, without worrying about the possibility of revenue hiding by some promoters.
The proposed method distributes digital content in the self decryptable encrypted format and makes the self decryption controlled only by a program called the indistinguishably embedded immobilizer (IM). The IM controls the decryption of content based on the HMBS received from the manager program (MP). The role of MP is to provide the latest HMBS to the IM. In this sense, the proposed method uses the HMBS as a secret key in decrypting digital content. By doing so, the proposed method can easily revoke the service to bad users.
The proposed method uses white-box cryptographic methods to allow SPDC to be stored safely in a hostile environment, such as users’ hard drives. Furthermore, by making SPDC self decryptable, decryption keys can be disposable immediately after they are used in the creation of SPDC.
The HMBS controls the whole procedure of SPDC license distribution automatically. Thus, the SPDC owner does not need to respond to the SPDC license buying request; the smart contract of the HMBS gives the SPDC license to the buyer and collects the payment for the SPDC owner automatically.
The proposed digital content service model can give more benefit to users and content owners than current monopolistic platform services. The proposed method allows content owners to distribute their digital content and collect license fees without resorting to intermediaries which would demand a significant portion of revenues. The proposed method also provides various options to owners in promoting their content. For instance, their digital content can be sold in time-limited, device-limited, or license-transfer-number-limited versions, et cetera. Users will be also beneficial by not having intermediaries. Nowadays, intermediary platform companies set almost identical fixed prices for similar kinds of digital content, even though some content owners want to lower the price to promote their content more. In the proposed method, however, the price will be determined by the owner, and hence users will enjoy reduced prices.
The self decryptable encrypted format in the proposed method would generate extra overheads in distributing and storing digital content. The future research program includes a study on reducing those overheads along with an empirical evaluation of the proposed smart propertization method for the protection of intellectual rights on digital content.
Author Contributions
Conceptualization, Writing—original draft, N.-Y.L., J.Y. and C.-S.K. All authors have read and agreed to the submitted version of the manuscript.
Funding
This work has supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2019R1F1A1059357).
Conflicts of Interest
The autho rs declare no conflict of interest.
References
- IFPI Global Music Report 2020—The Industry in 2019. Available online: https://www.ifpi.org/ifpi-issues-annual-global-music-report (accessed on 10 October 2020).
- Grand View Research Report—Video Streaming Market Size, Share & Trends Analysis Report by Streaming Type, by Solution, by Platform, by Service, by Revenue Model, by Deployment Type, By User, by Region, and Segment Forecasts, 2020–2027. Available online: https://www.grandviewresearch.com/industry-analysis/video-streaming-market (accessed on 15 April 2021).
- Oberholzer-Gee, F.; Strumpf, K. The effect of file sharing on Record Sales: An Empirical Analysis. J. Political Econ. 2007, 115, 1–42. [Google Scholar] [CrossRef]
- Smith, M.D.; Telang, R. Competing with Free: The Impact of Movie Broadcasts on DVD Sales and Internet Piracy. Manag. Inf. Syst. Q. 2009, 33, 321–338. [Google Scholar] [CrossRef]
- Andersen, B.; Frenz, M. Don’t blame the P2P file-sharers: The impact of free music downloads on the purchase of music CDs in Canada. J. Evol. Econ. 2010, 20, 715–740. [Google Scholar] [CrossRef]
- Hui, K.-L.; Png, I. Piracy and the Legitimate Demand for Recorded Music. Econ. Anal. Policy 2003, 2, 1–24. [Google Scholar] [CrossRef]
- Peitz, M.; Waelbroeck, P. The Effect of Internet Piracy on Music Sales: Cross-Section Evidence. Rev. Econ. Res. Copyr. Issues 2004, 1, 71–79. [Google Scholar]
- Zentner, A. File Sharing and International Sales of Copyrighted Music: An Empirical Analysis with a Panel of Countries. Top. Econ. Anal. Policy 2005, 5, 1–17. [Google Scholar]
- Stevans, L.K.; Sessions, D.N. An Empirical Investigation Into the Effect of Music Downloading on the Consumer Expenditure of Recorded Music: A Time Series Approach. J. Consum. Policy 2005, 28, 311–324. [Google Scholar] [CrossRef]
- Bounie, D.; Bourreau, M.; Waelbroeck, P. Piracy and the Demand for Films: Analysis of Piracy Behavior in French Universities. Rev. Econ. Res. Copyr. Issues 2006, 3, 15–27. [Google Scholar] [CrossRef]
- Michel, N.J. The impact of digital file sharing on the music industry: An empirical analysis. Top. Econ. Anal. Policy 2006, 6, 1549. [Google Scholar] [CrossRef]
- Rob, R.; Waldfogel, J. Piracy on the High C’s: Music Downloading, Sales Displacement, and Social Welfare in a Sample of College Students. J. Law Econ. 2006, 49, 29–62. [Google Scholar] [CrossRef]
- Adermon, A.; Liang, C.-Y. Piracy and music sales: The effects of an anti-piracy law. J. Econ. Behav. Organ. 2014, 105, 90–106. [Google Scholar] [CrossRef]
- Sharpe, N.F.; Arewa, O.B. Is Apple Playing Fair? Navigating the iPod FairPlay DRM Controversy. Northwest. J. Technol. Intellect. Prop. 2007, 5, 331–349. [Google Scholar]
- Ducci, F. Natural Monopolies in Digital Platform Markets; Cambridge University Press: Cambridge, UK, 2020. [Google Scholar]
- Ujo Music. Available online: https://ujomusic.com (accessed on 15 April 2021).
- Ethereum. Available online: https://ethereum.org (accessed on 15 April 2021).
- Resonate Music. Available online: https://resonate.is (accessed on 15 April 2021).
- SingularDTV. Available online: https://singulardtv.com (accessed on 15 April 2021).
- Mishra, D. An accountable privacy architecture for digital rights management system. In Proceedings of the Sixth International Conference on Computer and Communication Technology, Allahabad, India, 25–27 September 2015. [Google Scholar]
- Zhang, Z.; Zhao, L. A Design of Digital Rights Management Mechanism Based on Blockchain Technology. In Blockchain—ICBC 2018; Chen, S., Wang, H., Zhang, L.J., Eds.; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2018; Volume 10974. [Google Scholar]
- Bhowmik, D.; Feng, T. The multimedia blockchain: A distributed and tamper-proof media transaction framework. In Proceedings of the 22nd International Conference on Digital Signal Processing (DSP 2017), London, UK, 23–25 August 2017. [Google Scholar]
- Ma, Z.; Huang, W.; Gao, H. A new blockchain-based trusted DRM scheme for built-in content protection. EURASIP J. Image Video Process. 2018, 2018, 91. [Google Scholar] [CrossRef]
- Meng, Z.; Morizumi, T.; Miyata, S.; Kinoshita, H. Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain. In Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23–27 July 2018. [Google Scholar]
- Opuni-Boachie, K.; Agyekum, O.; Xia, Q.; Liu, Y.; Pu, H.; Cobblah, C.N.A.; Kusi, G.A.; Yang, H.; Gao, J. Digital Media Copyright and Content Protection Using IPFS and Blockchain. In Image and Graphics, ICIG 2019; Zhao, Y., Barnes, N., Chen, B., Westermann, R., Kong, X., Lin, C., Eds.; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2019; Volume 11903. [Google Scholar]
- Gaber, T.; Ahmed, A.; Mostafa, A. Privdrm: A privacy-preserving secure digital right management system. In Proceedings of the Evaluation and Assessment in Software Engineering, Trondheim, Norway, 15–17 April 2020. [Google Scholar]
- Keoh, S.L. Marlin: Toward seamless content sharing and rights management. IEEE Commun. Mag. 2011, 49, 174–180. [Google Scholar] [CrossRef]
- Kishigami, J.; Fujimura, S.; Watanabe, H.; Nakadaira, A.; Akutsu, A. The blockchain-based digital content distribution system. In Proceedings of the 2015 IEEE Fifth International Conference on Big Data and Cloud Computing, Dalian, China, 26–28 August 2015. [Google Scholar]
- Vishwa, A.; Hussain, F.K. A blockchain based approach for multimedia privacy protection and provenance. In Proceedings of the 2018 IEEE Symposium Series on Computational Intelligence (SSCI), Bangalore, India, 18–21 November 2018. [Google Scholar]
- Guo, J.; Li, C.; Zhang, G.; Sun, Y.; Bie, R. Blockchain-enabled digital rights management for multimedia resources of online education. Multimed. Tools Appl. 2019, 79, 9735–9755. [Google Scholar] [CrossRef]
- Ghaffar, A.; Azeem, M.; Abubaker, Z.; Gurmani, M.U.; Sultana, T.; Shehzad, F.; Javaid, N. Smart Contracts for Research Lab Sharing Scholars Data Rights Management over the Ethereum Blockchain Network. In Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2019; Barolli, L., Hellinckx, P., Natwichai, J., Eds.; Lecture Notes in Networks and Systems; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Garba, A.; Dwivedi, A.D.; Kamal, M.; Srivastava, G.; Tariq, M.; Hasan, M.A.; Chen, Z. A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw. Appl. 2020. [Google Scholar] [CrossRef]
- McConaghy, M.; McMullen, G.; Parry, G.; McConaghy, T.; Holtzman, D. Visibility and digital art: Blockchain as an ownership layer on the Internet. Strateg. Chang. 2017, 26, 461–470. [Google Scholar] [CrossRef]
- Wang, Z.; Yang, L.; Wang, Q.; Liu, D.; Xu, Z.; Liu, S. ArtChain: Blockchain-Enabled Platform for Art Marketplace. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019. [Google Scholar]
- Ma, Z.; Jiang, M.; Gao, H.; Wang, Z. Blockchain for digital rights management. Future Gener. Comput. Syst. 2018, 89, 746–764. [Google Scholar] [CrossRef]
- Ren, N.; Zhao, Y.; Zhu, C.; Zhou, Q.; Xu, D. Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps. ISPRS Int. J. Geo-Inf. 2021, 10, 294. [Google Scholar] [CrossRef]
- Suciu, G.; Nădrag, C.; Istrate, C.; Vulpe, A.; Ditu, M.; Subea, O. Comparative Analysis of Distributed Ledger Technologies. In Proceedings of the 2018 Global Wireless Summit (GWS), Chiang Rai, Thailand, 25–28 November 2018. [Google Scholar]
- Hei, Y.; Liu, J.; Feng, H.; Li, D.; Liu, Y.; Wu, Q. Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management. Comput. Netw. 2021, 191, 108029. [Google Scholar]
- Federal Information Processing Standards, U.S. National Institute of Standards and Technology. Announcing the Advanced Encryption Standard (AES). Available online: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf (accessed on 15 April 2021).
- Chow, S.; Eisen, P.A.; Johnson, H.; van Oorschot, P.C. A white-box DES implementation for DRM applications. In Digital Rights Management, Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management (DRM 2002), Washington, DC, USA, 18 November 2002; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
- Billet, O.; Gilbert, H.; Ech-Chatbi, C. Cryptanalysis of a White Box AES Implementation. In Selected Areas in Cryptography, Proceedings of the 11th International Workshop on Selected Areas in Cryptography (SAC 2004), Waterloo, ON, Canada, 9–10 August 2004; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2004. [Google Scholar]
- DeMulder, Y.; Roelse, P.; Preneel, B. Cryptanalysis of the Xiao-Lai White-Box AES Implementation. In Selected Areas in Cryptography, Proceedings of the SAC 2012, Trento, Italy, 26–30 March 2012; Knudsen, L.R., Wu, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 15 January 2020).
- NIST. Descriptions of SHA-256, SHA-384, and SHA-512. Available online: https://web.archive.org/web/20130526224224/http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf (accessed on 15 April 2021).
- Narayanan, A.; Bonneau, J.; Felten, E.; Miller, A.; Goldfeder, S. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction; Princeton University Press: Princeton, NJ, USA, 2016. [Google Scholar]
- Lee, N.-Y.; Yang, J.; Onik, M.M.H.; Kim, C.-S. Modifiable Public Blockchains Using Truncated Hashing and Sidechains. IEEE Access 2019, 7, 173571–173582. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).