Next Article in Journal
An Integrated Orthogonal Frequency-Division Multiplexing Chirp Waveform Processing Method for Joint Radar and Communication Based on Low-Density Parity-Check Coding and Channel Estimation
Next Article in Special Issue
A Metric Learning Perspective on the Implicit Feedback-Based Recommendation Data Imbalance Problem
Previous Article in Journal
A New System Supporting the Diagnostics of Electronic Modules Based on an Augmented Reality Solution
Previous Article in Special Issue
An Electrocardiogram Classification Using a Multiscale Convolutional Causal Attention Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Automated Over-the-Top Service Copyright Distribution Management System Using the Open Digital Rights Language

1
Protocol Engineering Laboratory, Sejong University, Seoul 143-747, Republic of Korea
2
Department of Computer and Information Security and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 143-747, Republic of Korea
3
Technical Research Center, DigiCAP, Seoul 121-904, Republic of Korea
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(2), 336; https://doi.org/10.3390/electronics13020336
Submission received: 26 November 2023 / Revised: 1 January 2024 / Accepted: 6 January 2024 / Published: 12 January 2024
(This article belongs to the Special Issue Feature Papers in Computer Science & Engineering)

Abstract

:
As the demand and diversity of digital content increase, consumers now have simple and easy access to digital content through Over-the-Top (OTT) services. However, the rights of copyright holders remain unsecured due to issues with illegal copying and distribution of digital content, along with unclear practices in copyright royalty settlements and distributions. In response, this paper proposes an automated OTT service copyright distribution management system using the Open Digital Rights Language (ODRL) to safeguard the rights of copyright holders in the OTT service field. The proposed system ensures that the rights to exercise copyright transactions and agreements, such as trading of copyright, can only be carried out when all copyright holders of a single digital content agree based on the Threshold Schnorr Digital Signature. This approach takes into account multiple joint copyright holders, thereby safeguarding their rights. Furthermore, it ensures fair and transparent distribution of copyright royalties based on the ratio information outlined in ODRL. From the user’s perspective, the system not only provides services proactively based on the rights information specified in ODRL, but also employs zero-knowledge proof technology to handle sensitive information in OTT service copyright distribution, thereby addressing existing privacy concerns. This approach not only considers joint copyright holders, but also demonstrates its effectiveness in resolving prevalent issues in current OTT services, such as illegal digital content replication and distribution, and the unfair settlement and distribution of copyright royalties. Applying this proposed system to the existing OTT services and digital content market is expected to lead to the revitalization of the digital content trading market and the establishment of an OTT service environment that guarantees both vitality and reliability.

1. Introduction

Since the emergence of COVID-19, the demand for digital content has surged, invigorating the digital content market. Nonetheless, in contrast to the positive developments associated with this growth, the central stakeholders of the digital content industry, particularly the copyright holders, find themselves in a predicament where their legitimate rights are not being sufficiently safeguarded.
Spotify, a major music streaming platform, has introduced initiatives to protect the rights of music copyright holders, particularly against illegal reproduction and distribution, including stream ripping. However, these copyright holders, who use Spotify’s service, have highlighted issues with the method of royalty settlement and distribution. The root of these problems is the ‘black box’ issue, where music ownership is split among different groups, resulting in delays or non-payment of the rightful royalties to the copyright holders [1,2]. The same problem is evident in Theme/Background/Signal (TBS) music as well. In addition, the video content copyright sector is facing challenges related to copyright infringement caused by widespread account sharing, and issues arising from the lack of transparency in the settlement and distribution of royalties [3,4].
Recently in the OTT service industry, there has been a rise in illegal replication and distribution of digital video content. This is driven by practices like stream ripping, rampant password sharing among users, credential fraud, deceptive consumer endpoints, and man-in-the-middle attacks on Content Delivery Networks (CDNs). As a result, the rights that should be protected for copyright holders are increasingly being violated [5].
Furthermore, when copyright holders delegate the management of their digital content rights to agents, the opaque structure of this arrangement frequently results in their inability to clearly access information about the usage history and the status of royalty settlements and distributions for their digital content.
In order to protect the rights of copyright holders, there have been significant research and development efforts focused on creating a fair and transparent copyright management system. This involves the use of technologies like Digital Rights Management (DRM) and Blockchain.
However, a majority of these studies fail to offer dedicated solutions for safeguarding sensitive data involved in the management and distribution of digital content copyrights and in royalty settlements. This lack of protective measures poses a risk of privacy breaches and, in cases of data leaks, could lead to disputes between companies or between companies and individuals.
Digital content creation can involve just one copyright holder, but it often includes several joint copyright holders. Yet, most studies fail to investigate methods for managing royalty settlements and distributions in cases involving multiple joint copyright holders, which limits the practical application of these solutions in the industry. Moreover, while current policies and regulations demand the consent of all copyright holders for transactions involving digital content, this critical requirement is also overlooked in the study.
Consequently, the ODRL-based automated OTT service copyright management system proposed in this study not only suggests a method for settling and distributing royalties with consideration for multiple stakeholders, specifically joint copyright holders, but also provides a mechanism for these holders to express their consent effectively and logically through signatures in the event of a copyright transaction. Moreover, this system addresses the sensitive data involved in digital content distribution and royalty settlements by proposing privacy protection measures. This approach overcomes the shortcomings and limitations that current research has not yet resolved, aiming to offer a viable system for the digital content industry.
The layout of this paper is outlined as follows. In Section 2, the paper delves into the technical concepts of Hyperledger Fabric, smart contracts, and ODRL. Section 3 provides an analysis of the current Blockchain-based methods for copyright management, including royalty settlement and distribution. Section 4 elaborates on the ODRL-based automated OTT service copyright management system proposed in this study. Section 5 explains the key modules of this system. Performance analysis is conducted in Section 6 to showcase the system’s efficiency, while Section 7 explores the technical approaches and constraints associated with the proposed system. The paper is wrapped up in Section 8.

2. Background

2.1. Hyperledger Fabric

Hyperledger Fabric is a Blockchain platform designed for enterprise use. Before version 2.0, it had no concept of separate cryptocurrency and managed the nodes included in each organization independently. Since Hyperledger Fabric is an enterprise Blockchain, it employs an Membership Service Provider (MSP) to perform identity verification of nodes to participate in the Blockchain network, enabling access control and establishing accountability in case of issues. Additionally, when composing chaincode, it allows configurations based on general programming languages, ensuring versatility. It also guarantees confidentiality and privacy by allowing only the authorized peers participating in the channel to access the data [6,7,8,9,10].
As can be seen in Figure 1, various components operate organically on the Hyperledger Fabric network [6]. Table 1 below shows the main roles of components in the Hyperledger Fabric architecture [6,7,8,9,10].
In the case of transaction processing and recording in the ledger based on the components in Figure 1, operations between components are performed as shown in Figure 2.
  • The client forwards the signed transaction proposal to the predefined Endorser.
  • The Endorser checks whether the signature of the transaction proposal received from the client is valid, and if valid, executes the chaincode based on the parameters of the transaction proposal and delivers the transaction results (including Read set and Write set) to the client.
  • The client checks whether the signature value of the returned transaction result matches the Endorser’s signature value.
  • If the reliability of the transaction result returned through Process 3 is guaranteed, it is delivered to the ordering service node.
  • As the ordering service node receives already verified transaction results from the client, it organizes them by channel and time to create a transaction block per channel.
  • Transaction blocks per channel generated by the ordering service node are broadcast to all peer nodes on the Blockchain network.
  • All peer nodes verify the validity by checking the contents of the R/W set, such as guarantee policy and ledger state changes, based on the received transaction block, and if verification is successful, they commit it to the world state.
Hyperledger Fabric is currently being employed in areas such as smart homes, healthcare, education, and digital content, and the trend shows that its application fields are gradually increasing [11,12,13,14].

2.2. Smart Contract

Blockchain technology is typically divided into public Blockchains like Bitcoin and private Blockchains like Hyperledger Fabric. As illustrated in Figure 3, such Blockchains are generally composed of six layers. This ranges from the ‘Data Layer’, which sets up the data structure including data blocks, timestamps, and other data, to the ‘Application Layer’, which enables the development of various application services based on Blockchain [15].
Within these layers of Blockchain technology, the ‘Contract Layer’ plays a pivotal role in configuring automated events in the Blockchain network. This layer, whether it is Ethereum’s smart contract or Hyperledger Fabric’s chaincode, is programmed to meet specific contract conditions, enabling the execution of user-intended events in an automated manner [15].
Smart contract development typically utilizes programming languages like Solidity and Vyper, and leverages Integrated Development Environments (IDEs) such as Remix and Truffle. For interfacing with nodes, it employs JSON-RPC. The process of creating a smart contract involves writing code, converting it into bytecode, and then distributing this bytecode across the nodes in the Blockchain network. Furthermore, a smart contract has a lifecycle that encompasses the process of accessing a deployed smart contract on the Blockchain network through calls [15,16,17,18].
In contrast, chaincode supports general-purpose programming languages such as GO and JavaScript. It is developed to meet specific user requirements using IDEs like Chaincoder and Goland [19,20,21]. For node interface communication, the gRPC method is employed. Typically, chaincode is written, compiled into an executable file, and then packaged. This packaged chaincode is then distributed to Endorser nodes participating in a channel. Accessing chaincode involves a calling process similar to that of smart contract. However, chaincode differs in that it executes by requesting a proposal, and a transaction is submitted to the Orderer only upon receiving a return value. Blocks created through this process are broadcasted to nodes within the channel via the Ordering Service. Each peer node receiving these blocks adds them and commits them to the world state, ensuring a coherent and secure transaction process.
Smart contract, utilized in public Blockchains, is distributed across all nodes, leading to a distinct approach in access control compared to chaincode. On the other hand, chaincode is only distributed to authorized nodes within a specific channel. This difference significantly impacts how access is controlled. Furthermore, the immutable nature of Ethereum, a public Blockchain, prohibits data updates, rendering smart contract updates infeasible. In contrast, Hyperledger Fabric, a private Blockchain, allows data updates and deletions, contingent on governance permissions. This flexibility enables updates in Hyperledger Fabric that are not possible in Ethereum. Table 2 provides a comparative overview of the key characteristics of smart contract and chaincode [22].

2.3. ODRL

With the increasing diversity of digital content and the widespread dissemination of numerous digital content, the need for a standardized management of digital rights and permissions to protect copyrights has grown. The ODRL emerged in this context, aiming to address the increasingly complex and extensive digital rights management. It allows copyright holders to precisely specify the restrictions they wish to impose on their digital content, and based on this, end-users can clearly understand the usage rights of the digital content, thereby protecting the rights of the copyright holders. The ODRL is designed to be scalable and flexible, enabling the expression of complex rights and permissions through various Classes. The main Classes of the ODRL are as shown in Table 3 [23].
The ODRL specifies digital asset rights in detail through these Classes. A typical ODRL Policy allows the ‘Assigner’ to provide the ‘Asset’ to the ‘Assignee’ via ‘Rule’, which can introduce more granular constraints through ‘Action’ and ‘Constraint’. Such a structured framework ensures that rights are precisely defined and applied, enabling effective management of restrictions like a copyright transfer and access limitations of digital content.
Listing 1 defines rights and restrictions related to the use of digital content based on the ODRL [23]. It indicates an agreement or contract between parties through the ‘Agreement’ subclass of the ‘Policy’ Class. This ‘Policy’ grants rights to the ‘Asset’ set as ‘http://example.com/DigitalContent:0709’, conferred by ‘http://example.com/Agent1’, designated as ‘assigner’. The rights are assigned to ‘http://example.com/Usergoup1’, designated as ‘assignee’. Through ‘PartyCollection’, it is understood that the rights are granted to a group, not just an individual. ‘PartyCollection’ allows specifying that only those meeting certain criteria, defined in ‘refinement’, receive rights. The ‘dateTime’ operand on the left signifies date and time, while ‘lteq’ represents ‘less than or equal to’, meaning the left operand’s value must be less or equal to the right operand, which represents the service expiry date. Thus, through the ‘refinement’ condition, it is discerned that ‘Usergroup1’ is a collection of ‘assignees’ with usage rights until ‘2024-07-09’. The granted rights include the ‘play’ action within the ‘Action’ Class, permitting playback of the target. The constraint on ‘Action’ includes ‘schema:age’ as the left operand, and ‘gteq’, meaning ‘greater than or equal to’. The right operand being ‘19’ indicates that the digital content playback right is granted only if the user’s age satisfies the condition of being 19 years or older. Therefore, through Listing 1’s ODRL, users in ‘UserGroup1’, grouped by the service expiry date, can play ‘http://example.com/DigitalContent:0709’ only if they are at least 19 years old.
Listing 1. ODRL Information Model V2.2.
Listing 1. ODRL Information Model V2.2.
Electronics 13 00336 i001
In today’s digital environment, where digital content is continuously shared and consumed across borders and platforms, the need for a standardized language of rights is more crucial than ever. In this context, the ODRL has become a key indicator, offering a consistent approach to the representation and application of digital rights.
ODRL, used for expressing digital rights, permissions, and obligations, is widely utilized in various fields beyond the digital environment due to its standardized format.
Firstly, ODRL is being employed in the mobility data space as a means to protect user privacy. Mobility data encompasses all data generated by modes of transport and services, as well as by drivers, and while it offers efficiency to users, it also poses privacy risks [24]. To address this, research is underway to protect sensitive mobility data and to safely exchange it by establishing and formalizing policies through the standardized language of ODRL [25].
Additionally, fashion brands delivering products to customers via the internet, in compliance with the General Data Protection Regulation (GDPR) since May 2018, are looking to use ODRL to build an automated compliance check approach. This aims to overcome the limitations of privacy policies applied in formats unrecognized by computers, by automating the search and monitoring of policies applied through ODRL, thereby more effectively protecting customer privacy in the digital transformation of fashion brands [26].
In an era where personal data protection is a major topic of discussion, ODRL is being actively used in a multitude of research projects aimed at privacy preservation. Furthermore, it is being extensively researched and developed across a range of different domains, emphasizing its vital role in the ongoing discourse on privacy and data protection.

3. Preliminaries

Since COVID-19, there has been an increase in the consumption of digital content, leading to a more active digital content market. However, with this growth, illegal distributors are replicating and distributing digital content unlawfully, infringing on the rights that should be protected for copyright holders.
As a result, extensive study and development are being conducted to ensure the rights of copyright holders, focusing not only on means of protection, but also on strategies to safeguard sensitive data related to digital content copyrights. Furthermore, continuous monitoring is necessary to detect illegal replication and distribution of digital content. Given the limitations of the human effort in such activities, there is a growing need for automated and proactive copyright management systems. Table 4 presents the copyright distribution management systems that have been researched and developed so far to address these requirements. Table 4, the symbol ‘O’ indicates that the system proposed in the paper provides the respective functionality, ‘X’ denotes the absence of that functionality, and ‘’ signifies that only a part of the functionality is offered.
In this regard, A. Kim and M. Kim [1] proposed a Blockchain and smart contract-based music content distribution management system. This system allows for transparent verification of transaction information and copyright data related to music content. It is built on the immutable and transparent characteristics of Blockchain, automating a series of processes based on smart contract. Additionally, they presented a model for representing music content, thereby proposing a way to manage large volumes of music content.
C.-J. Choi et al. [27] noted the limitations in the settlement and distribution of digital content royalties in the current digital content distribution environment. They aimed to improve these limitations by utilizing Blockchain technology. Additionally, they discussed the challenges in proactive integration between Blockchain networks and external systems. To address this, they proposed a Blockchain-based native currency transfer system with scheduled transfer transactions, ensuring reliability. This system, using a single transaction for automated services, overcomes performance limitations that most Blockchain-based royalty settlement and distribution systems could not solve, thus constituting an efficient system.
Zheng, Xinyu et al. [28] observed the rapid growth of the short film industry, alongside the continuous occurrence of copyright infringement issues. In response, they proposed a Blockchain NFT-based short film copyright transaction system. In this system, when a copyright transaction occurs, the transfer of copyright takes place transparently based on account information in the Blockchain environment. Furthermore, the system facilitates the settlement and distribution of royalties within the Blockchain context. A distinctive feature of this system is its rights protection functionality; if users identify copyright infringement cases, they can collect evidence through a dedicated application. For the first reporter, incentives are issued in the form of tokens, setting this system apart from others.
Varaprasada Rao, K. et al. [29] note that with the digitization of content, illegal replication and distribution have become more effortless, leading to a rapid increase in copyright infringement issues. They also highlighted the limitations of current digital content copyright management models, proposing a Blockchain-based copyright protection system to address these shortcomings. This system allows for the registration of digital content information on the Blockchain via smart contract, ensuring smooth transfer of copyrights during transactions.
Li, Jun et al. [30] analyzed that with the spread of digital content, from a copyright holder’s perspective, there is a need for platforms to upload and host digital content online, and from a consumer’s perspective, platforms are needed to pay for and download digital content online. Consequently, they developed and introduced LBRY, a Blockchain-based decentralized digital content market. This system anonymizes the identity of copyright holders who publish digital content, thereby preventing the disclosure of the actual identity and protecting against privacy infringement issues. This feature marks a significant distinction from other study and development trends.
Y. Kim et al. [31] discussed the limitations in the current Theme/Background/Signal (TBS) music domain. Firstly, they noted the difficulty in tracking rights changes due to the frequent alterations inherent in TBS music. Secondly, they identified the risk of unfair and unclear royalty settlements and distributions due to complex licensing methods (e.g., compensation payment methods, usage fee payment methods, comprehensive settlement methods, volumetric settlement methods) and centralized royalty management. To address these issues, they proposed a Blockchain-based TBS music distribution system aimed at improving the unreasonable royalty settlement and distribution practices of the existing TBS music system. While traditional settlement and distribution relied on pre-agreed amounts, proving to be unfair, their proposed system generates usage records through monitoring [4] and bases royalty distributions on the frequency of use. However, as usage records generated through monitoring could contain sensitive information not meant for public disclosure, they utilized selective disclosure technology to ensure that only authorized stakeholders could access sensitive information while keeping it concealed from general users [3,32].
As evident from Table 4, although most studies provide copyright management functionalities, they primarily exhibit limitations in the following four aspects.
(1)
Lack of privacy protection measures for sensitive data related to digital content copyright (e.g., information on copyright holders, sales proceeds, etc.).
(2)
Absence of smart contract signing approach that considers multiple stakeholders.
(3)
Lack of a fair and transparent mechanism for the settlement and distribution of digital content royalties.
(4)
Absence of a method to verify users’ rights to access digital content.
Digital content copyright data can include sensitive information such as the copyright holder’s details, usage fees, or sales/contract information of digital content. Since the system operates on the Blockchain, all nodes participating in the Blockchain network, even those who are not actual stakeholders, can access this sensitive data. This poses a risk of privacy infringement, and with the growing focus on data privacy, it is imperative to explore measures to protect such information.
For digital content copyright transactions to occur, consent from all copyright holders is required. Therefore, for the management of settlement and distribution of royalties via smart contract, it is essential to consider multiple stakeholders, especially in cases of joint copyright holders. Correspondingly, an approach for smart contract signing must be explored. However, most studies have focused only on a single copyright holder and have not separately addressed smart contract solutions for multiple stakeholders, which is a limitation.
One of the biggest issues in the digital content field is the unfair and unclear settlement and distribution of copyright royalties. Currently, royalties are settled and distributed based on the set prices of specific digital content, with most being collected and distributed by trust management organizations. Consequently, copyright holders are unable to verify the exact amount of royalties due for their works. Therefore, a fair and transparent mechanism for royalty settlement and distribution is essential. However, some studies still fail to consider this issue.
Furthermore, from the perspective of digital content distribution management, it is crucial to have a method that proactively verifies a user’s rights to access the digital content. However, most studies proposing digital content distribution management solutions tend to omit the process of verifying user access rights, presenting a limitation in their applicability to real-world industrial environments.

4. Proposed System

This section outlines the automated OTT service copyright distribution management system utilizing the ODRL. The existing system demonstrated a significant drawback: it overlooked the presence of multiple joint copyright holders in a single piece of digital content and did not adequately address the settlement and distribution of copyright royalties or the proactive provision of rights from the consumer perspective. Moreover, the distribution of OTT service copyrights, compounded by the reliance on Blockchain technology, raised ongoing privacy concerns due to the lack of protective measures for sensitive information. The proposed system addresses these issues by enabling multiple joint copyright holders of a single digital content piece to actively engage in OTT service distribution through direct signatures, thereby ensuring a logical and equitable distribution process. Copyright royalties are allocated fairly and transparently, based on the ratios outlined in the ODRL. Furthermore, the system enhances consumer convenience by proactively offering services based on digital content usage rights as specified in the ODRL. To safeguard privacy, particularly concerning sensitive data like social security numbers, the system employs zero-knowledge proof range proof techniques, verifying individuals as over 19 years old without exposing private information [33].
Accordingly, the main goals and contributions of the system proposed in this paper can be as follows.
(1)
The proposed system employs zero-knowledge proofs to safeguard sensitive information in digital content transactions, effectively preventing privacy infringements.
(2)
The proposed system ensures the distribution of digital content is based on the signatures of all joint copyright holders, taking into account multiple joint copyright holders.
(3)
The proposed system automatically verifies the usage rights of consumers as stated in the ODRL and provides digital content accordingly.
(4)
The proposed system automatically extracts information related to copyright royalties distribution from the ODRL and performs settlement and distribution of copyright royalties, considering the joint copyright holders.
To achieve these objectives, this paper proposes the automated OTT service copyright distribution management system utilizing the ODRL, with the system architecture as illustrated in Figure 4. Additionally, Table 5 shows the notation defined to explain the more detailed operation process of the proposed system shown in Figure 4. In the proposed system, the ODRL, a standardized policy expression language, is employed to transparently and efficiently manage the settlement and distribution of C o p y r i g h t R o y a l t i e s and related usage constraints.
The operation of the proposed system in this paper is based on the following two assumptions.
(1)
It is assumed that when A creates C o n t e n t , A submit metadata, which includes information about R a t i o D i s A g e n t among copyright holders, to C I in each country.
(2)
Assuming that C I has received C o n t e n t from the process outlined in Assumption (1), it is assumed that they have verified this C o n t e n t . Once verification is complete, they are presumed to have issued C e r t i f i c a t e C o p y r i g h t R e g i s t e r and O D R L A g e n t based on the received Metadata to A.
In relation to Assumption (2), once C I completes the verification of C o n t e n t , it searches and queries A’s information based on the records in Hyperledger Fabric to verify if A has been previously registered. If A has no prior registration record, a new ODRL code is issued following the same process as earlier. However, if A is a digital content production and entertainment company like the ‘Walt Disney Company’, with a history of C o n t e n t registration, the ODRL information of that A is parsed. Subsequently, new metadata related to the C o n t e n t (e.g., I n f o C o n t e n t , copyright holder information, R a t i o D i s A g e n t ) is added to the existing O D R L A g e n t . This enables O to contract with the digital content production company using a single ODRL, making the contracting process more efficient. The system proposed in this paper operates based on three phases: ‘Register’, ‘Usage’, ‘Settlement/Distribution’, and the key processes of these are as follows.
(1)
Register Phase: Through a c o n t r a c t with O, A registers their C o n t e n t on the InterPlanetary File System (IPFS).
(2)
Usage Phase: C s wishing to access C o n t e n t on O pay a F e e C o n s u m e r . This F e e C o n s u m e r establishes C s R i g h t s A c c e s s to use the C o n t e n t , resulting in the C o n t e n t being specifically provided to these C s in alignment with their established R i g h t s A c c e s s .
(3)
Settlement/Distribution Phase: A transparent and fair settlement and distribution of C o p y r i g h t R o y a l t i e s are performed based on the F e e C o n s u m e r paid by numerous C s .

4.1. Register Phase

Figure 5 depicts the procedure of A registering their created C o n t e n t on IPFS, facilitated by a contractual agreement with O. The specific steps involved in this operation are detailed as follows.
(1)
O delivers a C o n t r a c t to A who owns the copyright for the C o n t e n t to be registered in its service.
(2)
A delivers the O D R L A g e n t issued from C I to M A M along with the delivered C o n t r a c t .
(3)
M A M , upon receiving the O D R L A g e n t , extracts R a t i o D i s A g e n t from its contents, applicable when A is composed of multiple copyright holders.
(4)
M A M proceeds to update the C o n t r a c t by incorporating the R a t i o D i s A g e n t obtained in Step (3).
(5)
Following this, M A M extracts the C o n d i t i o n , R a t i o D i s A g e n t , R a t i o D i s O T T , and S t r e a m F e e from the updated C o n t r a c t as per Step (4).
(6)
M A M sends the extracted C o n d i t i o n , R a t i o D i s A g e n t , R a t i o D i s O T T , and S t r e a m F e e to A as derived in Step (5).
(7)
M A M requests a S i g n a t u r e S h a r e d from A.
(8)
Copyright holders within A, in agreement with the information extracted in Step (5), proceed to sign, thereby sending back a S i g n a t u r e S h a r e d as a response.
(9)
M A M aggregates the S i g n a t u r e S h a r e d received in Step (8). Once all copyright holders have signed, a single signature value S i g n a t u r e S i n g l e is derived.
(10)
M A M then verifies the validity of the S i g n a t u r e S i n g l e generated in Step (9).
(11)
Upon verifying the S i g n a t u r e S i n g l e in Step (10) and confirming the consensus of all copyright holders on the C o n t r a c t terms, M A M sends the O D R L A g e n t and the C o n t r a c t S i g n e d to M U D . Additionally, A forwards the C e r t i f i c a t e C o p y r i g h t R e g i s t e r , received from C I , to O’s M V R .
(12)
M U D creates the O D R L C o n t r a c t by adding and updating the C o n t r a c t S i g n e d received in Step (11) to the O D R L A g e n t .
(13)
M U D then sends the O D R L C o n t r a c t to M O P .
(14)
M O P extracts I n f o O T T from the O D R L C o n t r a c t , which is used to verify C o n d i t i o n in O.
(15)
M O P sends the extracted I n f o O T T to O’s M V R .
(16)
M V R compares the information in the C e r t i f i c a t e C o p y r i g h t R e g i s t e r received from A in Step (11) with the I n f o O T T received from M O P in Step (15).
(17)
M V R of O, through Step (16), verifies the match of C o n t e n t information and then sends I n f o V e r i f i e d to M R G .
(18)
Upon receiving I n f o V e r i f i e d from M V R , which confirms the validation of the C o n t e n t in Step (17), M R G requests R e g i s t e r C o n t e n t from A.
(19)
A, upon receiving a request for R e g i s t e r C o n t e n t from M R G within O, sends the C o n t e n t and I n f o C o n t e n t to IPFS.
(20)
IPFS divides the C o n t e n t received from A into smaller fragments to create B l o c k C o n t e n t .
(21)
A unique H a s h C o n t e n t is generated for the created B l o c k C o n t e n t .
(22)
IPFS registers the B l o c k C o n t e n t created in Step (20) and the H a s h C o n t e n t generated in Step (21) within the IPFS network, thereby forming a distributed file system.
(23)
IPFS sends a M e s s a g e R e g i s t e r to A, indicating the completion of the C o n t e n t registration.
(24)
IPFS sends the H a s h C o n t e n t to Hyperledger Fabric.
(25)
Hyperledger Fabric stores the H a s h C o n t e n t received through process (24) in its ledger.
(26)
Hyperledger Fabric then sends the stored H a s h C o n t e n t to M U D .
(27)
M U D adds the H a s h C o n t e n t received in Step (26) to the O D R L C o n t r a c t , creating an O D R L U p d a t e d .
(28)
M U D forwards the O D R L U p d a t e d , created in Step (27), to M T F .
For the I n f o C o n t e n t in the ‘Asset’ Class of ODRL, a unique identifier such as an International Standard Book Number (ISBN) is used in the uid to distinctly identify the C o n t e n t . Concurrently, for the H a s h C o n t e n t to be stored, as outlined in Step (25), it is stored in ‘source’ since it denotes the location or origin of the C o n t e n t . The H a s h C o n t e n t is thus added to ‘source’, indicating the storage location of the C o n t e n t . Following the storage of H a s h C o n t e n t , automated C o n t e n t delivery can be executed in the ‘Usage’ phase, utilizing the H a s h C o n t e n t as requested by C.

4.2. Usage Phase

Figure 6 explains the ‘Usage’ phase, where O provides C o n t e n t access to C s who wish to use the C o n t e n t available on O. This process assumes a scenario where a new C who has not paid the F e e C o n s u m e r for O wants to use it.
C desiring to use O creates their A c c o u n t C o n s u m e r by completing the membership registration process. During this, C enters their personal identity information, such as a social security number, into O. O then verifies the provided identity information by comparing it with the identification documents. Upon successful verification, O performs a zero-knowledge proof to determine if C is over 19 years old, based on the verified identity information, and stores the generated proof value in the A c c o u n t C o n s u m e r information. Zero-knowledge proof is a cryptographic theory that verifies a fact using only the truth or false of a proposition without revealing any information about the proposition itself [13]. In the proposed system, running in the Hyperledger Fabric environment, using personal information directly in the system without privacy-enhancing technologies can lead to the storage of personal information in a distributed ledger, potentially breaching confidentiality and privacy regarding C identity. To solve this problem, the system employs zero-knowledge proofs to ensure the confidentiality and privacy of C s by verifying only whether they meet the conditions for using C o n t e n t , without storing personal information on the Blockchain.
(1)
C requests playback of the C o n t e n t they wish to use through O that owns the C o n t e n t .
(2)
O sends the A c c o u n t C o n s u m e r of C who requested the C o n t e n t playback to M S T .
(3)
M S T queries the P a y m e n t R a t e P l a n based on the A c c o u n t C o n s u m e r in Hyperledger Fabric.
(4)
Hyperledger Fabric returns the P a y m e n t R a t e P l a n corresponding to the A c c o u n t C o n s u m e r to M S T .
(5)
M S T checks the P a y m e n t R a t e P l a n received in Step (4).
(6)
M S T , based on the P a y m e n t R a t e P l a n checked in Step (5), verifies that C has not made a payment and sends I n f o P a y m e n t to O.
(7)
O, upon confirming that C has not made the required F e e C o n s u m e r for using O, provides C with limited playback of C o n t e n t along with M e t h o d P a y .
(8)
C sends F e e C o n s u m e r , corresponding to their desired rate plan, to M S T , along with their A c c o u n t C o n s u m e r .
(9)
M S T stores I n f o F e e C o n s u m e r in the A c c o u n t C o n s u m e r .
(10)
M S T then sends the updated A c c o u n t C o n s u m e r to M V D as per Step (9).
(11)
M V D determines the specific rate plan corresponding to the payment made, as indicated by the I n f o F e e C o n s u m e r in the received A c c o u n t C o n s u m e r , and confirms the associated R i g h t s A c c e s s .
(12)
Following this, M V D sends the A c c o u n t C o n s u m e r , along with the confirmed
R i g h t s A c c e s s from Step (11), to M G N .
(13)
M G N creates O D R L C o n s u m e r based on the A c c o u n t C o n s u m e r and R i g h t s A c c e s s .
(14)
M G N then sends the O D R L C o n s u m e r to M T F .
(15)
C s who have gained R i g h t s A c c e s s for the C o n t e n t registered on O re-request the playback of their selected C o n t e n t from O.
(16)
O sends the A c c o u n t C o n s u m e r details to M S T .
(17)
M S T retrieves the P a y m e n t R a t e P l a n from Hyperledger Fabric, using the
A c c o u n t C o n s u m e r information as a reference.
(18)
Hyperledger Fabric provides M S T with the P a y m e n t R a t e P l a n associated with the A c c o u n t C o n s u m e r .
(19)
M S T then sends the I n f o P a y m e n t of C, who has requested C o n t e n t playback, to O.
(20)
After verifying that C who requested C o n t e n t playback has completed the payment, O sends both the A c c o u n t C o n s u m e r and the I n f o C o n t e n t requested by C to M T F .
(21)
M T F checks C’s R i g h t s A c c e s s based on the O D R L C o n s u m e r received from M G N during Step (14).
(22)
Once M T F confirms that the specific C has gained R i g h t s A c c e s s for the C o n t e n t , it sends the H a s h C o n t e n t and A c c o u n t C o n s u m e r details to Hyperledger Fabric.
(23)
Hyperledger Fabric, upon receiving the H a s h C o n t e n t , instructs IPFS to send the C o n t e n t , which matches the H a s h C o n t e n t , to C associated with A c c o u n t C o n s u m e r .
(24)
Following this request, IPFS delivers the specified C o n t e n t to C.
(25)
After providing the C o n t e n t , IPFS sends the I n f o C o n t e n t , detailing the C o n t e n t delivered, back to Hyperledger Fabric.
(26)
Hyperledger Fabric then increments the N u m C o n t e n t P l a y count by one, based on the I n f o C o n t e n t it received.
Through the ‘Usage’ phase, C s gain the R i g h t s A c c e s s for C o n t e n t to access C o n t e n t by paying for O. The sequence of actions C s take to engage with C o n t e n t is documented in Hyperledger Fabric, where the usage history of each C o n t e n t item is also stored. As described in Section 4.3, the ‘Settlement/Distribution’ Phase aims to protect the rights of copyright holders. This is achieved through a transparent process of settling and distributing C o p y r i g h t R o y a l t i e s , which is based on the payments made by C s during the ‘Usage’ phase and the recorded usage history of the C o n t e n t .

4.3. Settlement/Distribution Phase

Through the previously described ‘Register’ and ‘Usage’ phases, O collects F e e C o n s u m e r from a large number of C s . In the concluding ‘Settlement/Distribution’ phase, there is a process of transparent and equitable settlement and distribution of the C o p y r i g h t R o y a l t i e s , which are based on the cumulative usage fees of O. Figure 7 illustrates this ‘Settlement/Distribution’ phase. It demonstrates how transparent settlement and distribution of C o p y r i g h t R o y a l t i e s are conducted among various copyright holders, as well as between A comprising multiple copyright holders and O. This process is grounded in the F e e C o n s u m e r that C s pay to access O. The detailed operational procedure is outlined as follows.
(1)
In the ‘Register’ phase as described earlier, M F T , after receiving O D R L U p d a t e d from M U D in Step (28), extracts S t r e a m F e e and sends it to M S T . Additionally, it sends R a t i o D i s A g e n t and R a t i o D i s O T T to M D T .
(2)
M S T queries Hyperledger Fabric for S t r e a m N u m s .
(3)
Hyperledger Fabric returns S t r e a m N u m s to M S T .
(4)
M S T calculates C o p y r i g h t R o y a l t i e s by multiplying the S t r e a m F e e , received from M F T in Step (1), with the S t r e a m N u m s obtained from Hyperledger Fabric in Step (3).
(5)
M S T then sends the calculated C o p y r i g h t R o y a l t i e s to M D T .
(6)
M D T sends the C o p y r i g h t R o y a l t i e s , received from M S T in Step (5), along with R a t i o D i s A g e n t and R a t i o D i s O T T , received from M F T in Step (1), to the Payment Gateway.
(7)
The Payment Gateway, based on the received R a t i o D i s A g e n t and R a t i o D i s O T T , allocates C o p y r i g h t R o y A g e n t to A and C o p y r i g h t R o y O T T to O.
(8)
Finally, the Payment Gateway sends the allocated amounts D i s R o y A g e n t to A and D i s R o y O T T to O, as distributed in Step (7).
Through this process, the automated OTT Service copyright management system utilizing the ODRL can protect the privacy of sensitive data related to C o n t e n t copyrights. By executing C o n t r a c t based on the signatures of all copyright holders, considering multiple stakeholders, the system ensures the protection of authors’ rights. Additionally, it automatically verifies C s R i g h t s A c c e s s to provide C o n t e n t . By taking into account joint copyright holders, the system transparently and fairly settles and distributes C o p y r i g h t R o y a l t i e s . This ensures that copyright holders not only have their rights secured, but also receive fair royalties proportionate to their contributions.
Additionally, many copyright holders currently aim to manage and protect their copyrights effectively through copyright trust management organizations. However, due to inadequate regulations governing the legal relationship between these organizations and the copyright holders, they are often constrained to adhere to the C o n t r a c t established by the trust management organizations. This limitation leads to a challenge for copyright holders in transparently verifying their earnings from these organizations. The proposed system addresses this issue by enabling copyright holders to express their views and enter into C o n t r a c t based on their signatures concerning the R a t i o D i s A g e n t and R a t i o D i s O T T of C o p y r i g h t R o y a l t i e s proposed by O. Furthermore, the system guarantees copyright protection by distributing C o n t e n t according to C s R i g h t s A c c e s s to use this C o n t e n t . Consequently, this approach simplifies the transaction process by eliminating the need for intermediaries like copyright trust management organizations. By reducing agency fees, it ensures that copyright holders receive greater profits and better protection of their rights.

5. Main Modules

In the automated OTT service copyright distribution management system utilizing the ODRL, it has been demonstrated that four key goals can be accomplished through the ‘Register’, ‘Usage’, and ‘Settlement/Distribution’ phases. To realize the second goal—ensuring the distribution of C o n t e n t is based on the collective signatures of all copyright holders, especially in cases involving multiple joint copyright holders — M A M is critical. Additionally, M T F plays a vital role in achieving the third goal of providing C o n t e n t by automatically verifying C s R i g h t s A c c e s s using the information encoded in O D R L C o n s u m e r . This module also contributes to the fourth goal of efficiently managing the settlement and distribution of C o p y r i g h t R o y a l t i e s , taking into account joint copyright holders. Therefore, by detailing the operational processes of these two essential modules, the system vividly illustrates their specific functions and roles.

5.1. Agreement Module

In scenarios involving multiple copyright holders, M A M , responsible for verifying the signatures of all copyright holders, is depicted in Figure 8.
As for the system proposed in this paper, it eliminates the need for an intermediary, such as a trust management organization. Therefore, the term ‘A’ is applicable to either an individual or a collective of multiple copyright holders. In situations where A comprises several copyright holders, M A M employs the Threshold Signature Scheme (TSS) to ensure the protection of copyrights for all involved copyright holders.
The TSS refers to a technology where a single digital signature is generated when a designated threshold number t of participants out of n, each perform a partial signature using their private keys. The TSS process is executed as follows [34].
  • Using a threshold key generation algorithm, a key pair (P, V) is produced. The set S={ S 1 , S 2 ,⋯, S n } represents a collection of ‘shared secret keys’, designed to split the secret key into n parts for distribution among multiple participants involved in the signing. The public key, P, is utilized for verifying the generated signature, and a verification key, V, is also created to validate the shared values of the signature.
  • Each participant generates a signature share value, σ i , using their individual shared secret key and the message m.
  • The signature share value σ i for each participant is verified through P and V.
  • The single signature value σ is formed by combining a set of t verified signature share values { σ 1 , σ 2 , ⋯, σ t }, in accordance with the previously established threshold t.
  • Using the P, σ is then utilized to validate the signature corresponding to m.
Therefore, to ensure that C o n t r a c t is established only when all copyright holders agree on C o n t r a c t terms, the TSS with a threshold value equal to the number of copyright holders n is used to guarantee their rights. Typically, in C o n t e n t copyright transactions, the agreement of all joint copyright holders or stakeholders is required. Accordingly, by considering multiple joint copyright holders, M A M , which facilitates copyright transactions based on signatures, aims to align with current copyright transaction trends. For the keys used in the TSS in M A M , it is assumed that they have been distributed in advance.
A, upon receiving the C o n t r a c t terms from O, forwards them to M A M along with their own O D R L A g e n t . If M A M identifies, based on the O D R L A g e n t , that A is composed of multiple copyright holders, it utilizes the Ratio Extraction Module to extract data concerning the R a t i o D i s A g e n t . These data are then relayed to the Contract Update Module, which integrates it into the existing C o n t r a c t terms to encompass aspects of R a t i o D i s A g e n t . Subsequently, the Data Extraction Module is employed to extract and compile information that will be sent back to A. This step is crucial for communicating the C o n t r a c t terms to all copyright holders involved. The specifics of the information to be extracted are outlined in Table 6.
The Signature Aggregation Module, upon receiving the information, sends it to all the copyright holders within A. Those who agree with the terms of the C o n t r a c t use their ‘shared secret key ( S i )’ to generate their part of the signature, known as the signature share value σ i . If they disagree, they abstain from signing. The Signature Aggregation Module then collects all the signature share values received within a predetermined timeframe. If every copyright holder signs, thereby meeting the pre-established threshold, a unified signature value σ is formed. This value undergoes verification by the Digital Signature Verification Module. Once the verification process is successfully completed, the Digital Signature Verification Module informs M U D that all copyright holders have agreed to the terms of the C o n t r a c t .
If the single signature value σ is not obtained due to some copyright holders refraining from signing, this situation is reported to the Condition Suggestion Module as an inability to fulfill the C o n t r a c t . In this module, all the copyright holders comprising A are queried about proposing new C o n t r a c t terms. If A decides to propose new terms, these are then communicated to O. In turn, O presents these new terms to A, facilitating a number of C o n t r a c t request and response cycles as initially determined. For instance, if the maximum number of attempts for C o n t r a c t requests and responses is established at five, and if an agreement or new C o n t r a c t terms are not reached within these five cycles, the Condition Suggestion Module informs both A and O that the C o n t r a c t has expired. Consequently, no further requests or responses for the C o n t r a c t will take place.
Under the approach described earlier, a C o n t r a c t concerning C o n t e n t is executed only if all copyright holders concur with its terms. This ensures that copyright holders can ascertain precisely the percentage of royalties they are entitled to receive. Consequently, this facilitates a transparent process for the settlement and distribution of C o p y r i g h t R o y a l t i e s among the copyright holders.

5.2. ODRL Transfer Module

M T F , used for automation by converting O D R L C o n s u m e r containing C o p y r i g h t R o y a l t i e s settlement, distribution, and restrictions on C o n t e n t R i g h t s A c c e s s into a format usable in chaincode, can be seen in Figure 9.
In the proposed automated OTT service copyright distribution management system utilizing the ODRL, there exists an O D R L A g e n t generated based on the contract between A, composed of multiple or individual copyright holders, and O. Additionally, an O D R L C o n s u m e r is also created for the C o n t r a c t between O and C, based on the amount paid by C, outlining C’s R i g h t s A c c e s s for the C o n t e n t .
For the O D R L A g e n t generated between A and O, it is created based on the C o n t r a c t terms between them. It includes the C o n d i t i o n , R a t i o D i s A g e n t , R a t i o D i s O T T , and S t r e a m F e e of C o n t e n t created by A. In the case of the O D R L C o n s u m e r generated between O and C, it is the ODRL that includes information about C’s R i g h t s A c c e s s to use C o n t e n t based on the selected and paid P a y m e n t R a t e P l a n , encompassing the specific R i g h t s A c c e s s for each C.
In the automated OTT service copyright distribution management system utilizing the ODRL, when these two types of ODRL are generated, they are sent to M T F . This process transforms the c o n t e n t written in ODRL into a format usable in chaincode, thereby enabling automatic execution of C o p y r i g h t R o y a l t i e s distribution between copyright holders, between A and O, and the control of C s ’ access to C o n t e n t .
Initially, when two ODRLs are introduced into M T F , its Object Generation Module undertakes the task of objectifying these ODRLs based on their principal Classes. When adapting the ODRL for use within chaincode, inefficiency and complexity issues may occur. These problems stem from the disparity between the chaincode’s operational environment and the varied, intricate rights expressions that ODRL is designed to handle. To address these challenges and ensure uniform processing, objectification is essential. In addition, for this module, objectification is required to determine which ‘UserGroup’ the C, who needs to provide C o n t e n t , belongs to. This determination is based on the I n f o C o n t e n t and A c c o u n t C o n s u m e r provided. Such a process is also essential for efficiently locating the H a s h C o n t e n t of the C o n t e n t being searched for.
When C expresses the desire to access specific C o n t e n t within O and makes a request for it, O transmits the I n f o C o n t e n t along with the requesting C’s A c c o u n t C o n s u m e r to M T F . The Consumer-OTT Service ODRL Processing Module then, utilizing the provided A c c o u n t C o n s u m e r information, identifies the UserGroup C belongs to. A UserGroup is a collective of C s who share the same expiry date, determined by when they paid for their OTT Service plan. This group is effectively represented by grouping various C s via the ‘PartyCollection’, a subset of the ‘Party’ Class, which is one of the ODRL’s main Classes.
The Consumer-OTT Service ODRL Processing Module locates the UserGroup that includes C who requested the C o n t e n t and parses its information. It then compares the constraints listed in the UserGroup information with the received Consumer information and the C o n t e n t to be accessed, to verify if C has R i g h t s A c c e s s to use the C o n t e n t .
The first constraint to be verified is whether C’s O subscription has expired. If it is confirmed that the expiration date has not passed, the module then checks if C’s age meets the age restrictions for the C o n t e n t . This verification is performed using a zero-knowledge proof created when C registered for O. For instance, if the C o n t e n t requires C to be over 19 years old, the zero-knowledge proof will yield a true (T) result for C s above 19 and false (F) for those below. If both the expiry date and age constraint are satisfied, resulting in a T outcome, the Consumer-OTT Service ODRL Processing Module then forwards the I n f o C o n t e n t to the Agent-OTT Service ODRL Processing Module. However, if any constraint is not met, the Alert Module is informed about the unfulfilled C o n d i t i o n , indicating the requirements needed to access the C o n t e n t .
Once the Consumer-OTT Service ODRL Processing Module confirms that C has met all usage constraints specified in the ODRL, it provides the requested I n f o C o n t e n t to the Agent-OTT Service ODRL Processing Module. This module’s Hash Extraction Module extracts the H a s h C o n t e n t of the C o n t e n t based on the information received and transmits it to Hyperledger Fabric, enabling the delivery of the corresponding C o n t e n t from IPFS to C.
The O D R L A g e n t created through the contract between A and O contains information about C o p y r i g h t R o y a l t i e s settlement and distribution. Based on the received I n f o C o n t e n t , the Agent-OTT Service ODRL Processing Module conducts a search and retrieval process. Upon finding the desired C o n t e n t , the module sends the S t r e a m F e e of that C o n t e n t to M S T , and the extracted R a t i o D i s A g e n t , R a t i o D i s O T T to M D T , ensuring fair settlement and distribution.
Through M T F , the R i g h t s A c c e s s of C s for Content are verified, and C o n t e n t is automatically provided to C s who meet all constraints. Moreover, by automating the processes related to fair settlement and distribution of C o p y r i g h t R o y a l t i e s based on the S t r e a m F e e and R a t i o D i s A g e n t , R a t i o D i s O T T written in the ODRL, efficient and transparent management of C o n t e n t distribution can be achieved.

6. Analysis

In this section, we conduct a performance analysis of the consent verification method of the proposed automated OTT service distribution management system using the ODRL. Additionally, we perform a comparative analysis of its functionalities against existing digital content distribution management systems.

6.1. Performance Analysis

In this section, we undertake a thorough comparison and analysis of the TSS and conventional digital signature techniques utilized within our proposed system to confirm the agreement of all copyright holders participating in a contract. The signature techniques for comparison are Threshold Schnorr and Schnorr Digital Signatures. We intend to compare and analyze the computational load using the Square-and-Multiply algorithm for both digital signature methods. The automated OTT service copyright distribution management system using the ODRL, as proposed, is designed for managing the distribution of copyrights in digital content like OTT service. This system encompasses numerous copyright holders and users, necessitating the adoption of technologies that mirror the digital content market’s dynamics. A key aspect of the system, as discussed in this paper, is its reliance on a digital signature algorithm to ascertain the consent of copyright holders. Therefore, in this section, we plan to evaluate the overhead, safety, and efficiency by analyzing each digital signature algorithm’s performance based on computational load. This analysis takes into account that the proposed system operates on Hyperledger Fabric, a private Blockchain platform.
The Square-and-Multiply algorithm, employed for determining the computational workload, is a method for efficiently computing large numbers. It holds a significant role in cryptography, leveraging the properties of modulo. The execution process of this algorithm, when calculating x K m o d N, is consistent with the steps described in Algorithm 1 [35].   
Algorithm 1 Square-and-Multiply.
Require:  x { 0 , , N 1 } and K = ( k l 1 , , k 0 ) 2
1:
r 1
2:
for  i = l 1  downto 0 do
3:
     r r 2 mod N
4:
    if  k i = 1  then
5:
         r r × x mod N
6:
    end if
7:
end for
In this algorithm, the exponent of the equation to be calculated is first converted into binary. Then, moving from left to right across the exponent’s bits, a squaring operation is performed for each bit, and multiplication is carried out when a bit is 1.
Initially, for the Schnorr Digital Signature method, we aim to derive the computational costs needed to obtain the signature value and to perform signature verification using the Square-and-Multiply algorithm. The process for the Schnorr Digital Signature is conducted as follows [36,37].
(1)
The Key Authentication Center (KAC) selects two random prime numbers, q 2 106 and p 2 1024 , and identifies an element g with order q.
(2)
The user establishes a private key by choosing a random number s from Z q .
(3)
The public key V is derived by calculating V g s m o d p.
(4)
For creating a signature for the message M, the signer selects a random number r from Z q and computes C g r m o d p.
(5)
Using the one-way hash function H ( ) , the value e = H ( M , C ) is calculated, followed by y r + s e m o d q, using the derived e value.
(6)
The derived signature values ( e , y ) from Step (5) are transmitted to the verifier.
(7)
The verifier conducts signature verification by calculating e H ( M , C g y ) V e m o d p with the received signature values ( e , y ) .
Table 7 presents the computed workload for the Schnorr Digital Signature method, calculated using the Square-and-Multiply algorithm. This calculation is premised on the assumption that k acts as a security parameter relative to the magnitude of q, leading to the derived computational requirements for the Schnorr Digital Signature.
For Steps (3) and (4) of the Schnorr Digital Signature process, the exponents s and r, used in the calculations, belong to Z q and thus have a bit length set by the bit size k of q. Consequently, both steps involve k 1 squaring operations and an average of k 2 multiplication operations, resulting in a computational load of 1.5 k 1 for these steps. In Step (5), only one multiplication is required to calculate y r + s e m o d q, and for Step (7), the same cost of computation 3 k as analyzed in [37] for the verification process of the Threshold Schnorr Digital Signature, is derived.
Next, we delve into the Threshold Schnorr Digital Signature, which is an extension of the Schnorr Digital Signature technique. This signature method involves n signing participants, with a set threshold value of t. Each participant is denoted as v i for i = 1 , , n . The parameters p, q, and g are chosen and established under the same criteria as the previously described Schnorr technique. The specific steps involved in these processes are as follows [37].
(1)
The signing participant selects a random number s from Z q as their private key and derives the public key V by calculating V g s m o d p.
(2)
A trustworthy dealer chooses a secret polynomial A ( z ) = a 0 + a 1 z + a 2 z 2 + + a t 1 z t 1 m o d q and distributes ( x v i , A ( x v i ) ) to each participant v i . Here, x v i is a public value, while A ( x v i ) , calculated based on it, is a secret value.
(3)
Participant v i computes the secret value x v i = l v i · A ( x v i ) m o d q. l v i is the Lagrange coefficient Π 1 k t , k i ( x v k x v k x v i ) m o d q, leading to s = Σ v i P s v i m o d q.
(4)
The dealer selects a secret polynomial B ( z ) = b 0 + b 1 z + b 2 z 2 + + b t 1 z t 1 m o d q, satisfying b i Z q and b 0 = r , and then distributes ( x v i , B ( x v i ) ) to each participant v i . Here, r is a secret entrusted value meeting r Z q . x v i is a public value, and the computed B ( x v i ) is a secret value sent to v i .
(5)
Signing participant v i calculates the secret value r v i = l j · B ( x v i ) m o d q, and the total trust value r is then computed as r = Σ v i P r v i m o d q.
(6)
The signature aggregator broadcasts the message M to be signed to all signing participants. Any participant in the signature process can assume the role of the signature aggregator.
(7)
Each signing participant computes their partial commitment value, c v i = g r v i m o d p, and then broadcasts it.
(8)
Signatory participant v i selects t values from c v i , calculates e H ( M , Π v k P c v k m o d p ) and y v i r v i + s v i e m o d q, and sends the resulting pair ( e , y v i ) to the signature aggregator.
(9)
The signature aggregator compiles the final signature value ( y , e ) by processing the t partial signatures ( e , y v i ) with the same e value.
(10)
The verifier conducts signature verification using the received signature value ( e , y ) , following the same method as the Schnorr Digital Signature, by calculating H ( M , C g y ) V e m o d p.
The Threshold Schnorr Digital Signature employs the same Square-and-Multiply algorithm as the Schnorr Digital Signature previously mentioned. By considering k as a security parameter in relation to the size of q, the calculation required for this specific signature method is determined. The computational details for each step of this signature process are outlined in Table 8.
In this paper, the proposed automated OTT service copyright distribution management system using the ODRL stipulates that copyright distribution transactions proceed only when all copyright holders have signed. Consequently, for the computational requirements of generating and verifying Threshold Schnorr Digital Signature, the threshold has been set equal to the number of signatory participants, denoted as n.
In Steps (1) and (7), D.H. Nyang’s work [37] was found to have errors in the computational estimations for signature generation using the Square-and-Multiply algorithm. These errors were corrected, leading to accurate recalculations of the computational load for these steps. The values for Steps (2), (3), (4), (5), and (10) were based on the ‘Schnorr Digital Signature-based Threshold Signature Technique’ analysis, as proposed by D.H. Nyang in [37]. In Step (8), there are a total of n multiplications executed, comprising of n 1 multiplications to calculate e H ( M , Π v k P c v k m o d p ) and an additional single multiplication for y v i r v i + s v i e m o d q. For Step (9), which involves combining partial signatures into a single signature, only addition is used, resulting in a multiplication workload of zero in the Square-and-Multiply algorithm.
Building upon the previously derived computational loads for each step of the Schnorr Digital Signature and Threshold Schnorr Digital Signature, this study aims to compare and analyze the computational demands of these two digital signature methods. This comparison and analysis will focus on the aspects of signature generation and the verification of the resultant signature values. In terms of signature generation, unlike the Schnorr Digital Signature where each participant independently derives a signature value using their private and public keys, the Threshold Schnorr Digital Signature process involves each participant combining shared signature values, derived using their private and public keys, to produce a single signature value. Derived from the data in Table 7 and Table 8, the computed costs for signature generation and verification in the Schnorr Digital Signature and Threshold Schnorr Digital Signature are presented in Table 9.
For the Schnorr Digital Signature, the computational costs per process as shown in Table 7 are based on a scenario with a single signer. To facilitate a clear comparison with the Threshold Schnorr Digital Signature, it is essential to adjust this to a scenario with n signatory participants. Thus, the computational costs listed in Table 9 were derived by multiplying the costs from Table 7 by n.
Initially, based on Table 9, we aim to compare and analyze both digital signature techniques from the perspective of signature generation, with n signing participants. It is evident that the Threshold Schnorr Digital Signature, with the threshold set to n, the same as the number of signing participants, requires more computational load compared to the Schnorr Digital Signature. This is analyzed to be due to the need to derive shared signature values using secret values s v i and entrusted values r v i for the use of the TSS, unlike typical digital signatures. Moreover, the process of combining the derived shared signatures to produce a single key is carried out through addition, which is not included in the computational load derived through the Square-and-Multiply algorithm. Therefore, when considering these additional calculations, it is discerned that a higher computational load is required.
From the perspective of signature verification, it is noted that the Threshold Schnorr Digital Signature requires n times less computational load than the Schnorr Digital Signature. This is attributed to the fact that while the Schnorr Digital Signature requires the verification of each participant’s signature value, the Threshold Schnorr Digital Signature performs verification on a single, combined signature value derived from the shared signatures.
In the system proposed in this paper, which is based on Threshold Schnorr Digital Signature, contracts are processed by obtaining signatures from copyright holders within the Agent. While this may lead to some overhead in signature generation compared to traditional Schnorr Digital Signatures, it shows efficiency in processing time during signature verification. Notably, with multiple copyright holders within an Agent, the system’s verification time becomes more efficient by a factor of n, especially as the number of copyright holders increases.
However, in the system proposed in this paper, since both signature generation and verification processes are implemented, we aim to compare the total computational workload of the two signature techniques, Schnorr Digital Signature and Threshold Schnorr Digital Signature. The total computational requirement needed for these two signature techniques is calculated by adding the costs required for signature generation and verification, as outlined in Table 9 for each technique. Accordingly, the Schnorr Digital Signature requires a computational workload of 6 k n n , while the Threshold Schnorr Digital Signature requires 66 n 2 + 3 k n 9 n + 3 k . This relationship can be seen in Figure 10, where the x-axis represents the bit size of the private key, the y-axis represents the number of signatories, and the z-axis signifies the computational requirement.
In the formulas representing the total computational requirements for the two signature techniques, the variable n signifies the number of signing participants, and k denotes a security parameter related to the size of q. Considering the assumption that the prime number q is at least 2 106 , it is inferred that k is 107 or more. Since both n and k are variables in the formulas that quantify the total computational requirements of these signature methods, to determine the optimal state of the signature technique used in this system, a graph was created in a three-dimensional space. This graph illustrates the total computational requirements, taking into account both variables.
Upon analyzing the two graphs, it has been confirmed that when n exceeds 1 but remains below 4, the computational workload for the Threshold Schnorr Digital Signature, as utilized in the system proposed in this paper, is lower than that of the Schnorr Digital Signature. Consequently, when assessing whether all authors agree to the contract terms using the Threshold Schnorr Digital Signature, particularly in the case of an agent composed of two or three authors, it has been observed that all authors can be identified more quickly than when employing the Schnorr Digital Signature. This discovery implies the potential for establishing a more efficient digital content distribution and management system by obtaining consent to the contract terms from all parties involved.
Furthermore, in terms of system security, traditional Schnorr Digital Signatures require regenerating and reverifying the signature if a private key is lost during verification. However, with the Threshold Schnorr technique, the policy allows contracts to proceed if t out of n copyright holders sign. For example, in a situation where five copyright holders have interests in a single piece of content, a contract can be executed with the signatures of three copyright holders, as per system policy. This ensures stable system operation even if two holders lose their shared key value, as the contract can still be executed with the remaining three signatories.
However, in the context of the system proposed in this paper, there is no advantage in terms of system stability because transactions are executed solely upon the signed consent of all copyright holders associated with each digital content, following legal requirements for copyright transactions. Nevertheless, there is a time efficiency advantage in the case of digital content transaction contracts involving agents consisting of two or three copyright holders who establish interests in specific digital content. This advantage stems from the swift signature and verification speeds facilitated by the characteristics of digital signatures.

6.2. Functional Analysis

In this section, we analyze the automated OTT service distribution management system using the ODRL proposed in this paper by comparing it with the functions of the system proposed in the previous study analyzed in Section 3. This analysis can be seen in Table 10. Table 10, the symbol ‘O’ indicates that the system proposed in the paper provides the respective functionality, ‘X’ denotes the absence of that functionality, and ‘’ signifies that only a part of the functionality is offered.
As analyzed in Section 3, the systems proposed in most studies provide major functions for the purpose of copyright distribution management, but there was a limitation in that they did not design features like ‘smart contract signing function’, ‘copyright royalties settlement and distribution function’, ‘privacy protection function’, and ‘user permission check function’.
Accordingly, this paper proposed the automated OTT service distribution management system using the ODRL to solve these limitations and construct a system that can be practically applied to the digital content copyright trading market. Looking at the ecosystem of the current digital content copyright distribution management market, most copyright holders delegate their rights in copyright transactions through a trust management organization, so most copyright holders cannot check the copyright royalties for their works and the copyright royalty settlement and distribution ratio. Accordingly, the system proposed in this paper is based on chaincode in the Hyperledger Fabric environment to create an automated and active copyright distribution management system, and a number of people who have interests in each digital content are established. In order to guarantee the rights of joint copyright holders, a system was created to directly participate in the distribution of OTT services by signing, so that rights can be guaranteed. In addition, by calculating the copyright royalty based on the number of streams, all copyright holders can transparently check the copyright royalties, and by specifying the copyright royalties settlement and distribution ratio within ODRL, the copyright royalties are settled and distributed transparently and fairly.
Additionally, most systems proposed in previous studies do not consider features for users or consumers. Recognizing that not only creative copyright holders, but also users and consumers play a pivotal role in the vitality of the digital content market and OTT services, the system proposed in this paper includes functionalities catered to users and consumers. Typically, users or consumers provide their identity information for verification before registering to participate in OTT services and digital content copyright trading markets. However, a common concern is the provision of unnecessary personal information and the potential for privacy infringement if personal information is leaked by the service provider. In response, the proposed system utilizes zero-knowledge proof technology to minimize the direct exposure of personal information, thereby enhancing privacy protection. Furthermore, users and consumers, who pay a certain amount for OTT services, should be entitled to corresponding rights. Hence, the proposed system ensures that users and consumers receive services commensurate with the amount paid, based on a user rights verification feature built upon chaincode. This process actively follows the conditions specified within ODRL.
The system proposed in this paper significantly differs from most existing studies in its effort to safeguard the rights of joint copyright holders and to ensure rightful privileges for consumers and users. Additionally, it presents privacy protection as a major feature and advantage, aligning with the growing importance of personal information protection in contemporary contexts.

7. Discussion

The paper discusses how, in the OTT service market, illegal replication and distribution of digital video content are rampant due to issues like stream ripping, indiscriminate password sharing among users, credential fraud, fraudulent consumer endpoints, and CDN man-in-the-middle attacks, continuously infringing upon the rights that copyright holders should be guaranteed. Additionally, it confirms the ‘black box’ problem where, when copyright holders partially entrust the management of their digital content rights to agents like trust management organizations, there is a lack of transparency in tracking the usage history of digital content and in the settlement and distribution of copyright royalties.
To address these limitations, this paper proposes the Automated OTT Service Copyright Distribution Management System Using the ODRL, aimed at preventing the infringement of copyright holders’ rights arising from the increasing demand and diversity of digital content, and ensuring transparent and fair copyright royalty settlement and distribution.
The system presented in this paper automatically validates whether a consumer is eligible to use digital content, based on the restrictions defined in ODRL. It allows only authorized users to have limited access to the digital content. Additionally, considering the inherent characteristics of digital content and the presence of multiple co-copyright holders with vested interests, the system employs Threshold Schnorr Digital Signature to safeguard the rights of all copyright holders. This ensures that copyright transactions proceed only when there is unanimous agreement on the transaction terms among all holders. This method enables copyright holders to transparently monitor their share in copyright royalties, thereby ensuring their rights and facilitating a fair and transparent process for the settlement and distribution of these royalties.
However, besides the problems with unclear settlement and distribution of copyright royalties, there have recently been significant challenges related to joint copyright holders in digital content copyright transactions, resulting in legal disputes [38,39,40].
A joint work is recognized only if it meets two essential requirements. Firstly, the work must not allow for individual usage; this means joint copyright holders should exercise their intellectual property rights without violating the moral rights of their counterparts. Essentially, exercising copyright rights requires the unanimous agreement of all involved co-copyright holders. Secondly, the creation of such a work requires the collaborative effort of two or more individuals. Reflecting the nature of joint works, it is not possible for a single person to hold the copyright alone; it must involve at least two individuals, all of whom should have the clear intent to be joint copyright holders from the onset of the creation process.
However, the recent increase in legal disputes arising from joint copyright holders not adhering to such legal requirements has consistently led to calls for measures to ensure their rights. Yet, these discussions have mostly been confined to legal solutions.
The system in question leverages TSS technology to ensure the comprehensive protection of rights for joint copyright holders involved in particular digital content. This setup allows copyright transactions to proceed only with the unanimous consent of all copyright holders. This approach enables copyright holders to transparently monitor their share in the distribution of copyright royalties. Furthermore, the system automates this process, ensuring not just the protection of co-copyright holders’ rights but also the transparent and equitable settlement and distribution of copyright royalties. This innovation addresses and potentially resolves prevalent issues in the current OTT service market.
As analyzed in Section 6, the proposed system employing Threshold Schnorr Digital Signature was found to be more efficient in digital content distribution management when an agent composed of only two or three copyright holders participates. Specifically, it was observed that in such scenarios, agreement on contract terms from all copyright holders could be obtained in a shorter time compared to using the Schnorr Digital Signature. However, with digital content like movies or dramas on OTT services, the complexity of digital content production requires the involvement of various stakeholders, such as directors, writers, actors, and production companies. As a result, since most digital content cannot be created with only two or three copyright holders, there exists a limitation in efficiently managing transparent copyright distribution for digital content through the system using TSS.
Moreover, the process of conducting copyright transactions and contracts for digital content involves the transmission of sensitive data on the system. The exposure of such data could significantly raise the likelihood of disputes, either between companies or between companies and individuals. To mitigate this risk, the proposed system employs zero-knowledge proof technology, like zk-SNARKs and ZEC, to safeguard individual-identifying sensitive data, aiming to avert privacy infringement issues. However, while the necessity of a Trusted Third Party (TTP) during the initial setup for enhancing system efficiency is typically not a concern in general systems, it presents a unique challenge for the proposed system. This system is based on the private Blockchain platform Hyperledger Fabric, where employing a TTP during the initial setup could potentially compromise the Blockchain’s inherent feature of decentralization.

8. Conclusions

This paper introduces an automated OTT service copyright management system, leveraging ODRL and chaincode technology. The system is adept at automatically authenticating consumers’ rights to access digital content, while simultaneously considering the interests of joint copyright holders. It facilitates the transparent settlement and distribution of royalties, with a goal to protect the rights of copyright owners. When applied to the current OTT services and digital content markets, this system is anticipated to stimulate the digital content trade market and foster a trustworthy and reliable OTT service environment, enhancing its overall credibility.
Additionally, the proposed system, by utilizing TSS technology, ensures that the exercise of copyright-related transactions and contracts, such as intellectual property rights, is permitted only when all copyright holders agree to the terms. This is a significant advantage. However, as the number of joint copyright holders increases, the system encounters limitations in terms of efficiency. Furthermore, recognizing the potential for legal disputes due to sensitive data in digital content copyright transactions, the system employs zero-knowledge proof technology to reduce the likelihood of privacy breaches. Nonetheless, the reliance on trusted third parties in zero-knowledge proofs could potentially compromise the decentralization of the system’s foundational Hyperledger Fabric, presenting a challenge.
Due to the prevalence of multiple joint copyright holders in much of the digital content within the OTT service market, the currently proposed system encounters practical implementation challenges. To overcome these, future developments will aim to incorporate privacy enhancing technologies, which minimize privacy infringement risks while preserving the decentralized features of Blockchain technology. Furthermore, the system will be tailored to efficiently and logically ascertain the consent of numerous joint copyright holders. This strategy is intended to construct an OTT service copyright distribution management system that is feasible for real-world application in the OTT service market.

Author Contributions

W.S. designed the proposed system with Performance analysis and drafted this article. S.K. reviewed the article and provided inputs on functional analysis. S.O. revised this article. J.-H.L. revised this article and supervised all the work. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Ministry of Culture, Sports and Tourism and Korea Creative Content Agency (Project Number: CR202104006) and by hte Institute of Information and communications Technology Planning and Evaluation (IITP) under the Metaverse Support Program to Nurture the Best Talents (IITP-2023-RS-2023-00254529) grant funded by the Korean government (MSIT).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

Author SungHeun Oh was employed by the company DigiCAP Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Kim, A.; Kim, M. A study on blockchain-based music distribution framework: Focusing on copyright protection. In Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Island, Republic of Korea, 21–23 October 2020; pp. 1921–1925. [Google Scholar]
  2. Lee, L. A Study on the Management Plan of Copyright Contracts Using Blockchain Technology: Blockchain-based Copyright Contracts Centered on Music Copyrights. Korea Serv. Manag. Soc. 2019, 23, 218–236. [Google Scholar]
  3. Kim, Y.; Park, B.; Kim, S.-Y. A selective encryption/decryption method of sensitive music usage history information on theme, background and signal music blockchain network. J. Web Eng. 2022, 21, 1265–1282. [Google Scholar] [CrossRef]
  4. Kim, Y.; Park, B.; Kim, S.-Y. A Usage History Information Generation and Inquiry Method for Theme, Background and Signal Music Based on Hyperledger Fabric. J. Mob. Multimed. 2022, 18, 1811–1828. [Google Scholar] [CrossRef]
  5. Top 15 Threats to Video Content Distribution Services. Available online: https://www.verimatrix.com/blog/top-15-threats-to-video-content-distribution-services (accessed on 20 December 2023).
  6. Hyperledger Fabric Structure. Available online: https://hcnam.tistory.com/19 (accessed on 20 December 2023).
  7. Cachin, C. Architecture of the hyperledger blockchain fabric. Workshop Distrib. Cryptocurrencies Consens. Ledgers 2016, 310, 4. [Google Scholar]
  8. A Blockchain Platform for the Enterprise Hyperledger Fabric. Available online: https://hyperledger-fabric.readthedocs.io/en/latest/index.html (accessed on 20 December 2023).
  9. Pelekoudas-Oikonomou, F.; Ribeiro, J.; Mantas, G.; Bashashi, F.; Sakellari, G.; Gonzalez, J. A tutorial on the implementation of a hyperledger fabric-based security architecture for IoMT. In Proceedings of the 2023 IFIP Networking Conference (IFIP Networking), Barcelona, Spain, 12–15 June 2023; pp. 1–6. [Google Scholar]
  10. Shammar, E.A.; Zahary, A.T.; AL-Shargabi, A.A. An attribute-based access control model for Internet of things using hyperledger fabric blockchain. Wirel. Commun. Mob. Comput. 2022, 2022, 6926408. [Google Scholar] [CrossRef]
  11. Pancari, S.; Rashid, A.; Zheng, J.; Patel, S.; Wang, Y.; Fu, J.A. Systematic Comparison between the Ethereum and Hyperledger Fabric Blockchain Platforms for Attribute-Based Access Control in Smart Home IoT Environments. Sensors 2023, 23, 7046. [Google Scholar] [PubMed]
  12. Al-Sumaidaee, G.; Alkhudary, R.; Zilic, Z.; Swidan, A. Performance analysis of a private blockchain network built on Hyperledger Fabric for healthcare. Inf. Process. Manag. 2023, 60, 103160. [Google Scholar] [CrossRef]
  13. Liang, X.; Zhao, Q.; Zhang, Y.; Liu, H.; Zhang, Q. EduChain: A highly available education consortium blockchain platform based on Hyperledger Fabric. Concurr. Comput. Pract. Exp. 2023, 35, e6330. [Google Scholar] [CrossRef]
  14. Kwon, S.; Park, J.; Lee, T.; Oh, S.; Lee, J.-H. Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm. Softw. Pract. Exp. 2022. [Google Scholar] [CrossRef]
  15. Wang, S.; Yuan, Y.; Wang, X.; Li, J.; Qin, R.; Wang, F.Y. An overview of smart contract: Architecture, applications, and future trends. In Proceedings of the 2018 IEEE Intelligent Vehicles Symposium (IV), Changshu, China, 26–30 June 2018; pp. 108–113. [Google Scholar]
  16. Mohanta, B.K.; Panda, S.S.; Jena, D. An overview of smart contract and use cases in blockchain technology. In Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 10–12 July 2018; pp. 1–4. [Google Scholar]
  17. Zou, W.; Lo, D.; Kochhar, P.S.; Le, X.B.D.; Xia, X.; Feng, Y.; Chen, Z.; Xu, B. Smart contract development: Challenges and opportunities. IEEE Trans. Softw. Eng. 2019, 47, 2084–2106. [Google Scholar] [CrossRef]
  18. Sharma, P.; Jindal, R.; Borah, M.D. A review of smart contract-based platforms, applications, and challenges. Clust. Comput. 2023, 26, 395–421. [Google Scholar] [CrossRef]
  19. Beckert, B.; Herda, M.; Kirsten, M.; Schiffl, J. Formal specification and verification of Hyperledger Fabric chaincode. In Proceedings of the 3rd Symposium on Distributed Ledger Technology (SDLT-2018) Co-Located with ICFEM, Gold Coast, Australia, 12 November 2018; pp. 44–48. [Google Scholar]
  20. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
  21. Foschini, L.; Gavagna, A.; Martuscelli, G.; Montanari, R. Hyperledger fabric blockchain: Chaincode performance analysis. In Proceedings of the ICC 2020 IEEE International Conference on Communications (ICC), Virtual, 7–11 June 2020; pp. 1–6. [Google Scholar]
  22. Son, S. Analysis of transaction flow and smart contract procedures of Ethereum and Hyperledger Fabric. In Proceedings of the Korea Communications Society Conference, Yongpyeong, Republic of Korea, 23–25 January 2019; pp. 205–206. [Google Scholar]
  23. ODRL Information Model 2. Available online: https://www.w3.org/TR/odrl-model (accessed on 23 August 2023).
  24. Mobility Data Share. Available online: https://www.pentasecurity.co.kr/mobility-data-sharing (accessed on 20 December 2023).
  25. Dam, T.; Krimbacher, A.; Neumaier, S. Policy Patterns for Usage Control in Data Spaces. arXiv 2023, arXiv:23011289. [Google Scholar]
  26. Roshankish, S.; Fornara, N. Exploration of norms and policies in digital fashion domain using semantic web technologies. In International Conference on Human-Computer Interaction; Springer International Publishing: Cham, Switzerland, 2021; pp. 384–395. [Google Scholar]
  27. Choi, C.-J.; Joe, Y.J.; Shin, D.-M. Design of a Blockchian-based KRW Transfer System for Settlement and Distribution of Digital Content Copyright Fees. J. Softw. Assess. Valuat. JSAV 2023, 19, 21–30. [Google Scholar]
  28. Zheng, X.; Su, J.; Si, Y.; Wang, B. Research on Short Video Copyright Transaction and Protection Mechanism Based on Blockchain NFT. In Proceedings of the 2022 7th International Conference on Modern Management and Education Technology (MMET 2022), Xiamen, China, 23–25 September 2022; pp. 574–581. [Google Scholar]
  29. Varaprasada, R.K.; Panda, S.K. A design model of copyright protection system based on distributed ledger technology. In Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021; Springer Nature: Singapore, 2022; pp. 127–141. [Google Scholar]
  30. Li, J.; Grintsvayg, A.; Kauffman, J.; Fleming, C. LBRY: A blockchain-based decentralized digital content marketplace. In Proceedings of the 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Oxford, UK, 3–6 August 2020; pp. 42–51. [Google Scholar]
  31. Kim, Y.; Park, B.; Jang, S.; Kim, S.Y. A Study on Copyright Usage Permission Platform Based on Blockchain for Distribution of Theme, Background and Signal Music. J. Semicond. Disp. Technol. 2021, 20, 18–24. [Google Scholar]
  32. Mukta, R.; Martens, J.; Paik, H.Y.; Lu, Q.; Kanhere, S.S. Blockchain-based verifiable credential sharing with selective disclosure. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 959–966. [Google Scholar]
  33. Maesa, D.D.F.; Lisi, A.; Mori, P.; Ricci, L.; Boschi, G. Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge. J. Netw. Comput. Appl. 2023, 212, 103577. [Google Scholar] [CrossRef]
  34. Kim, J.; Kim, G.; Ryou, J. DID Authentication Method for Secure Multi-Party Signature in Blockchain. J. Korean Inst. Commun. Inf. Sci. 2023, 48, 1368. [Google Scholar]
  35. Negre, C.; Plantard, T. Efficient regular modular exponentiation using multiplicative half-size splitting. J. Cryptogr. Eng. 2017, 7, 245–253. [Google Scholar] [CrossRef]
  36. Morita, H.; Schuldt, J.C.; Matsuda, T.; Hanaoka, G.; Iwata, T. On the security of the schnorr signature scheme and DSA against related-key attacks. In Proceedings of the Information Security and Cryptology—ICISC 2015: 18th International Conference, Seoul, Republic of Korea, 25–27 November 2015; pp. 25–27. [Google Scholar]
  37. Nyang, D.; Kwon, T. Efficient Threshold Schnorr’s Signature Scheme. J. Korea Inst. Inf. Secur. Cryptol. JKIISC 2004, 7, 69–74. [Google Scholar]
  38. Joint Authorship Does Not Require Writing Contribution. Available online: https://www.pinsentmasons.com/out-law/news/joint-authorship-does-not-require-writing-contribution (accessed on 21 December 2023).
  39. Principles of Joint Authorship. Available online: https://www.dacbeachcroft.com/en/gb/articles/2021/march/principles-of-joint-authorship (accessed on 21 December 2023).
  40. Lee, G. The study on Recent Issues Concerning Joint Works. Chung-Ang Law Assoc. 2021, 23, 113–156. [Google Scholar]
Figure 1. Architecture of Hyperledger Fabric.
Figure 1. Architecture of Hyperledger Fabric.
Electronics 13 00336 g001
Figure 2. Transaction flows in Hyperledger Fabric network.
Figure 2. Transaction flows in Hyperledger Fabric network.
Electronics 13 00336 g002
Figure 3. The structure of Blockchain layers.
Figure 3. The structure of Blockchain layers.
Electronics 13 00336 g003
Figure 4. Proposed automated OTT service copyright distribution management system using the ODRL.
Figure 4. Proposed automated OTT service copyright distribution management system using the ODRL.
Electronics 13 00336 g004
Figure 5. The process of the Register phase.
Figure 5. The process of the Register phase.
Electronics 13 00336 g005
Figure 6. The process of the Usage phase.
Figure 6. The process of the Usage phase.
Electronics 13 00336 g006
Figure 7. The process of the Settlement/Distribution phase.
Figure 7. The process of the Settlement/Distribution phase.
Electronics 13 00336 g007
Figure 8. Architecture of the Agreement module.
Figure 8. Architecture of the Agreement module.
Electronics 13 00336 g008
Figure 9. Architecture of the ODRL Transfer Module.
Figure 9. Architecture of the ODRL Transfer Module.
Electronics 13 00336 g009
Figure 10. Total computational costs graph of Schnorr Digital Signature and Threshold Schnorr Digital Signature.
Figure 10. Total computational costs graph of Schnorr Digital Signature and Threshold Schnorr Digital Signature.
Electronics 13 00336 g010
Table 1. Hyperledger Fabric architecture key Component role.
Table 1. Hyperledger Fabric architecture key Component role.
ComponentDescription
ChannelComponents that establish and manage group permissions for
transactions on a Blockchain network by group
OrganizationComponents that manage permissions to peer nodes by
organization within a Blockchain network as well as access
to network participants
Peer NodeComponents that process transactions on a Blockchain network,
manage and store ledger and chaincode
(Maintain Blockchain network)
Ordering
Service Node
Components that contain information about channels
within the Blockchain network and act as administrators
 Membership Service
Provider (MSP)
Components that perform roles related to identity authentication
in the Blockchain network to achieve access control and manage
the roles and privileges of each component
 Certificate Authority
(CA)
Components that act as a certification authority in the Blockchain
network, providing the information required for encryption
authentication in MSP to achieve access control and manage
the roles and privileges of each component.
Table 2. Comparison of smart contract and chaincode.
Table 2. Comparison of smart contract and chaincode.
ItemSmart ContractChaincode
LanguageSolidity, VyperGo, JavaScript
IDERemix, TruffleChaincoder, Goland
Node Communication
Interface
JSON-RPCgRPC
Access ControlNot SupportedSupported
Deployment PolicyDeployed to all nodes
within the Blockchain network
Deployed only to authorized
nodes within the channel
Availability of UpdatesNot SupportedSupported
Lifecycle1. Generation process
2. Deployment process
3. Calling process
1. Generation and
packaging process
2. Deployment process
3. Calling process
Table 3. Main classes of the ODRL.
Table 3. Main classes of the ODRL.
ClassDescription
PolicyThis Class forms the fundamental structure of ODRL and is composed
of subclasses such as ‘Set’, ‘Offer’, and ‘Agreement’. It defines the ‘Action’
of the ‘Party’ concerning a specific ‘Asset’, thereby clearly articulating
‘Permission’, ‘Prohibition’, and ‘Duty’.
AssetThis Class represents the content and services that are the subjects of the
rules, such as digital books, music, and streaming videos. The subclass
‘AssetCollection’, which groups together multiple assets, is particularly
useful for uniformly applying the same rights expressions to numerous
contents or services
PartyThis Class represents entities that participate in and perform specific roles
within the rules, which can include groups, individuals, or organizations.
The ‘Party’ can be categorized into ‘Assigner’, who establishes and
proposes policies, and ‘Assignee’, who accepts these policies.
Additionally, it includes the subclass ‘PartyCollection’, which is used for
grouping and representing multiple entities.
ActionThis Class represents actions that the ‘Party’ can perform on an ‘Asset’,
such as streaming and downloading.
 ConstraintThis Class represents conditions and restrictions applied to the subclasses
of ‘Rule’, namely ‘Permission’, ‘Prohibition’, and ‘Duty’, thereby providing
a more detailed explanation of the scope and application of authority.
RuleThis Class, through its subclasses ‘Permission’, ‘Prohibition’, and ‘Duty’,
restricts the actions of ‘Party’ regarding the ‘Asset’.
Table 4. Study trends on Blockchain-based digital content distribution management methods.
Table 4. Study trends on Blockchain-based digital content distribution management methods.
RefCopyright
Distribution
Management
Method
Privacy
Protection
Method
Royalty
Settlement and
Distribution
Method
Smart Contract
Signing Method
User Permission
Check Method
[1]OXXXX
[27]OXOXX
[28]OXOXX
[29]OXXXX
[30]OΔXXX
[31]OXOXX
[4]OXOXX
[3]OOXXX
Table 5. Notations.
Table 5. Notations.
NotationDescription
AAgent with multiple copyright holders
OOTT service
CConsumer
C s Large number of consumers
C I Trusted copyright institution
M V R Verify Module of OTT service
M R G Register Module of OTT service
M A M Agreement module
M U D ODRL update module
M O P OTT service ODRL policy module
M T F ODRL transfer module
M S T Settlement module
M G N ODRL generator module
M V D Service validation module
M D T Distribution module
C o n t r a c t Copyright transaction related agreement
C o n t e n t Digital content
C o n d i t i o n Copyright transaction
agreement terms and conditions
C e r t i f i c a t e C o p y r i g h t R e g i s t e r Copyright registration certificate
for digital content
O D R L A g e n t ODRL for agent
O D R L C o n t r a c t ODRL for contract
O D R L C o n s u m e r ODRL for consumer
I n f o C o n t e n t Information about digital content
I n f o O T T Information about OTT digital content
I n f o V e r i f i e d Verified OTT digital content
I n f o P a y m e n t Information regarding payment
R a t i o D i s A g e n t Distribution ratio to agent
R a t i o D i s O T T Distribution ratio to OTT service
S t r e a m F e e Amount per stream
S t r e a m N u m s Number of streams
F e e C o n s u m e r Amount paid by consumer
R i g h t s A c c e s s Service access rights
C o p y r i g h t R o y a l t i e s Copyright royalties
C o n t r a c t S i g n e d Signed contracts
S i g n a t u r e S h a r e d Shared signatures
S i g n a t u r e S i n g l e Single signature created by aggregating shared signatures
M e s s a g e R e g i s t e r Message notifying that registration of digital content
within the OTT service has been completed
A c c o u n t C o n s u m e r Consumer’s account information
P a y m e n t R a t e P l a n Payment rate plan
M e t h o d P a y Payment method
I n f o F e e C o n s u m e r Information on the amount paid by the consumer
H a s h C o n t e n t Hash value of digital content
N u m C o n t e n t P l a y Number of plays for digital content
C o p y r i g h t R o y A g e n t Copyright royalties to be distributed to agent
C o p y r i g h t R o y O T T Copyright royalties to be distributed to OTT service
D i s R o y A g e n t Copyright royalties distributed to agent
D i s R o y O T T Copyright royalties distributed to OTT service
S e n d ( x , y , z ) Function of sending x , y , z
E x t r a c t ( x , y ) Function of extracting y from x
U p d a t e ( x , y ) Update function with the addition of y to x
A g g r e g a t e ( x , y ) Function for aggregating x to generate y
V e r i f y ( x , y ) Function of verifying x by comparing it with y
D i v i d e ( x , y ) Function of dividing x into y
G e n e r a t e ( x , y , z ) Function to generate z based on x and y
R e g i s t e r ( x , y ) Function of registering x and y
S a v e ( x , y ) Function of storing x and y
L o o k u p ( x , y ) Function to search y based on x
R e t u r n ( x ) Function that returns x
C h e c k ( x , y , z ) Function of checking z based on x and y
R a i s e ( x , y ) Function that increases x based on y
C a l c u l a t e ( x , y , z ) Function of calculating z based on
the operations of x and y
D i s t r i b u t e ( x , y ) Function of distributing x and y
Table 6. Information extracted by the Data Extraction Module and passed to A.
Table 6. Information extracted by the Data Extraction Module and passed to A.
Extracted InformationDescription
S t r e a m F e e Refers to the amount charged per playback of C o n t e n t , which
varies for each piece of digital C o n t e n t .
R a t i o D i s A g e n t Represents the distribution ratio of C o p y r i g h t R o y a l t i e s among
copyright holders, established for transparent settlement and
distribution, considering multiple joint copyright holders.
R a t i o D i s O T T Describes the information about the ratio basis for settlements
between A and O, derived from the C o p y r i g h t R o y a l t i e s
earned by providing O to multiple C s .
C o n d i t i o n Indicates the R i g h t s A c c e s s of C s of O
regarding what actions they can perform with C o n t e n t accessed
through the service. These R i g h t s A c c e s s may include streaming
and storing C o n t e n t .
Table 7. Computational costs for each step in Schnorr Digital Signature.
Table 7. Computational costs for each step in Schnorr Digital Signature.
StepSchnorr Digital Signature Computation Volume
Process (1)-
Process (2)-
Process (3) 1.5 k 1
Process (4) 1.5 k 1
Process (5)1
Process (6)-
Process (7) 3 k
Table 8. Computational costs for each step in Threshold Schnorr Digital Signature.
Table 8. Computational costs for each step in Threshold Schnorr Digital Signature.
StepThreshold Schnorr Digital Signature Computation Volume
Process (1) ( 1.5 k 1 ) n
Process (2) ( n 1 ) n
Process (3) ( 32 n 3 ) n
Process (4) ( n 1 ) n
Process (5) ( 32 n 3 ) n
Process (6)-
Process (7) ( 1.5 k 1 ) n
Process (8)n
Process (9)0
Process (10) 3 k
Table 9. Computation costs of Schnorr Digital Signature and Threshold Schnorr Digital Signature.
Table 9. Computation costs of Schnorr Digital Signature and Threshold Schnorr Digital Signature.
Schnorr Digital SignatureThreshold Schnorr Digital Signature
Used in the Proposed System
Signature Generation ( 3 k 1 ) n 66 n 2 + 3 k n 9 n
Signature Verification 3 k n 3 k
Table 10. Comparative analysis of functions between previous study and the proposed system.
Table 10. Comparative analysis of functions between previous study and the proposed system.
RefCopyright
Distribution
Management
Function
Smart Contract
Signing
Function
Royalty
Settlement and
Distribution
Function
Privacy
Protection
Function
User
Permission
Check
Function
[1]OXXXX
[27]OXOXX
[28]OXOXX
[29]OXXXX
[30]OXXΔX
[31]OXOXX
[4]OXOXX
[3]OXXXX
Proposed
System
OOOOO
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Son, W.; Kwon, S.; Oh, S.; Lee, J.-H. Automated Over-the-Top Service Copyright Distribution Management System Using the Open Digital Rights Language. Electronics 2024, 13, 336. https://doi.org/10.3390/electronics13020336

AMA Style

Son W, Kwon S, Oh S, Lee J-H. Automated Over-the-Top Service Copyright Distribution Management System Using the Open Digital Rights Language. Electronics. 2024; 13(2):336. https://doi.org/10.3390/electronics13020336

Chicago/Turabian Style

Son, Wooyoung, Soonhong Kwon, Sungheun Oh, and Jong-Hyouk Lee. 2024. "Automated Over-the-Top Service Copyright Distribution Management System Using the Open Digital Rights Language" Electronics 13, no. 2: 336. https://doi.org/10.3390/electronics13020336

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop