![Page 1: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/1.jpg)
1
Design and Implementation of a Policy-based Service-oriented DRM System
Yung-Hsin Wang, Yu-Hong Lin Shing-Han Li Tatung University Nat’l Taipei Univ. of Business Taipei, Taiwan Taipei, Taiwan
WDSI 2015 - Maui, Hawaii
![Page 2: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/2.jpg)
2 Outline
4. Conclusion & Future Work Direction
3. Design and Implementation
2. Background and Technology
1. Introduction
![Page 3: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/3.jpg)
3 Motivations
DRM permits smooth, secure, trusted movement of digital contents from Content Providers and Distributors to Clearing House and Consumers
Based on access, use, tracking, payment & reporting systemBusiness functions automated to deliver creators’ win-distributors’
win-clearing house’s win-consumers’ winAccess control and authorization implemented in proprietary
manner results in extreme tight coupling of authorization decisions within applications
![Page 4: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/4.jpg)
4 Motivations (cont.)
SOA solutionNot only a framework but a key mechanism for cost effectivenessPromoting organizational agility to adapt the most frequent
changing environment Implementing SOA to improve DRM System
Service interoperability, Loosing coupling, Reusing or composing shared service components during service orchestration
Challenges in security issue!
![Page 5: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/5.jpg)
5
To re-model DRM System based on SOAAll participants well collaborate and equitably share sales benefits
Adopt policy-based security mechanismIntroduce the eXtensible Access Control Markup Language
(XACML) technology to decouple authorization decisions from DRM system
Fulfill autonomous management on authorization and access control for all resources via flexible policy-based SOA solution
Research Objective
![Page 6: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/6.jpg)
6
2. Background and Technology
Outline
4. Conclusions & Future Works Direction
3. Design and Implementation
1. Introduction
![Page 7: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/7.jpg)
7
Emphasizing on protection and management for digital contents
The essential is tocontrol publication, billing/payment and copyright for digital contents
DRM System
![Page 8: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/8.jpg)
8
Usually combined with certain business models for the sales of digital contents
DRM System
The integrated DRM solution
![Page 9: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/9.jpg)
9
Service Contract Service Loose Coupling Service Abstraction Service Reusability Service Autonomy Service Statelessness Service Discoverability Service Composability
Service Oriented Design Principle
![Page 10: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/10.jpg)
10
Interoperability problems arise within different DRM solutions
DRM with SOA can increase interoperability for the system management and facilitate efficient collaboration
Security is a major imperative for SOAFigueira Filho et al. (2006) in their proposed framework adopted
SOA and a high-level policy modeling approach to promote interoperability among DRM systems; however, the policy model only focused on the copyright protection
DRM System Moves to SOA
![Page 11: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/11.jpg)
11
eXtensible Access Control Markup Language Based on XML standardsDefine the general policy syntax for resources protection and
accessOASIS has regulated XACML as security standards to support
security technology for access control
XACML frameworks for services security
![Page 12: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/12.jpg)
12T
he implem
entation process of XA
CM
L and access control architecture
![Page 13: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/13.jpg)
13
SOA-based DRM System’s security, privacy, resource authorizing and access control must be well managed.
Help participants in SOA-based DRM System autonomously manage their own systemsSecurity Policy applies to resource authorization and access
control among systems Facilitate the abstraction of security jobs from the logic
loop of business system to become public servicesachieve centralization of operation and management
Security Policy in SOA-based DRM System
![Page 14: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/14.jpg)
2. Background and Technology
14 Outline
4. Conclusions & Future Works Direction
3. Design and Implementation
1. Introduction
![Page 15: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/15.jpg)
15Step 1. Streamline DRM system architecture to be service choreography
The fundamental architecture of DRM system
The streamlined architecture of DRM
![Page 16: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/16.jpg)
16Step 2. Achieve the service-oriented DRM system
Relations between functions and/or systems among the DRM system
The D
RM
system w
ith layered SOA
The SOMA layered mechanism
![Page 17: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/17.jpg)
17Step 3. Implement security policy with XACML
![Page 18: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/18.jpg)
18
The example of XACML Policy converted from CMS
Content Provider authorizescontents to Distributor
![Page 19: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/19.jpg)
19 The inquiry example of XACML Request for Consumer or Distributor
![Page 20: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/20.jpg)
20 The Example of XACML Response from PDPwhen Distributor inquires the authorized content
![Page 21: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/21.jpg)
21
2. Background and Technology
Outline
4. Conclusion & Future Work Direction
3. Design and Implementation
1. Introduction
![Page 22: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/22.jpg)
22
This study has designed and implemented a policy-based service-oriented DRM systemTransform a proprietary/tight-coupling DRM system into a
loose-coupling/on-demand business processesHelp participants' operation among DRM system be flexible and
react agilely in data transmission, exchange or integrationNot only to meet the security needs of web services, but also to
achieve a loose coupling in resources perspective
Conclusion
![Page 23: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/23.jpg)
23 Future Work Direction
Apply to cloud computing via service-oriented featuresParties who need to build up their systems can take advantages
of Infrastructure as a Service (IaaS) to save hardware costs and maintenance expenses
Functions of Multi-layered and remodeled DRM system can leverage Software as a Services (SaaS)
Adopt XACML to fulfill the security and safety needs of inter–service in cloud computing
.
![Page 24: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System](https://reader031.vdocuments.net/reader031/viewer/2022030316/5878993c1a28ab375f8b7183/html5/thumbnails/24.jpg)
24
Thanks for your attention!