wdsi 2015-design and implementation of a policy-based service-oriented drm system

24
Design and Implementation of a Policy-based Service-oriented DRM System Yung-Hsin Wang, Yu-Hong Lin Shing-Han Li Tatung University Nat’l Taipei Univ. of Business Taipei, Taiwan Taipei, Taiwan 1 WDSI 2015 - Maui, Hawaii

Upload: -

Post on 15-Apr-2017

249 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

1

Design and Implementation of a Policy-based Service-oriented DRM System

Yung-Hsin Wang, Yu-Hong Lin Shing-Han Li Tatung University Nat’l Taipei Univ. of Business Taipei, Taiwan Taipei, Taiwan

WDSI 2015 - Maui, Hawaii

Page 2: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

2 Outline

4. Conclusion & Future Work Direction

3. Design and Implementation

2. Background and Technology

1. Introduction

Page 3: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

3 Motivations

DRM permits smooth, secure, trusted movement of digital contents from Content Providers and Distributors to Clearing House and Consumers

Based on access, use, tracking, payment & reporting systemBusiness functions automated to deliver creators’ win-distributors’

win-clearing house’s win-consumers’ winAccess control and authorization implemented in proprietary

manner results in extreme tight coupling of authorization decisions within applications

Page 4: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

4 Motivations (cont.)

SOA solutionNot only a framework but a key mechanism for cost effectivenessPromoting organizational agility to adapt the most frequent

changing environment Implementing SOA to improve DRM System

Service interoperability, Loosing coupling, Reusing or composing shared service components during service orchestration

Challenges in security issue!

Page 5: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

5

To re-model DRM System based on SOAAll participants well collaborate and equitably share sales benefits

Adopt policy-based security mechanismIntroduce the eXtensible Access Control Markup Language

(XACML) technology to decouple authorization decisions from DRM system

Fulfill autonomous management on authorization and access control for all resources via flexible policy-based SOA solution

Research Objective

Page 6: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

6

2. Background and Technology

Outline

4. Conclusions & Future Works Direction

3. Design and Implementation

1. Introduction

Page 7: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

7

Emphasizing on protection and management for digital contents

The essential is tocontrol publication, billing/payment and copyright for digital contents

DRM System

Page 8: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

8

Usually combined with certain business models for the sales of digital contents

DRM System

The integrated DRM solution

Page 9: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

9

Service Contract Service Loose Coupling Service Abstraction Service Reusability Service Autonomy Service Statelessness Service Discoverability Service Composability

Service Oriented Design Principle

Page 10: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

10

Interoperability problems arise within different DRM solutions

DRM with SOA can increase interoperability for the system management and facilitate efficient collaboration

Security is a major imperative for SOAFigueira Filho et al. (2006) in their proposed framework adopted

SOA and a high-level policy modeling approach to promote interoperability among DRM systems; however, the policy model only focused on the copyright protection

DRM System Moves to SOA

Page 11: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

11

eXtensible Access Control Markup Language Based on XML standardsDefine the general policy syntax for resources protection and

accessOASIS has regulated XACML as security standards to support

security technology for access control

XACML frameworks for services security

Page 12: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

12T

he implem

entation process of XA

CM

L and access control architecture

Page 13: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

13

SOA-based DRM System’s security, privacy, resource authorizing and access control must be well managed.

Help participants in SOA-based DRM System autonomously manage their own systemsSecurity Policy applies to resource authorization and access

control among systems Facilitate the abstraction of security jobs from the logic

loop of business system to become public servicesachieve centralization of operation and management

Security Policy in SOA-based DRM System

Page 14: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

2. Background and Technology

14 Outline

4. Conclusions & Future Works Direction

3. Design and Implementation

1. Introduction

Page 15: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

15Step 1. Streamline DRM system architecture to be service choreography

The fundamental architecture of DRM system

The streamlined architecture of DRM

Page 16: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

16Step 2. Achieve the service-oriented DRM system

Relations between functions and/or systems among the DRM system

The D

RM

system w

ith layered SOA

The SOMA layered mechanism

Page 17: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

17Step 3. Implement security policy with XACML

Page 18: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

18

The example of XACML Policy converted from CMS

Content Provider authorizescontents to Distributor

Page 19: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

19 The inquiry example of XACML Request for Consumer or Distributor

Page 20: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

20 The Example of XACML Response from PDPwhen Distributor inquires the authorized content

Page 21: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

21

2. Background and Technology

Outline

4. Conclusion & Future Work Direction

3. Design and Implementation

1. Introduction

Page 22: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

22

This study has designed and implemented a policy-based service-oriented DRM systemTransform a proprietary/tight-coupling DRM system into a

loose-coupling/on-demand business processesHelp participants' operation among DRM system be flexible and

react agilely in data transmission, exchange or integrationNot only to meet the security needs of web services, but also to

achieve a loose coupling in resources perspective

Conclusion

Page 23: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

23 Future Work Direction

Apply to cloud computing via service-oriented featuresParties who need to build up their systems can take advantages

of Infrastructure as a Service (IaaS) to save hardware costs and maintenance expenses

Functions of Multi-layered and remodeled DRM system can leverage Software as a Services (SaaS)

Adopt XACML to fulfill the security and safety needs of inter–service in cloud computing

.

Page 24: WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM System

24

Thanks for your attention!