Call for Paper - April 2023 Edition
IJCA solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 20, 2023. Read More

A Novel Approach towards EDRM System Design for Android Devices

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 14
Year of Publication: 2014
Harshala Yadav

Harshala Yadav. Article: A Novel Approach towards EDRM System Design for Android Devices. International Journal of Computer Applications 90(14):12-18, March 2014. Full text available. BibTeX

	author = {Harshala Yadav},
	title = {Article: A Novel Approach towards EDRM System Design for Android Devices},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {14},
	pages = {12-18},
	month = {March},
	note = {Full text available}


As digital content services gain importance in the mobile world, this paper proposes Digital Rights Management implementation for android devices. EDRM (Enterprise Digital Rights Management) system provides a novel solution to control access to documents such as Microsoft word, PDF and images from unauthorized copying, modification, and re-distribution. The work protects user's personal digital content like photos, documents etc. This modeled design aims how security is been provided to mobile devices using password mechanism, hash function and encryption and it is been tested using 100 samples. The individualization, flexibility, efficiency and practicability issues will be assured. The implementation permits the mobile user to conduct a 'preview-before-download' activity and the digital content provider will not suffer from unauthorized mobile users accessing digital content. Proposed system uses a two level security using a Universal Unique Identifier, which is hashed using the (Simple Hashing Algorithm) SHA algorithm, then that key is used for the encryption of the content in Advanced Encryption Standard (AES) algorithm. The parameters used to measure system performance are response-time and throughput and were found out to be 0. 022-sec/request and 45. 54 respectively. Thus the paper achieves better security and faster processing.


  • Chen-Yuan Chuang; Yu-Chun Wang; Yi-Bing Lin; , "Digital Right Management and Software Protection on Android Phones," Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st , vol. , no. , pp. 1-5, 16-19 May 2010 doi: 10. 1109/VETECS. 2010. 5493648
  • Liang Wang; Chen Wang; , "A DRM system for mobile digital journals based on OMA DRM model," Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on, vol. 5, no. ,pp. 2310-2313, 12-14 Aug. 2011 doi: 10. 1109/EMEIT. 2011. 6023573
  • Open Mobile Alliance (OMA1), http://www. openmobilealliance. org/
  • Vyas, Rohit. (2012) 'A rental Digital Rights Management framework which allows user to lend books and notes). MSc Thesis. University of Bedfordshire
  • Microsoft Inc. 1, Windows Media Digital Rights Management, http://www. microsoft. com/windowsserver2003/technologies/rightsmgmt/default. mspx
  • Microsoft Inc. 2, Microsoft Window Right Management Services System http://www. microsoft. com/windows/windowsmedia/forpros/drm/default. mspx
  • Chin-Ling Chen; An "All-IN-ONE" Mobile DRM System Design, International Journal of Innovative Computing, Information and Control, vol 6, no. 3(A), pp 897-911, March 2010
  • Chin-Ling Chen; An "All-IN-ONE" Mobile DRM System Design, http://ir. lib. cyut. edu. tw:8080/bitstream/310901800/7037/1/13. pdf
  • Sye Loong Keoh; , "Marlin: toward seamless content sharing and rights management," Communications Magazine, IEEE , vol. 49, no. 11, pp. 174-180, November2011 doi:10. 1109/MCOM. 2011. 6069726
  • Subramanya, S. R. ; Yi, B. K. ; "Digital rights management," Potentials, IEEE, vol. 25, no. 2, pp. 31-34, March-April 2006 doi: 10. 1109/MP. 2006. 1649008
  • Chang, F. C. , Wu, C. L. & Hang, H. M. (2007) "A switchable DRM structure for embedded device", Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference on, IEEE p37-40.
  • Cohen, J. E. (2003) 'DRM and privacy', Communications of the ACM, 46 (4), pp. 46-49.
  • Information Rights Management from Wikipedia
  • C. Conrado, F. Kamperman, G. J. Schrijen and W. Jonker, Privacy in an Identity-based DRM System, Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September. 1-5, 2003,pp. 389-395, 2003.
  • W. B. Lee, W. J. Wu and C. Y. Chang, A portable DRM scheme using smart cards, Journal of Organization Computing and Electronic Commerce, Vol. 17, No. 3,247-258, 2007
  • J. A. Onieva, J. Lopez, R. Roman, J. Zhou and S. Gritzalis, Integration of Non-repudiation Services in Mobile DRM Scenarios, Telecommunication System,Vol. 35, pp. 161-176, 2007.
  • Open Mobile Alliance (OMA2), mobile device DRM standard version two, http://www. openmobilealliance. org/release_program/indx. html