CFP last date
22 April 2024
Reseach Article

A Novel Approach towards EDRM System Design for Android Devices

by Harshala Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 14
Year of Publication: 2014
Authors: Harshala Yadav
10.5120/15787-4482

Harshala Yadav . A Novel Approach towards EDRM System Design for Android Devices. International Journal of Computer Applications. 90, 14 ( March 2014), 12-18. DOI=10.5120/15787-4482

@article{ 10.5120/15787-4482,
author = { Harshala Yadav },
title = { A Novel Approach towards EDRM System Design for Android Devices },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 14 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number14/15787-4482/ },
doi = { 10.5120/15787-4482 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:01.893563+05:30
%A Harshala Yadav
%T A Novel Approach towards EDRM System Design for Android Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 14
%P 12-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As digital content services gain importance in the mobile world, this paper proposes Digital Rights Management implementation for android devices. EDRM (Enterprise Digital Rights Management) system provides a novel solution to control access to documents such as Microsoft word, PDF and images from unauthorized copying, modification, and re-distribution. The work protects user's personal digital content like photos, documents etc. This modeled design aims how security is been provided to mobile devices using password mechanism, hash function and encryption and it is been tested using 100 samples. The individualization, flexibility, efficiency and practicability issues will be assured. The implementation permits the mobile user to conduct a 'preview-before-download' activity and the digital content provider will not suffer from unauthorized mobile users accessing digital content. Proposed system uses a two level security using a Universal Unique Identifier, which is hashed using the (Simple Hashing Algorithm) SHA algorithm, then that key is used for the encryption of the content in Advanced Encryption Standard (AES) algorithm. The parameters used to measure system performance are response-time and throughput and were found out to be 0. 022-sec/request and 45. 54 respectively. Thus the paper achieves better security and faster processing.

References
  1. Chen-Yuan Chuang; Yu-Chun Wang; Yi-Bing Lin; , "Digital Right Management and Software Protection on Android Phones," Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st , vol. , no. , pp. 1-5, 16-19 May 2010 doi: 10. 1109/VETECS. 2010. 5493648
  2. Liang Wang; Chen Wang; , "A DRM system for mobile digital journals based on OMA DRM model," Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on, vol. 5, no. ,pp. 2310-2313, 12-14 Aug. 2011 doi: 10. 1109/EMEIT. 2011. 6023573
  3. Open Mobile Alliance (OMA1), http://www. openmobilealliance. org/
  4. Vyas, Rohit. (2012) 'A rental Digital Rights Management framework which allows user to lend books and notes). MSc Thesis. University of Bedfordshire
  5. Microsoft Inc. 1, Windows Media Digital Rights Management, http://www. microsoft. com/windowsserver2003/technologies/rightsmgmt/default. mspx
  6. Microsoft Inc. 2, Microsoft Window Right Management Services System http://www. microsoft. com/windows/windowsmedia/forpros/drm/default. mspx
  7. Chin-Ling Chen; An "All-IN-ONE" Mobile DRM System Design, International Journal of Innovative Computing, Information and Control, vol 6, no. 3(A), pp 897-911, March 2010
  8. Chin-Ling Chen; An "All-IN-ONE" Mobile DRM System Design, http://ir. lib. cyut. edu. tw:8080/bitstream/310901800/7037/1/13. pdf
  9. Sye Loong Keoh; , "Marlin: toward seamless content sharing and rights management," Communications Magazine, IEEE , vol. 49, no. 11, pp. 174-180, November2011 doi:10. 1109/MCOM. 2011. 6069726
  10. Subramanya, S. R. ; Yi, B. K. ; "Digital rights management," Potentials, IEEE, vol. 25, no. 2, pp. 31-34, March-April 2006 doi: 10. 1109/MP. 2006. 1649008
  11. Chang, F. C. , Wu, C. L. & Hang, H. M. (2007) "A switchable DRM structure for embedded device", Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference on, IEEE p37-40.
  12. Cohen, J. E. (2003) 'DRM and privacy', Communications of the ACM, 46 (4), pp. 46-49.
  13. Information Rights Management from Wikipedia
  14. C. Conrado, F. Kamperman, G. J. Schrijen and W. Jonker, Privacy in an Identity-based DRM System, Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September. 1-5, 2003,pp. 389-395, 2003.
  15. W. B. Lee, W. J. Wu and C. Y. Chang, A portable DRM scheme using smart cards, Journal of Organization Computing and Electronic Commerce, Vol. 17, No. 3,247-258, 2007
  16. J. A. Onieva, J. Lopez, R. Roman, J. Zhou and S. Gritzalis, Integration of Non-repudiation Services in Mobile DRM Scenarios, Telecommunication System,Vol. 35, pp. 161-176, 2007.
  17. Open Mobile Alliance (OMA2), mobile device DRM standard version two, http://www. openmobilealliance. org/release_program/indx. html
Index Terms

Computer Science
Information Sciences

Keywords

EDRM Android DRM Digital Security Encryption