GAME-THEORETIC ANALYSES AND SIMULATIONS OF ADOPTIONS OF SECURITY POLICIES FOR DRM IN CONTENTS SHARING SCENARIO

被引:3
|
作者
Zhang, Zhiyong [1 ,2 ]
Pei, Qingqi [2 ]
Ma, Jianfeng [2 ]
Yang, Lin [3 ]
机构
[1] Henan Univ Sci & Technol, Coll Elect & Informat Engn, Luoyang 471003, Henan, Peoples R China
[2] Xidian Univ, Key Lab Comp Network & Informat Secur, Minist Educ, Xian 710071, Shannxi, Peoples R China
[3] China Elect Equipment & Syst Engn Corp, Res Inst, Beijing 100141, Peoples R China
来源
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Digital Rights Management; Game Theory; Trusted Computing; Algorithm; Simulation;
D O I
10.1080/1079-8587.2011.10643142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefits of two stakeholders, which are DRM Providers and contents Sharer who is a category of consumers. A dynamic and mixed game and its algorithm were proposed, where Sharer's strategies were whether to employ the trusted computing enabling devices and related components or not, as well as Providers' strategies included entirely general security, entirely enhanced security and dynamic security policies. We concluded from both game-theoretic analyses and Swarm simulation experiments that the number of acquired sharable digital rights and security cost have a direct effect on Sharer's choices of the enhanced security policy, and also their different basic sharing modes including partial, modest and extensive sharing, further influence the choice of Providers. Besides, with respect to the mixed sharing mode far more similar to a real contents sharing scenario, Dynamic security strategy is superior to the entirely enhanced security in the context of limited sharable rights and higher security costs, but with the acquisition of much more rights and the decrease of enhanced security overhead, the latter strategy would be optimal and stable as a Nash Equilibrium for stakeholders, in combination with the exploitation of effective business models of contents industry.
引用
收藏
页码:191 / 203
页数:13
相关论文
共 50 条
  • [1] Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM
    Zhang, Zhiyong
    Pei, Qingqi
    Ma, Jianfeng
    Yang, Lin
    Fan, Kefeng
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1133 - +
  • [2] Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of Security Policies
    Zhang Zhiyong
    Pei Qingqi
    Ma Jianfeng
    Yang Lin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03) : 519 - 524
  • [3] GAME-THEORETIC ANALYSES OF BARGAINING
    BISHOP, RL
    [J]. QUARTERLY JOURNAL OF ECONOMICS, 1963, 77 (04): : 559 - 602
  • [4] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820
  • [5] A game-theoretic analysis of information sharing and security investment for complementary firms
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) : 1682 - 1691
  • [6] Game-theoretic approach for information sharing
    Raweewan, Morrakot
    Ferrell, William G., Jr.
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 111 - +
  • [7] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [8] GAME-THEORETIC ANALYSES OF COALITION BEHAVIOR
    FRIEND, KE
    LAING, JD
    MORRISON, RJ
    [J]. THEORY AND DECISION, 1977, 8 (02) : 127 - 157
  • [9] Game-theoretic Simulations with Cognitive Agents
    Shahid, Nausheen Saba
    O'Keeffe, Dan
    Stathis, Kostas
    [J]. 2021 IEEE 33RD INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2021), 2021, : 1300 - 1305
  • [10] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    [J]. Journal of Network and Systems Management, 2013, 21 : 47 - 64