GAME-THEORETIC ANALYSES AND SIMULATIONS OF ADOPTIONS OF SECURITY POLICIES FOR DRM IN CONTENTS SHARING SCENARIO

被引:3
|
作者
Zhang, Zhiyong [1 ,2 ]
Pei, Qingqi [2 ]
Ma, Jianfeng [2 ]
Yang, Lin [3 ]
机构
[1] Henan Univ Sci & Technol, Coll Elect & Informat Engn, Luoyang 471003, Henan, Peoples R China
[2] Xidian Univ, Key Lab Comp Network & Informat Secur, Minist Educ, Xian 710071, Shannxi, Peoples R China
[3] China Elect Equipment & Syst Engn Corp, Res Inst, Beijing 100141, Peoples R China
来源
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Digital Rights Management; Game Theory; Trusted Computing; Algorithm; Simulation;
D O I
10.1080/1079-8587.2011.10643142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefits of two stakeholders, which are DRM Providers and contents Sharer who is a category of consumers. A dynamic and mixed game and its algorithm were proposed, where Sharer's strategies were whether to employ the trusted computing enabling devices and related components or not, as well as Providers' strategies included entirely general security, entirely enhanced security and dynamic security policies. We concluded from both game-theoretic analyses and Swarm simulation experiments that the number of acquired sharable digital rights and security cost have a direct effect on Sharer's choices of the enhanced security policy, and also their different basic sharing modes including partial, modest and extensive sharing, further influence the choice of Providers. Besides, with respect to the mixed sharing mode far more similar to a real contents sharing scenario, Dynamic security strategy is superior to the entirely enhanced security in the context of limited sharable rights and higher security costs, but with the acquisition of much more rights and the decrease of enhanced security overhead, the latter strategy would be optimal and stable as a Nash Equilibrium for stakeholders, in combination with the exploitation of effective business models of contents industry.
引用
收藏
页码:191 / 203
页数:13
相关论文
共 50 条
  • [21] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [22] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [23] Security of Vehicle Platooning: A Game-Theoretic Approach
    Basiri, Mohammad Hossein
    Pirani, Mohammad
    Azad, Nasser L.
    Fischmeister, Sebastian
    [J]. IEEE ACCESS, 2019, 7 : 185565 - 185579
  • [24] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [25] CHECKMATE: Automated Game-Theoretic Security Reasoning
    Brugger, Lea Salome
    Kovacs, Laura
    Komel, Anja Petkovic
    Rain, Sophie
    Rawson, Michael
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1407 - 1421
  • [26] Game-Theoretic Infrastructure Sharing in Multioperator Cellular Networks
    Bousia, Alexandra
    Kartsakli, Elli
    Antonopoulos, Angelos
    Alonso, Luis
    Verikoukis, Christos
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (05) : 3326 - 3341
  • [27] An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform
    Li, Xiaotong
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (03) : 595 - 606
  • [28] GAME-THEORETIC ANALYSES OF ENFORCEMENT OF ENVIRONMENTAL LAWS AND REGULATIONS
    KILGOUR, DM
    FANG, L
    HIPEL, KW
    [J]. WATER RESOURCES BULLETIN, 1992, 28 (01): : 141 - 153
  • [29] Game-Theoretic Approach Towards Network Security A Review
    Tom, Litti
    [J]. 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [30] A game-theoretic framework for the security system of visible watermarking
    Tsai, Min-Jen
    Liu, Jung
    Wang, Chen-Sheng
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) : 5748 - 5754