Trading Digital Intangible Goods: The Rules of

Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
Trading digital intangible goods : the rules of the game
Dimitri Konstantas
Jean-Henry Morin
Univestity of Geneva - CUI
24 rue General Dufour , CH-1211 Geneva 4, Switzerland
e-mail: [email protected]
[email protected]
Abstract
In this paper1 we first specify the terms and conditions
for the commercialization of intangible goods, and namely
digital documents, defining a mapping between the commercialization terms of the tangible good (printed information) to the commercialization terms of the intangible good
(digital document). The meaning and limits of purchasing,
accessing, redistributing, copying, preserving user anonymity, etc. are defined in accordance to the well established rules governing the trade of printed information. We
next specify the requirements that a digital commercialization system of intangible goods should fulfill in order to
guarantee the rights of its users (providers and consumers)
like user anonymity, superdistribution, marketing policies,
etc. Finally we give a brief presentation of a framework and
a pilot application that we designed and implemented for
the commercialization of digital documents.
1.
Trading of Goods
The commercialization of tangible goods, ranging from
cars to books, is a long established trade with well defined
and understood terms and conditions. The rights of both the
seller and the buyer are clearly defined either formally by
laws and contracts or informally by what is called “common practice”. Also a certain number of intangible goods,
like copyright of an intellectual work or the commercialization rights of a certain product for a certain region, are traded as if they were tangible goods.
With the wide use of computers and networks a new
class of intangible goods appeared in the market: the digital
intangible goods, which in most cases are the digital representations of tangible goods, like books and documents but
also work tools like document editors and business applications. This new class of intangible goods are considered by
1. This work was supported by the Swiss Federal Government
with the FNRS SPP-ICS projects MEDIA (5003-045332) and
HyperNews (5003-045333)
both buyers and consumers as just different representation
of tangible goods. Thus, it is expected that their commercialization will be done under similar terms as tangible
goods. However due to their different nature (i.e. atoms
versus bits) the similarity of the commercialization terms
and conditions is not always an obvious one.
Another aspect in the commercialization of tangible
goods is the distribution channel. That is, the underlying infrastructure and commercialization network used for the
dissemination of the goods. The rules regulating the distribution channel are also well defined and each intermediary
in the distribution chain is bound by law or custom to a certain behaviour. With digital intangible goods however the
distribution infrastructure is the commercialization computer application and the network. This infrastructure should
satisfy certain requirements for the protection of the rights
of both the provider and the consumer (among the major,
copyright and privacy) acting as an intermediary in the delivery of the (intangible) goods. For example it should protect the user’s anonymity, allow for marketing policies, the
free choice of provider etc. Although these requirements
stem directly from the tangible goods commercialization
model, in the case of digital intangible goods’ trading they
need to be explicitly stated, since they serve as the basis for
the development of digital intangible goods commercialization systems.
In this paper we take the example of digital documents
as a target intangible good and define the commercialization terms and conditions for digital information trading.
We then specify the requirements that a digital commercialization system of intangible goods should fulfil in order to
guarantee the rights of its users (providers and consumers).
Finally we give a brief presentation of a framework and a
pilot application that was designed and implemented based
on the above identified rules, for the commercialization of
digital information.
Note that although in this paper we talk about “digital
documents”, the ideas developed are equally valid for a
large class of digital intagible goods, ranging from video
and audio streams to books and news articles. In this sense
© Copyright 2000 IEEE. Published in the Proceedings of the Hawai’i International Conference On System Sciences,
January 4-7,2000, Maui, Hawaii.
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
1
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
the term document should be seen as a generic term encapsulating almost any digitally representable information or
tool.
2.
Commercialization of Digital Documents
The commercialization of printed documents, like
books, newspapers and reports, is a long established trade
with well defined and understood terms and conditions.
People are used of trading material documents in different
forms. For example, a book can be sold as a pocket book or
in parts, when published within a journal, or even as an audio tape. With the introduction of digital technologies digital documents were initially considered as just one more
representation of a material document, and were traded in
the form of diskettes and CD-ROMs. However the evolution of technology and the introduction of the Internet allowed people to trade digital documents without the need of
a physical support. As a result the long established rules and
conditions of document trading were no longer applicable.
Practical restrictions and problems that in the past were acting as a regulator in the protection of intellectual rights
were no longer existing. For example, a reproduction of a
printed book costs as much and in most cases more than the
original and people prefer to buy a new original rather than
photo-copying it. A digital book however can be copied and
distributed over the Internet indefinite times at virtually no
cost with no quality loss (i.e., no notion of an original).
The trading of intangible goods is governed by its own
terms and conditions [3]. However, if we wish to promote
trading of intangible goods we must define the applicable
rules and conditions in a way that is understandable and acceptable by both the publishers and the readers. For that we
must start from the existing model of trading tangible goods
and define the relations with the trading of intangible
goods. Our claim is that intangible goods can be traded under similar terms as tangible goods. However we need to
define what we consider as “similar terms”.
Document content advertising. The first action of a reader is to identify if the document he is about to purchase interests him. With printed document, like journals and newspapers, the reader finds in the front page the titles and possibly a few lines of abstract describing the contents of the
document. This information is provided free of charge
(newspapers and journals are posted outside kiosks in order
to raise the interest of the readers). With digital information
the reader should be able to obtain a brief summary of the
content of the document without having to pay for it. The
summary depends, known also as value stripped content,
on the policy of the provider and can range from a simple
title to a full abstract.
Document purchasing. The purchasing of a printed document and the payment of the corresponding fees is done at
the moment the reader requests the document. It is at this
moment that the reader expresses his will to read the printed
document and consequently pays the corresponding fees.
Thus, with a digital document the payment of the corresponding fees should be done at the moment the reader expresses his interest to read it. That is, when the reader attempts to open the document for reading. It is at this moment that payment of the corresponding fees should be
made according to the policies attached to the document.
Document reading. A person who purchased a magazine or book expects to be able to read it as many times as
he wishes without having to pay again every time he wishes
to re-read it. With a digital document, where document purchasing is done at the moment that reader attempts to read
the document, the reader should also pay once and be able
to read it as many times as he wishes without having to pay
for it again (provided that the attached policy allows it).
Furthermore even if he possesses the digital document (that
is, the digital data) he should not be able to read it without
first paying for it.
Document re-distribution. It is quite common that a
person passes a document he purchased to a friend. However this action results in the original purchaser losing ownership of the document or at least of the right of usage (i.e.,
reading). If he wishes to read it again he has to buy a new
one or retrieve the borrowed copy. Alternatively the owner
of the document can give an indication of where the document can be acquired and paid for, keeping his own copy.
What is important to note in this transaction is that we always have a single copy of the document which can be read
at any given instant by one and only person. With digital
documents on the other hand the case is different. When
one passes a digital document to a friend he actually makes
a (indistinguishable) copy of the original. As a result both
persons have now a copy of the document. However considering the previous term (document purchasing) the second person should not be able to read, without paying, the
copy of the digital document he received, unless the original owner looses his right to read his copy of the document.
Document life time. A reader buying a printed document
today and preserving it in good condition is expecting to be
able to (re-) read it after long time periods (in the order of
decades or even centuries) without having to pay again for
it. This should also be true for digital documents. A digital
document which the reader bought today (that is, for which
he paid the fees for reading it) should be readable free of
charge after long time periods.
Document copying. A common and (up to a certain level) tolerated practice with printed documents is photocopying. Photocopying is tolerated by the publishers for a
number of reasons: first of all the quality of the copy is (in
general) lower than this of the original; second in many cases, like for example for books, photocopying the complete
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
2
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
document is more expensive than buying a new copy; third,
photocopies can be made within the established context of
“fair use”; finally photocopies are easily identifiable and, if
needed, legal action can be taken against the malefactor.
Another way to copy a printed document is through Optical
Character Recognition (OCR) systems. However the reproduction of a printed document using OCR is in most cases
time consuming and costly. With digital documents photocopying can be compared with the printing of the computer
screen, something which is, as with photocopies, difficult
to prevent (of course there are techniques that prevent one
from making photocopies, like for example the use of special ink, but these are not so often used due to their high
cos). In addition, as with printed documents, one can consider reproducing the digital document from the captured
screen dump using OCR techniques. However in both cases
the quality of the document is lost and in addition any special features of the digital document, like for example hypertext links, active parts (code, animation, sounds etc.)
will disappear.
Document purchaser identification. A major issue in
the commercialization of printed documents is the ability of
the reader to buy the document without revealing his identity to anyone. One can buy, for example, any magazine,
newspaper or book from a kiosk or book-store keeping his
full anonymity from both the sales person and the publisher. On the other hand a reader can decide to reveal his identity to a publisher or reseller agent via, for example, a subscription and benefit from any possible special offers, like
discounts, extra editions, advance copies etc. Note that the
fact that a person is reading a specific document is in itself
information. Thus it should be up to the reader to decide if
he wishes to reveal this information or not. With digital
documents the reader should also be able to read a document without having to reveal his identity. The document
provider should not be able to relate the collected document
fees to a specific reader. Of course if the digital document
provider offers nominative subscriptions with possible side
benefits, it should be up to the reader to decide if he wishes
to subscribe and thus reveal his identity, or if he prefers
reading the digital document anonymously.
Document authoritativeness. The cornerstone of a
printed document is the indisputable identification of the
source of the information. The reader of a printed document
knows with certainty who created the specific document
and can easily identify modifications done on it, like corrections or additions. It is in general very difficult for one
to modify or falsify a printed document in an untraceable
way. Nevertheless given enough money, time, effort or
power any printed document can be untraceably modified
or falsified. For example someone with enough money can
very easily print a false edition of a newspaper which is indistinguishable from the original. With digital documents
the reader should thus be able to indisputably identify the
source of the document and verify its integrity. However, as
with printed documents, a person or organization with
enough money, time or power will always be able to falsify
any digital document.
3.
Requirements for a Commercialization
System of Digital Documents
Once the terms and conditions of the commercialization
of digital documents have been defined, we need to translate them to requirements that will serve in the design of the
commercialization application. These requirements will reflect the fundamental interests of the digital information
publisher and consumer, namely the fact that the publisher
is interested in providing a profitable service fulfilling the
needs of the consumer, while the consumer is interested in
obtaining a reliable service for the right price. Here we give
an overview of the basic requirements; an extended description can be found in [8][12].
Anonymity. As with traditional commerce an information consumer does not need to reveal his identity to the
publisher of a magazine or newspaper in order to buy it, so
with digital information the consumer should be able to buy
information without having to reveal his identity in any direct or indirect way.
Information granularity. In the traditional publishing
industry, the smallest information unit that can be put on the
market is the issue, which bundles a substantial number of
information pieces and its price is fixed accordingly. In a
digital environment however, the granularity of the marketable information unit can be brought down to the level, for
example, of a single newspaper article. In fact what the digital information consumer will be interested in is buying independent pieces of information and not complete editions.
Superdistribution. It is quite common for a person to
read something and to wish to show it to somebody else.
With printed material this is easily done by simply cutting
the item or giving the complete edition to another person.
In a digital system however this process although feasible,
has important copyright violation side effects. The reason is
that instead of passing to the other person the specific item,
and in consequence losing possession of it, we actually
make a copy of the item. This copying can violate copyright
law. Thus the digital system should allow the reader to freely pass information items to other persons without violating
copyright law.
Subsequent access. Once the consumer has paid for an
information item he should be able to read it again at a later
time without having to pay for it a second time. Although
this might look like an obvious possibility it is an important
requirement since payment of author rights is done at the
moment of reading the document. Subsequent reading of
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
3
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
the information by the same reader should not result in a
second payment of the author rights (unless explicitly expressed by the policy attached to the document).
Free Choice of Providers. In a digital commerce environment the consumer should be able to choose freely from
where he buys services and goods. This means that any system installed should not be bound to a specific provider, allowing the consumer to freely choose the provider from
whom he will buy information.
Off-line Activity. It is a common practice for a person
to buy a magazine or newspaper and read it at different locations, like when travelling or even at the beach. A digital
information system should allow the reader to read, and
consequently pay for, information items that are stored locally, even in the absence of a network.
Notification of Update Availability. Being informed
“on-time” is a major issue for the information consumer. In
a digital information dissemination system means are needed to offer the information consumer the possibility of being notified immediately upon availability of information
updates on desired issues.
Information selection. Different information providers
have different specialisations and present information in
different ways (classification). In a digital information
world we will have a large number of digital information
providers available. The information consumer should thus
be able to define which kind of information he wishes to obtain from each digital information provider.
User Interface. Since it is neither feasible nor desirable
to create a new hypertext browser, the digital information
system should be able to run within any widely available
browser, like a Java enabled Web browsers.
Marketing policies. Of major importance in the success
of a service is the choice of the right marketing policy. The
information providers should be able to implement flexible
and adaptable payment policies. For example the price of
an article can change depending on its publication date (last
week news have in general no value). This should be feasible without any need for the reader to interact with the publisher: the article itself should be able to figure out its current price.
Information Access and Information Evolution. The
information consumer should be able to easily access older
information and trace the evolution of events. This means
that published information should be immutable and identifiable.
The Information Consumer as an Information Provider. To illustrate this requirement we consider the following two examples where a user receives an information
item: (i) the user decides to forward it to a friend together
with some comments. (ii) the user decides to forward it to a
client together with some comments for which a fee must
be paid. In both cases a new information item is created,
which contains the original information and the comments
with a possible corresponding price. The idea here is that an
information consumer can become an information provider
of his own added value and a reseller of other information
provider’s material without infringing any copyright or intellectual property law. Thus information consumers
should be able to publish new information items embedding
information of other providers together with their own added value information. The final reader will have to pay both
providers in order to read the information and the attached
comments.
4.
The MEDIA Approach for Commercialization of Digital Documents
The aim of the MEDIA (Mobile Electronic Documents
with Interacting Agents) [6] project is to develop the means
that will allow protection, commercialization and dissemination of digital documents under similar conditions as
those for printed documents, as defined above. The MEDIA
approach is based on the encapsulation of the documents in
agents. The document is no longer a simple collection of
data but a program which the reader must execute in order
to be able to read it. The document agent can thus enforce
the copyright control and payment at the time the reader requests to read the document.
In the MEDIA project we designed and developed HEP
(Hypermedia Electronic Publishing) [8][9][10][11][12] a
framework that implements the MEDIA digital document
commercialization model. The Hep framework enforces a
pay per use scheme for the digital documents. The reader
pays only for what he requests explicitly to read and he cannot read a document which he has not paid for. The document distribution model of the Hep framework is based on
public key encryption with a security schema that discourages infringements [14]. Information consumer anonymity
and privacy are protected so that the reader need not reveal
his identity to the document provider. Furthermore the Hep
framework supports off-line operations for the payment of
the document fees and the release of its contents to the reader, with the simultaneous delivery of receipts (proof of purchase) for subsequent accesses to the document.
One of the most important points in the design of the
MEDIA digital document distribution model was the
choice of agents as the means for the document dissemination. The reasons for this choice were many. First of all
agent technology is not bound to a specific platform. The
same agent can run on different heterogeneous platforms
without need of any modification. A second reason is that
the document is network aware. This way it can decide on
its actions (release or not of its content and under which
terms) depending on the node where it is executing, being
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
4
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
➊ Blob is encrypted using Key k
Document
Ek(BLOB)
(symmetric encryption)
➊
Content of document as
binary large object.
EK(BLOB)
Encryption key k
➋ Key k is encrypted using
public key of credit
institution EC(k,I) with
document information
(asymmetric encryption)
Document information I
➋ EC(k,I)
➌ EC(k), AC and DIS are
signed using private key
of provider
SP(EC(k,I),DIS)
(digital signatures)
Agent code and
encypted-BLOB hash
AC, BH
➌
DIS
Document Information String
(Document ID, price, author,
source, date, abstract,...)
Figure 1. The digital document agent packaging
responsible for its own security and the application of different policies. In addition the policies are implemented as
programs allowing a far greater flexibility in defining the
terms and conditions of accessing the document content.
Finally the agent metaphor allows the implementation of
trust chains where each entity, like network provider, credit
institution, publisher, etc. is responsible for a specific task
in the commercialization chain.
The MEDIA system has been fully implemented in Java
and we have currently completed the second prototype. A
version of the HEP framework will be installed in a Geneva
based private organisation for the distribution of text and
audio over the internet to its members, with full protection
of the copyright.
4.1. The MEDIA Document Encapsulation and
Distribution Model
In the MEDIA model the document is packaged within
an agent for full public distribution. The content, considered as a binary large object (BLOB), is encrypted with a
symmetric key (K). This key is itself encrypted with the
public key of the accredited credit institution(s) along with
information (I) identifying the publisher and the price of the
document. A document information string (DIS) is added to
the agent providing the necessary public (i.e., free) information about the content such as title, authors, price, abstract, etc. In addition we include the code (or its signature)
(AC) implementing the operations and policies for accessing the content along with a hash of the encrypted blob
(BH). Finally, both the encrypted key, the agent code and
the DIS are signed by the information provider with his private key. This encapsulation, shown graphically in Figure
1., binds all parts of the agent together and at the same time
guarantees that the agent is coming from the (responsible)
provider and has not been tampered with.
The encapsulated document can be distributed without
any restriction to potential readers. The copyright control
will be triggered each time the reader asks to read the document. To achieve this we have devised a scheme for the
commercial distribution of digital documents that satisfies
the defined security and distribution requirements. It requires a trusted third party between the information consumers and providers, which may be, for example, a credit
institution or a bank. Both parties trust the credit institution
to authorize the unlocking of the document against payment
from the information consumer which is credited to the information providers account. Upon successful payment to
the credit institution, the document key is released to the
agent platform and a receipt is given to the information consumer for subsequent access. This receipt is issued only for
the information consumer that purchased the document.
Thus the receipt is nominative. However this can also be
bound to whatever commercial policy the providers wish to
use. A general overview of the model is given in Figure 2..
User to User
Forwarding
Packaging
Delivery of Article Agent
st
ue
User Account
req
Prov. Account
ss
e
cc
Information
Providers
on-line
off-line
+
-
Credit Institutions
( trusted party )
a
nt
nte
Co
t
eip
ec
R
y&
Information
Consumers
Ke
Smart Card
transaction
Figure 2. Hep document distribution model overview
In summary the process of both the access and the subsequent accesses to the content (i.e., unlocking) is done in
to two steps. The first step is to acquire a session key for the
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
5
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
further secure communication with the accredited entity
(i.e., credit institution or alike) which will process the access request and release the document key. The second step
is the actual content access request and acquisition of the
document key and receipt, as shown in Figure 3. and Figure
4.. The request is formed by extracting from the document
agent the encrypted key corresponding to the credit institution and the document information string. This is then
signed by the user and the result is encrypted using the session key previously acquired in the first step. Upon receiving such a message, the credit institution will be able to decrypt it knowing the previously issued session key, verify
the signatures of both the user and the provider and thus reveal the DIS and the encrypted key. At this point, billing occurs and if it is successful, the document key K will be decrypted with the private key of the credit institution and a
signed receipt generated for this transaction. Finally, the
document key and the signed receipt are encrypted with the
session key and the result sent back to the user (i.e., to the
agent platform which the document agent will instruct for
releasing its content).
Subsequent access to the document content is done in
exactly the same way except that a receipt is appended to
the request send to the credit institution. Upon successful
User ➊ SP(EC(k,I),DIS) is signed
using use*r’s private key
SU(SP(EC(k,I),DIS))
➋ SU(SP(EC(k,I),DIS)) is encrypted
using session key T
ET[SU(SP(EC(k,I),DIS))]
ET[SU(SP(EC(k,I),DIS))]
➋
SU(SP(EC(k,I),DIS))
➊
EC(k,I)
➌
DIS
SP(EC(k,I),DIS)
Credit Institution
Figure 3. Access request
➊ ET[SU(SP(EC(k,I),DIS))] is decrypted
with session key T
➋ SU(SP(EC(k,I),DIS)) is verified against
the user’s public key
Credit
➌ SP(EC(k,I),DIS) is verified against
Institution
the provider’s public key giving EC(k,I) and DIS
➍ EC(k,I)is decrypted using private key of credit institution
❺ I is used for billing and a receipt r is created and
signed using private key of credit institution SC(r)
(r contains userID,docID,etc.)
➏ The key k and receipt SC(r) are encrypted using
session key T
ET(k,SC(r))
❼
User
ET(k,SC(r)) is decrypted with session key T
revealing key k and receipt SC(r) to be used
for subsequent access
Figure 4. Document key and receipt
verification of the receipt by the credit institution (i.e., verification of receipt issuer signature and user identification
match between receipt holder and requestor), the document
key will be returned to the user. The use of receipts is an important item of the Hep framework since the reader should
be able to access the document many times after the initial
payment without having to pay again.
4.2. Key management
The only keys that need to be exchanged between the
participants (i.e., information providers and consumers, and
credit institutions) are their public keys and the session
keys between the information consumers and the credit institutions. For the time being no use is made of certification
authorities for public key acquisition. However this can be
integrated easily in future implementations. The session
key acquisition is secured by using asymmetric cryptography for encryption and signatures.
Every participating entity knows its own private key.
The credit institutions need to know the public keys of both
the information providers and consumers, which is a reasonable assumption for a trusted third party. Furthermore
credit institutions are accustomed in handling very large
numbers of independent records for their customers. The
information consumers need to know the public keys of the
information providers and the credit institutions. However,
the information providers only need to know the public key
of the credit institutions.
Finally, the information providers know the document
symmetric key that was used for content encryption, which
is also a reasonable assumption since they own their content/added value; nevertheless this key need not be stored
for each and every document and in fact it can be discarded
once the document has been encrypted and packaged in the
document agent.
The key management principles are summarized graphically in Figure 5. From a key management point of view,
the major advantage of this document distribution scheme
resides in the fact that there is no overhead for document
key exchange or replication since the document key is encrypted with the public key of the accredited institutions
and held by the document agent itself. Thus, even in case of
information provider bankruptcy the content can still be accessed through one of the credit institutions.
4.3. Agent platform requirements
One of the most important decision in the conception of
MEDIA and the design and implementation of the HEP
framework, was the choice of agent technology and an
agent platform as the basis for the system. This choice was
influenced by a number of requirements for the agent plat-
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
6
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
form. The first one was that the agent platform should allow
portability, and support architecture independence. That is,
one should be able to port the agent platform on different
architectures, from PCs to minis and high end computers,
and, in addition, the ported platform should provide identical behaviour on all architectures. In principle all existing
agent platforms (MOLE [1][16], JDK etc.) provide this feature.
The second requirement, which for our needs was the
most important, concerned the security offered by the platform. From one hand we ask that the platform protect the
agent executing on it from other executing agents; that is,
one agent should not be able to modify or alter another
agent. On the other hand we ask that the platform be able to
protect itself from malicious agents. In addition the agent
platform should provide the means to control all accesses of
the agents to network, files or even other agents, provide a
way to migrate agents from one platform to another and
support agent persistency. Although the JVM is a prime
candidate, its security model is insufficient. Java agents can
easily attack both the platform and other agents.
Although in our first implementation of Hep we used
MOLE as the agent platform, the second implementation is
based on JavaSeal. JavaSeal [17][18], is an agent platform
designed and developed within the MEDIA project extending the security model of the JVM. JavaSeal is based on the
notion of Seals which provide a secure communication
model between agents. Each Seal behaves as a closed name
space and agents can only communicate with their parent or
child Seals. This way by placing agents in different Seals
one can monitor all message exchanges and tightly control
the flow of information and interactions between the
agents.
5.
Security issues
A very important issue in the conception and design of
the Hep system, as well as in any system with similar goals,
is the definition of the security concept. It is a well known
fact that today absolute security via software encryption
Document Key
Credit Institution
can not be achieved. The best we can do is to asymptotically approach the ideal absolute security accepting a certain
risk level. How close we reach and what is an acceptable
risk depends on the specific application.
In the Hep system the core issue is the protection of the
content encapsulated in the document agent. The target is to
protect the owner of the content from malicious users that
will try to extract the content of the documents by breaking
the security schema of the agent [5].
5.1. Content Encryption
The core of the Hep system security relies on the encryption of the document contents. The idea is that the user
should not be able to break the encryption using reasonable
processing power and within a reasonable time frame.
What is reasonable, of course, depends on the importance
of the information contained in the document. If the information contained has a commercial value for a short time
period, like for example a quotation of the stock market,
then the security level employed should be sufficient for
preventing the user from breaking it within the commercial
life time of the information. The major problem however
comes from contents with very long life time, like for example books which have a life time of more than 30 years.
In this case it is difficult to anticipate an encryption schema
that will retain its properties for this long period. For example, ten years ago the technological state of the art was defining that breaking a specific encryption schema would
have required more than 50 years of processing time. Today
the same encryption schema can be broken in less than 0.5
years of processing time (or even less). In a few years, with
the projected evolution of technology the same encryption
schema might be breakable with a few hours of processing
on a home computer. Therefore we cannot expect that an
encryption schema used today will retain its security level
after a few years.
Systems like Hep, based on the principle of content encapsulation and encryption, can provide adequate protection of intellectual rights only for the time periods for which
Credit Institution
Information Provider
Information
Providers
Information
Consumers
Document Key
Public Key
Remark: Each actor knows its
own private-public key pair
Credit Institutions
( trusted party )
Information Consumer
Information Provider
Figure 5. Key management: who knows what
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
7
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
the technology evolution can be anticipated. It would be unrealistic to try to provide long lasting protection, i.e. 20
years or more, employing only content encapsulation and
encryption.
Nevertheless the Hep model offers a customized encryption model. The provider can use any encryption algorithm
he wishes, create new ones and choose the encryption key
length to any size he believes will be suitable for a specific
document. This way the encryption security of the Hep
platform can be adapted as needed according to the technology evolution and needs of the providers.
5.2. Security Target of Hep
If we consider for a moment that the offered protection
of the used encryption schema is sufficient, then the question to be asked is how secure is the overall Hep system.
That is, how difficult can it be for a user to manoeuvre the
agent document in releasing its contents without actually
having the proper authorization. This can be done either by
tampering with the agent or by compromising the agent
platform.
If we assume that the agent platform is secure (the user
has/can not tamper with it) then the attack on the document
agent can be easily prevented. The agent can include a signature which will allow the verification of its integrity by
the platform. If the agent has been tampered the platform
will simply reject it and will not handle it. Certificates can
be used, for example, to compose this signature so that the
user will not be able to fake it. In addition the documentagent provider can use code obfuscation [2] techniques in
order to make the task of tampering with the agent code
more difficult. This way the average user will not be able,
without considerable effort, to modify the agent behaviour
and in addition it will be difficult to automate the task since
the code implementing the agents will be different from one
agent to another.
The second type of attack will be to tamper or fake the
agent platform itself. In this case the arriving document
agent will not be able to verify whether or not the platform
has been tampered. The fake platform can easily provide all
required replies to hide itself. One might consider using secure external devices, like a smart-card or a crypto-card
[19], that will allow the agent to communicate with and verify the platform. However in order for the agent to establish
a secure channel with the secure device it will have to execute (run) on top of the agent platform which, by definition,
is compromised! In other words the agent can never be sure
that the platform has not been compromised. On the other
hand the secure external device might be able to detect a
compromised platform, in which case it can refuse to collaborate, or if needed self-erase its contents. Nevertheless,
the secure external device will be able to verify only that the
software platform has not be compromised. The complete
system can very well run on top of a CPU emulator system
allowing capture of all relevant data at the CPU level.
5.3. Calculated Risks
It is clear that absolute security can not be achieved;
there will always be a certain risk involved. In a commercial world however it is quite common to operate and make
business accepting different well known security breach
risks. This is what it is commonly known as calculated
risks. That is, risks we are well aware of, but which we accept in order to achieve our goal.
In the design and implementation of the Hep platform
we have accepted a certain level of security risk. That is, we
assume that the Hep platform is not secure, but a substantial
effort is needed in order to break the security. What we target is to eliminate generic security failures that will allow
the malicious user to access the content of documents in a
simple, fast and automated way.
The most sensitive part in the Hep platform is the financial institution’s private key. A user gaining access to this
key can access all documents from all providers. Thus, in
our design the financial institute’s private key is never communicated. A special case however is the off-line operation
where a smart card is used for the payment and document
key release. In this case the smart card plays the role of the
financial institution, holding the financial institution’s private key and decrypting the document keys. All the key decryption operation is performed internally in the smart card
and the user never gains access to the financial institution’s
private key. This way the user has only the possibility to extract independent document keys. However extracting the
document key gives him access to only one document. By
designing the Hep security system in a way making the extraction of the document key very difficult, requiring long
time periods of manual work, we can say that we have an
acceptable solution with a well known calculated risk.
What we must ensure is that the user does not have a way
to come up with a generic way to extract document keys.
For example, if the user knows (after analysing the Hep system) that the key is always stored at a certain position in the
memory, then he can easily write a program to dump this
memory position. Possible solutions to this problem might
include the allocation of a large memory area where the
keys are stored at a random position or even fragmenting
them and storing them in pieces in different positions.
Another calculated risk we take in the Hep approach is
the fact that a user might be able to program a fake platform
imitating the functionality of Hep. However, we can assume that the effort to write this program will be great
enough to discourage such approach.
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
8
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
6.
Other content encapsulation approaches
Similar with the MEIDA approaches have been taken by
different companies and among the major, we find IBM’s
cryptographic envelopes, Cryptolope [4] [5], InterTrust’s
digital box, DigiBox [15], SoftLock of SoftLock Inc.[20],
SoftSEAL [7][22] of Breaker Technologies Ltd., and
Folio4 products of OpenMarket Inc. [21].
Cryptolope is a Java-based software relying on three
components. First, the Cryptolope Builder can be thought
of as a packaging tool allowing to build the cryptographic
envelope holding both the content and the business rules for
its use. This tool is basically used by content providers. The
second component which is intended to be used by information consumers, the Cryptolope Player is the interpreter
for accessing the Cryptolope content. It uses a trusted
HTML viewer and interacts with the Cryptolope Clearing
Center, which is the third component of the architecture. It
is basically a trusted third party providing key management, payment system and event logging / usage metering.
The major problem faced with their approach was that it
was a closed proprietary system. Users are forced to use
IBM’s InfoMarket infrastructure for the clearing center acting as a trusted third party thus binding them to IBM. This
is probably the reason Cryptolope has not encountered the
anticipated success.
The DigiBox technology (by analogy to the idea of a
digital box) is probably the leader in the field currently.
This technology developed by STAR Lab (Strategic Technologies and Architectural Research Laboratory) is also a
secure content wrapper technology which is the foundation
of a commercial product, Commerce 1.0 and Enterprise 1.0,
of InterTrust Technologies Corp.
In the DigiBox approach the content is called properties
and the policies defining their usage is called controls. A
DigiBox can hold one or many properties as arbitrary data.
The controls can be delivered in the same DigiBox or independently in a separate DigiBox. Controls are linked to
properties by cryptographic means.
In a DigiBox, high level elements such as headers and
general information are encrypted with a transport key.
Properties are encrypted with other keys which can be delivered separately if needed. The transport key is composed
of two parts. One of which is included in the digibox and
will be combined (XOR) with another one stored locally in
protected storage where the DigiBox is to be opened. The
part included in the DigiBox is encrypted with a public key
algorithm. The main advantage of this is that it protects
against the threat of having either of the keys compromised.
However this approach requires distribution the keys
among the participating parties (i.e., key management).
Moreover it requires secure storage on every host which is
called an InterRights Point. The cryptographic algorithms
used are Triple DES and RSA and integrity verification is
done with a cryptographic hash function.
SoftLock of SoftLock Services Inc. is a password-based
locking mechanism for software and documents. SoftLock’s technology ensures that the password which unlocks a particular product in one context differs from the
password which will unlock the same product in another
context. This is done by a proprietary scheme that generates
a SoftLock ID based upon the context in which the document is used.
SoftSEAL of Breaker Technologies Ltd. is a software
toolkit for intellectual property protection and licensing
services to Internet providers. With the SoftSEAL system,
the vendor seals his product into a secure wrapper and associates it with a product code, which eventually defines
the licensing type. The same product must be sealed and associated with different product codes in order to provide it
with a different licensing schema. Feature codes, associate
with a set of capabilities to a product code providing different access levels to the underlying product. When the customer downloads the Web page containing the sealed component, his browser should be able to recognize, handle the
cryptographic wrapper and “display” the content. This is
done by using browser plug-ins, which are either developed
by the content provider or are the general purpose ones provided by Breaker Technologies Ltd. The plug-in will contact, via the internet, the purchasing/licence servers, where
the user will identify himself and obtain, transparently, the
stored license for opening the wrapper and viewing the content. Since the license is associated with the user and stored
in the purchasing/licence server, the wrapped product can
be superdistributed to other users.
Folio products of Open Market Inc. provides a set of
tools for internet based payment, content management and
publishing. The SecurePublish product provides an enterprise solution for rights control and usage metering within
an organization’s intranet. The operation of SecurePublish
is based on the Rights Administration, a system for securing and managing protected content for a local environment.
7.
Conclusion
The rapid expansion of the Internet has boosted the trading of digital intangible goods. However the rules and conditions of this trade are not yet well understood. The existing models used for the trading of tangible goods need to be
adapted to the new digital trading world. In this paper we
presented how the trading of intangible goods, and specifically digital documents, can be viewed as similar to the
trading of tangible goods, by defining the notions of similarity. Furthermore we presented how the requirements of
this view are translated to functional requirements for the
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
9
Proceedings of the 33rd Hawaii International Conference on System Sciences - 2000
design of a commercialization platform. Based on these requirements we designed and implemented Hep, a platform
aiming at the commercialization of digital documents under
similar conditions as printed document.
One of the major issues in the commercialization of digital documents is the protection of the intellectual rights of
the document owner. We do not claim that the Hep platform
provides 100% security of the owner’s intellectual rights,
but that the effort to break it exceeds the available resources
of the user. Someone with enough power will always be
able to break the security. The real question is not how to
achieve absolute security, but where do we stop; that is, at
which level of difficulty for breaking the security schema.
If we accept that an effort of 12 months, for example, is acceptable for breaking the security of Hep then we can design the document agents and platform accordingly. If we
also foresee that future PCs will have crypto chips and possibly copyright chips incorporated at the hardware level,
then we can improve the security protection by incorporating their functionality in the Hep platform.
Nevertheless as the protection of intellectual rights cannot be achieved only with technological means, in the same
way it cannot be also achieved with strict regulatory means.
Technology and legislation (law and public policy) should
be combined to provide a consistent environment protecting the efficiently the trade of intangible goods.
[7] Rainer Mauth, “Better Copyright Protection”, BYTE Magazine, May 1998, pp. 5-6.
References
[14] Vassilis Prevelakis, Dimitri Konstantas and Jean-Henry Morin, “Issues for the Commercial Distribution of Electronic
Documents”, in Communications and Multimedia Security,
Sokratis Katsikas (Ed.), Vol 3, Chapman & Hall, 1996.
[1] J. Baumann, F. Hohl, K. Rothermel, M. Schwehm, M.
Straßer, “Mole 3.0: A Middleware for Java-Based Mobile
Software Agents“, in Proceedings of Middleware'98, Chapman & Hall, 1998.
[2] Christian Collberg and Clark Thomborson, “Software Watermarking: Models and Dynamic Embeddings”, proceedings of
the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Langauges, San Antonio, Texas, January 20-22, 1999.
[3] Cox B. (1996), “Superdistribution Objects as Property on the
Electronic Frontier”, Addison-Wesley.
[4] Kaplan M.A., “IBM CryptolopesTM, SuperDistribution and
Digital Rights Management”, IBM Corporation, December
1996, http://www.research.ibm.com/people/k/kaplan
[5] Kohl U., Lotspiech J. and Kaplan A., 1997, “Safeguarding
Digital Library Contents and Users Protecting Documents
Rather Than Channels”, IBM Research Division San Jose,
California, and Hawthorne, New York, D-Lib Magazine,
September 1997, http://www.dlib.org/dlib/september97/
ibm/09lotspiech.html
[6] Dimitri Konstantas, Jean-Henry Morin and Jan Vitek, “MEDIA : A Platform for the Commercialization of Electronic
Documents”, in Object Applications, Ed. D. Tsichritzis, CUI,
University of Geneva, August 1996.
[8] Jean-Henry Morin and Dimitri Konstantas, “Towards Hypermedia Electronic Publishing”, Proceedings of second IASTED/ISMM International Conference on Distributed Multimedia Systems and Applications, Stanford, California, August
7-9 1995.
[9] Jean-Henry Morin, “Requirements for a Hypermedia Electronic-Newspaper Environment Based on Agents”, in Objects at Large, D. Tsichritzis (Ed.), Centre Universitaire d'Informatique, University of Geneva, July 1997, pp. 177-193.
[10] Jean-Henry Morin, “HyperNews: a Hypermedia ElectronicNewspaper Environment Based on Agents”, in Proceedings
of HICSS-31, Hawaii International Conference On System
Sciences, IEEE 1998, January 6-9, 1998, Kona, Hawaii, Volume II, pp 58-67.
[11] Jean-Henry Morin and Dimitri Konstantas, “HyperNews: A
MEDIA Application for the Commercialization of an Electronic Newspaper“, in Proceedings of SAC’98, 1998 ACM
Symposium on Applied Computing, Atlanta, Georgia, February 27 - March 1, 1998, pp. 696-705.
[12] Jean-Henry Morin, “Commercial Electronic Publishing over
Open Networks: A Global Approach Based on Mobile Objects (Agents)”, PhD Thesis, University of Geneva, Faculty
of Social and Economic Science, Departmant of Information
Systems, March 1999.
[13] Jean-Henry Morin and Dimitri Konstantas, “Commercialization of Electronic Information”, to appear in forthcoming issue of the Journal of End User Computing.
[15] O. Sibert, D. Bernstein and D. Van Wie, “The DigiBox: A
Self-Protecting Container for Information Commerce”, proceedings of First USENIX Workshop on Electronic Commerce, New-York, July 11-12, 1995.
[16] Markus Strasser, Joachim Baumann and Fritz Hohl, “Mole A Java Based Mobile Agent System”, Second ECOOP Workshop on Mobile Object Systems, University of Linz, July 89, 1996.
[17] Jan Vitek, Ciaran Bryce and Walter Binder, ‘‘Designing JavaSeal or How to Make Java Safe for Agents”, in Electronic
Commerce Objects, D. Tsichritzis (Ed.), Centre Universitaire
d’Informatique, University of Geneva, July 1998, p. 105.
[18] Jan Vitek and Giuseppe Castagna, “Towards a Calculus of
Secure Mobile Computations”, IEEE Workshop on Internet
Programming Languages, Chicago, Illinois, May 1998.
[19] IBM 4758 PCI Cryptographic Coprocessor, http://
www.ibm.com/security/cryptocards/index.html
[20] Softlock Services Inc., SoftLock, http://www.softlock.com/
[21] Open Market Inc., Folio 4, http://www.folio.com/
[22] SoftSEAL : Technical Briefing, Breaker Technologies, http:/
/www.breakertech.com/breaker/docs.html
0-7695-0493-0/00 $10.00 (c) 2000 IEEE
10