Title
Game-theoretic analyses and simulations of adoptions of security policies for DRM in contents sharing scenario
Abstract
A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefits of two stakeholders, which are DRM Providers and contents Sharer who is a category of consumers. A dynamic and mixed game and its algorithm were proposed, where Sharer's strategies were whether to employ the trusted computing enabling devices and related components or not, as well as Providers' strategies included entirely general security, entirely enhanced security and dynamic security policies. We concluded from both game-theoretic analyses and Swarm simulation experiments that the number of acquired sharable digital rights and security cost have a direct effect on Sharer's choices of the enhanced security policy, and also their different basic sharing modes including partial, modest and extensive sharing, further influence the choice of Providers. Besides, with respect to the mixed sharing mode far more similar to a real contents sharing scenario, Dynamic security strategy is superior to the entirely enhanced security in the context of limited sharable rights and higher security costs, but with the acquisition of much more rights and the decrease of enhanced security overhead, the latter strategy would be optimal and stable as a Nash Equilibrium for stakeholders, in combination with the exploitation of effective business models of contents industry. © 2011, TSI ® Press.
Year
DOI
Venue
2011
null
Intelligent Automation & Soft Computing
Field
DocType
Volume
Internet privacy,Trusted Computing,Swarm behaviour,Computer science,Computer security,Cloud computing security,Digital rights,Game theory,Security policy,Computer security model,Digital rights management
Journal
17
Issue
ISSN
Citations 
2
null
1
PageRank 
References 
Authors
0.35
5
4
Name
Order
Citations
PageRank
Zhiyong Zhang116418.42
qingqi pei224647.95
Jianfeng Ma334040.21
Lin Yang410.35