A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network
DOI:
https://doi.org/10.13052/jwe1540-9589.21411Keywords:
Theme/Background/Signal Music, Monitoring, Blockchain, Encryption/Decryption, Music Usage HistoryAbstract
The theme, background, and signal music usage history information consists of general information such as music information, platform information, and music usage information, and sensitive information such as rights management information, music usage permission range, and contract information. If sensitive information among these is disclosed, disputes such as trade secrets and infringement of personal information protection between companies or between companies and individuals may arise.
We propose a selective encryption/decryption method to secure the confidentiality, integrity, reliability and non-repudiation of sensitive music usage history information used in the theme, background, and signal music blockchain environment. In the proposed method, a monitoring company encrypts sensitive information using a secret key for usage history information, which is combined with general information, and digitally signs it using a private key to register it in a block. A trust group can view and access the information at the time of inquiry by verifying the digital signature with the public key of the monitoring company and then can decrypt the sensitive information using the private key.
Downloads
References
E. S. Hwang, “Have you ever heard the word ‘TBS’,” Chosunpub, 2016.
B. G. Kim, “Suggestions for creating a sustainable K-pop industry ecosystem,” KOFICE, May, 2019.
H. G. Kim, “It’s noisy when money comes in for beautiful music,” Sisa Journal, Vol. 931, 2015.
K. Y. Bang, K. B. Nam, K, Y. Jung and K. S. Han “A Study of Music Copyrights System by the Monitoring of Music on Broadcasting (Fingerpring Technology Centrally),” Journal of The Korea Society of Information Technology Policy & Management, Vol. 7, No. 3, pp. 13–17, 2015.
Y. M. Kim, B. C. Park, K. S. Bang and S. Y. Kim, “A Method of Generating Theme, Background and Signal Music Usage Monitoring Information Based on Blockchain,” Journal of The Korea Society of Computer and Information, Vol. 26, No. 2, pp. 45–52, 2021.
Y. M. Kim, B. C. Park, S. Y. Jang and S. Y. Kim, “A Method of Generating Theme, Background and Signal Music Usage Monitoring Information Based on Blockchain,” Journal of Semiconductor & Display Technology, Vol. 20, No. 1, 2021.
S. H. Han, “[Friendly IP] “Who has ownership of works that are suitable for external parties?”,” BIZ WORLD, 2020.
K. N. Lee and G. H. Jeon, “A Study on Improvement of Used-goods Market Platform Using Blockchain,” Journal of Digital Convergence, Vol. 16, No. 9, pp. 133–145, 2018.
J. S. Park and S. U. Shin, “Analysis of Blockchain Platforms from the Viewpoint of Privacy Protection,” Journal of Internet Computing and Services, Vol. 20, No. 6, pp. 105–117, 2019.
E. Androulaki, C. Cachin, C. Ferris, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi and C. Stathakopoulou, “Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,” EuroSys ’18: Proceedings of the Thirteenth EuroSys Conference, No. 30, pp. 1–15, 2018.
I. D. Yoo, W. S. Lee, H. J. Kim, S. Y. Jin and S. H. Jo “Blockchain Technology and Utilization Schemes in Tactical Communication Network,” Journal of The Korea Society of Computer and Information, Vol. 23, No. 12, pp. 49–55, 2018.
Hua Li, Jianzhou Li, “A new compact dual-core architecture for AES encryption and decryption,” Electrical and Computer Engineering, Canadian Journal of Vol. 33, pp. 209–213, 2008.
Don Johnson, Alfred Menezes and Scott Vanstone, ”The Elliptic Curve Digital Signature Algorithm(ECDSA),” International Journal of Information Security, Vol. 1, No. 1, pp. 36–63, 2001.
Y. A. Min and Y. T. Baek “A Study on the Application of Block Chain Ethereum Technology to Activate Digital Contents Trading as Sharing economy – data encryption and modify merkle tree-,” Journal of The Korea Society of Computer and Information, Vol. 23, No. 10, pp. 73–80, 2018.
E. G. Jang, “User Authentication Technology Using Multi-Blocks in the Cloud Computing Environment,” Journal of the Korea Society of Computer and Information, Vol. 25, No. 11, pp. 139–146, 2020.
TTAK.OT-10.0334, “Metadata Elements of Copyright Transfer Information on Digital Music Contents,” 2012.