TY - JOUR T1 - A Novel Model for E-Book Borrowing Management System TT - A Novel Model for E-Book Borrowing Management System AU - Karakaya, Aykut AU - Akleylek, Sedat AU - Erzurumlu, Kerem AU - Kılıç, Erdal PY - 2018 DA - September DO - 10.21541/apjes.347154 JF - Academic Platform - Journal of Engineering and Science JO - APJES PB - Akademik Perspektif Derneği WT - DergiPark SN - 2147-4575 SP - 49 EP - 57 VL - 6 IS - 3 LA - en AB - In today's information-ageworld, most libraries use traditional borrowing methods. These conventionalmethods have some disadvantages such as torn and loss of books, and no accessto books at that moment. In this paper, to overcome such disadvantages, wepropose a novel e-book borrowing mechanism considering digital rightsmanagement. By combining the techniques given in this paper, e-books areprotected against copying, distributing, printing and unauthorized use whileborrowing and using.An infrastructure is designedfor users to access books through electronic devices. In this structure,e-books are user-specific encrypted. Even if the e-book files are copied byunauthorized users, the key cannot be accessed by the copied device since thetarget platform doesn’t have this key. Thus, the borrowed book is preventedfrom being used by an unauthorized user. Then, the borrowed books can bechecked via cloud system technologies by sharing resources between devices.Moreover, even if the books are copied and distributed, the malicious user canbe found via watermarking. The main difference to the previous studies is thatQR code authentication, which is generated by public key cryptographictechniques, enables the use of books on different devices. KW - E-Book KW - Borrowing System KW - Library KW - Digital Rights Management Software KW - E-Book Security N2 - In today's information-age world, most libraries use traditional borrowing methods. These conventional methods have some disadvantages such as torn and loss of books, and no access to books at that moment. In this paper, to overcome such disadvantages, we propose a novel e-book borrowing mechanism considering digital rights management. By combining the techniques given in this paper, e-books are protected against copying, distributing, printing and unauthorized use while borrowing and using.An infrastructure is designed for users to access books through electronic devices. In this structure, e-books are user-specific encrypted. Even if the e-book files are copied by unauthorized users, the key cannot be accessed by the copied device since the target platform doesn’t have this key. Thus, the borrowed book is prevented from being used by an unauthorized user. Then, the borrowed books can be checked via cloud system technologies by sharing resources between devices. Moreover, even if the books are copied and distributed, the malicious user can be found via watermarking. The main difference to the previous studies is that QR code authentication, which is generated by public key cryptographic techniques, enables the use of books on different devices. CR - [1] Karakaya, A., Erzurumlu, K., Kılıç, E. 2016. "A Novel Offline Borrowing System for Book Transformed from Printed Book to E-Book in Libraries". Ponte International Scientific Researches Journal, 72(4). [2] Verslype, K., Decker, B. D. 2006. "A Flexible and Open DRM Framework", International Federation for Information Processing, 173-184. [3] http://windows.microsoft.com/tr-tr/windows-vista/what-is-the-trustedplatform-module-security-hardware (Access Time: 12.05.2016). [4] Alipour-Hafezi, M. 2016. "E-lending in digital libraries: a systematic review". Iranian Research Institute for Information Science and Technology (IRANDOC), Interlending & Document Suply, 44(3), 108-114. [5] https://openlibrary.org/help/faq/about (Access Time: 04.08.2016). [6] Torres, V., Delgado, J., Llorente, S. 2006. "An Implementation of a Trusted and Secure DRM Architecture". R. Meersman, Z. Tari, P. Herrero (Eds.), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops – OTM Confederated International Workshops and Posters, 4277, 312-321. Springer, Heidelberg, Germany. [7] Chen, H. Y., Wang, H. A., Lin, C. L. 2007. "Using Watermarks and Offline DRM to Protect Digital Images in DIAS". L. Kovács, N. Fuhr, C. Meghini (Eds.), European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2007), 4675, 529-531. Springer, Heidelberg, Germany. [8] https://www.oclc.org/support/training/portfolios/resource-sharing/worldshareill.en.html (Access Time: 04.08.2016). [9] Yang, L., Nenghai, Y., Zhuo, H. 2009. "Rights Sharing Scheme for Online DRM System Using Digital Ticket". International Conference on Management and Service Science (MASS 2009), 1-6, doi: 10.1109/ICMSS.2009.5304788. IEEE. [10] Mampaey, M., Villegas, Á. N. 2012. "A Network-Centric DRM for Online Scenarios". Bell Labs Technical Journal, 17(3), 129-133. [11] http://www.amazon.com/gp/help/customer/display.html/?nodeId=200747550 (Access Time: 04.08.2016). [12] http://www.locklizard.com/digital_rights_management_products/ (Access Time: 04.08.2016). [13] Kozakiewicz, A., Lasota, K. 2015. "Secure DRM mechanism for offline applications". Military Communications and Information Systems (ICMCIS), 2015 International Conference on, Cracow, 1-8. [14] https://www.drumlinsecurity.com/ (Access Time: 04.08.2016). [15] Snodgrass, R. J., Slezak, J. C., Goldberg, M. E., Leproust, J., Jeulin, G., Antony, F. F. 2014. "Ebook encryption using variable keys". U.S. Patent No. 8,826,036. Washington, DC: U.S. Patent and Trademark Office. UR - https://doi.org/10.21541/apjes.347154 L1 - https://dergipark.org.tr/en/download/article-file/535070 ER -