Research Article
BibTex RIS Cite

A Novel Model for E-Book Borrowing Management System

Year 2018, Volume: 6 Issue: 3, 49 - 57, 30.09.2018
https://doi.org/10.21541/apjes.347154

Abstract



In today's information-age
world, most libraries use traditional borrowing methods. These conventional
methods have some disadvantages such as torn and loss of books, and no access
to books at that moment. In this paper, to overcome such disadvantages, we
propose a novel e-book borrowing mechanism considering digital rights
management. By combining the techniques given in this paper, e-books are
protected against copying, distributing, printing and unauthorized use while
borrowing and using.

An infrastructure is designed
for users to access books through electronic devices. In this structure,
e-books are user-specific encrypted. Even if the e-book files are copied by
unauthorized users, the key cannot be accessed by the copied device since the
target platform doesn’t have this key. Thus, the borrowed book is prevented
from being used by an unauthorized user. Then, the borrowed books can be
checked via cloud system technologies by sharing resources between devices.
Moreover, even if the books are copied and distributed, the malicious user can
be found via watermarking. The main difference to the previous studies is that
QR code authentication, which is generated by public key cryptographic
techniques, enables the use of books on different devices.



References

  • [1] Karakaya, A., Erzurumlu, K., Kılıç, E. 2016. "A Novel Offline Borrowing System for Book Transformed from Printed Book to E-Book in Libraries". Ponte International Scientific Researches Journal, 72(4). [2] Verslype, K., Decker, B. D. 2006. "A Flexible and Open DRM Framework", International Federation for Information Processing, 173-184. [3] http://windows.microsoft.com/tr-tr/windows-vista/what-is-the-trustedplatform-module-security-hardware (Access Time: 12.05.2016). [4] Alipour-Hafezi, M. 2016. "E-lending in digital libraries: a systematic review". Iranian Research Institute for Information Science and Technology (IRANDOC), Interlending & Document Suply, 44(3), 108-114. [5] https://openlibrary.org/help/faq/about (Access Time: 04.08.2016). [6] Torres, V., Delgado, J., Llorente, S. 2006. "An Implementation of a Trusted and Secure DRM Architecture". R. Meersman, Z. Tari, P. Herrero (Eds.), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops – OTM Confederated International Workshops and Posters, 4277, 312-321. Springer, Heidelberg, Germany. [7] Chen, H. Y., Wang, H. A., Lin, C. L. 2007. "Using Watermarks and Offline DRM to Protect Digital Images in DIAS". L. Kovács, N. Fuhr, C. Meghini (Eds.), European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2007), 4675, 529-531. Springer, Heidelberg, Germany. [8] https://www.oclc.org/support/training/portfolios/resource-sharing/worldshareill.en.html (Access Time: 04.08.2016). [9] Yang, L., Nenghai, Y., Zhuo, H. 2009. "Rights Sharing Scheme for Online DRM System Using Digital Ticket". International Conference on Management and Service Science (MASS 2009), 1-6, doi: 10.1109/ICMSS.2009.5304788. IEEE. [10] Mampaey, M., Villegas, Á. N. 2012. "A Network-Centric DRM for Online Scenarios". Bell Labs Technical Journal, 17(3), 129-133. [11] http://www.amazon.com/gp/help/customer/display.html/?nodeId=200747550 (Access Time: 04.08.2016). [12] http://www.locklizard.com/digital_rights_management_products/ (Access Time: 04.08.2016). [13] Kozakiewicz, A., Lasota, K. 2015. "Secure DRM mechanism for offline applications". Military Communications and Information Systems (ICMCIS), 2015 International Conference on, Cracow, 1-8. [14] https://www.drumlinsecurity.com/ (Access Time: 04.08.2016). [15] Snodgrass, R. J., Slezak, J. C., Goldberg, M. E., Leproust, J., Jeulin, G., Antony, F. F. 2014. "Ebook encryption using variable keys". U.S. Patent No. 8,826,036. Washington, DC: U.S. Patent and Trademark Office.

A Novel Model for E-Book Borrowing Management System

Year 2018, Volume: 6 Issue: 3, 49 - 57, 30.09.2018
https://doi.org/10.21541/apjes.347154

Abstract

In today's information-age world, most libraries use traditional borrowing methods. These conventional methods have some disadvantages such as torn and loss of books, and no access to books at that moment. In this paper, to overcome such disadvantages, we propose a novel e-book borrowing mechanism considering digital rights management. By combining the techniques given in this paper, e-books are protected against copying, distributing, printing and unauthorized use while borrowing and using.

An infrastructure is designed for users to access books through electronic devices. In this structure, e-books are user-specific encrypted. Even if the e-book files are copied by unauthorized users, the key cannot be accessed by the copied device since the target platform doesn’t have this key. Thus, the borrowed book is prevented from being used by an unauthorized user. Then, the borrowed books can be checked via cloud system technologies by sharing resources between devices. Moreover, even if the books are copied and distributed, the malicious user can be found via watermarking. The main difference to the previous studies is that QR code authentication, which is generated by public key cryptographic techniques, enables the use of books on different devices.

References

  • [1] Karakaya, A., Erzurumlu, K., Kılıç, E. 2016. "A Novel Offline Borrowing System for Book Transformed from Printed Book to E-Book in Libraries". Ponte International Scientific Researches Journal, 72(4). [2] Verslype, K., Decker, B. D. 2006. "A Flexible and Open DRM Framework", International Federation for Information Processing, 173-184. [3] http://windows.microsoft.com/tr-tr/windows-vista/what-is-the-trustedplatform-module-security-hardware (Access Time: 12.05.2016). [4] Alipour-Hafezi, M. 2016. "E-lending in digital libraries: a systematic review". Iranian Research Institute for Information Science and Technology (IRANDOC), Interlending & Document Suply, 44(3), 108-114. [5] https://openlibrary.org/help/faq/about (Access Time: 04.08.2016). [6] Torres, V., Delgado, J., Llorente, S. 2006. "An Implementation of a Trusted and Secure DRM Architecture". R. Meersman, Z. Tari, P. Herrero (Eds.), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops – OTM Confederated International Workshops and Posters, 4277, 312-321. Springer, Heidelberg, Germany. [7] Chen, H. Y., Wang, H. A., Lin, C. L. 2007. "Using Watermarks and Offline DRM to Protect Digital Images in DIAS". L. Kovács, N. Fuhr, C. Meghini (Eds.), European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2007), 4675, 529-531. Springer, Heidelberg, Germany. [8] https://www.oclc.org/support/training/portfolios/resource-sharing/worldshareill.en.html (Access Time: 04.08.2016). [9] Yang, L., Nenghai, Y., Zhuo, H. 2009. "Rights Sharing Scheme for Online DRM System Using Digital Ticket". International Conference on Management and Service Science (MASS 2009), 1-6, doi: 10.1109/ICMSS.2009.5304788. IEEE. [10] Mampaey, M., Villegas, Á. N. 2012. "A Network-Centric DRM for Online Scenarios". Bell Labs Technical Journal, 17(3), 129-133. [11] http://www.amazon.com/gp/help/customer/display.html/?nodeId=200747550 (Access Time: 04.08.2016). [12] http://www.locklizard.com/digital_rights_management_products/ (Access Time: 04.08.2016). [13] Kozakiewicz, A., Lasota, K. 2015. "Secure DRM mechanism for offline applications". Military Communications and Information Systems (ICMCIS), 2015 International Conference on, Cracow, 1-8. [14] https://www.drumlinsecurity.com/ (Access Time: 04.08.2016). [15] Snodgrass, R. J., Slezak, J. C., Goldberg, M. E., Leproust, J., Jeulin, G., Antony, F. F. 2014. "Ebook encryption using variable keys". U.S. Patent No. 8,826,036. Washington, DC: U.S. Patent and Trademark Office.
There are 1 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Aykut Karakaya

Sedat Akleylek

Kerem Erzurumlu

Erdal Kılıç

Publication Date September 30, 2018
Submission Date October 27, 2017
Published in Issue Year 2018 Volume: 6 Issue: 3

Cite

IEEE A. Karakaya, S. Akleylek, K. Erzurumlu, and E. Kılıç, “A Novel Model for E-Book Borrowing Management System”, APJES, vol. 6, no. 3, pp. 49–57, 2018, doi: 10.21541/apjes.347154.