A Novel Model for E-Book Borrowing Management System

A Novel Model for E-Book Borrowing Management System

In today's information-age world, most libraries use traditional borrowing methods. These conventional methods have some disadvantages such as torn and loss of books, and no access to books at that moment. In this paper, to overcome such disadvantages, we propose a novel e-book borrowing mechanism considering digital rights management. By combining the techniques given in this paper, e-books are protected against copying, distributing, printing and unauthorized use while borrowing and using. An infrastructure is designed for users to access books through electronic devices. In this structure, e-books are user-specific encrypted. Even if the e-book files are copied by unauthorized users, the key cannot be accessed by the copied device since the target platform doesn’t have this key. Thus, the borrowed book is prevented from being used by an unauthorized user. Then, the borrowed books can be checked via cloud system technologies by sharing resources between devices. Moreover, even if the books are copied and distributed, the malicious user can be found via watermarking. The main difference to the previous studies is that QR code authentication, which is generated by public key cryptographic techniques, enables the use of books on different devices.

___

  • [1].A. Karakaya, K. Erzurumlu, E. Kılıç, 2016. "A Novel Offline Borrowing System for Book Transformed from Printed Book to E-Book in Libraries". Ponte International Scientific Researches Journal, 72(4).
  • [2].K. Verslype, B. D. Decker, 2006. "A Flexible and Open DRM Framework", International Federation for Information Processing, 173-184.
  • [3].T. Morris, 2011. "Trusted Platform Moldule", Encyclopedia of Cryptography and Security, Springer US, 1332-1335.
  • [4].M. Alipour-Hafezi, 2016. "E-lending in digital libraries: a systematic review". Iranian Research Institute for Information Science and Technology (IRANDOC), Interlending & Document Suply, 44(3), 108-114.
  • [5].https://www.adobe.com/tr/solutions/ebook/digitaleditions.html (Access Time: 23.04.2018).
  • [6].V. Torres, J. Delgado, S. Llorente, 2006. "An Implementation of a Trusted and Secure DRM Architecture". R. Meersman, Z. Tari, P. Herrero (Eds.), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops – OTM Confederated International Workshops and Posters, 4277, 312-321. Springer, Heidelberg, Germany.
  • [7].H. Y. Chen, H. A. Wang, C. L. Lin, 2007. "Using Watermarks and Offline DRM to Protect Digital Images in DIAS". L. Kovács, N. Fuhr, C. Meghini (Eds.), European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2007), 4675, 529-531. Springer, Heidelberg, Germany.
  • [8].https://help.oclc.org/Discovery_and_Reference/WorldC at_Discovery/Search_in_WorldCat_Discovery/050Use_the _Advanced_Search_screen (Access Time: 23.04.2018).
  • [9].L. Yang, Y. Nenghai, H. Zhuo, 2009. "Rights Sharing Scheme for Online DRM System Using Digital Ticket". International Conference on Management and Service Science (MASS 2009), 1-6, doi: 10.1109/ICMSS.2009.5304788. IEEE.
  • [10]. M. Mampaey, A. N. Villegas, 2012. "A NetworkCentric DRM for Online Scenarios". Bell Labs Technical Journal, 17(3), 129-133.
  • [11]. https://docs.aws.amazon.com/elastictranscoder/late st/developerguide/drm.html (Access Time: 23.04.2018).https://www.locklizard.com/pdf_security/ (Access Time: 23.04.2018).
  • [12]. A. Kozakiewicz, K. Lasota, 2015. "Secure DRM mechanism for offline applications". Military Communications and Information Systems (ICMCIS), 2015 International Conference on, Cracow, 1-8.
  • [13]. Drumlin Security, Service Features Comparisons. https://www.drumlinsecurity.com/ServiceComparison.pdf (Access Time: 23.04.2018).
  • [14]. R. J. Snodgrass, J. C. Slezak, M. E. Goldberg, J. Leproust, G. Jeulin, F. F. Antony, 2014. "Ebook encryption using variable keys". U.S. Patent No. 8,826,036. Washington, DC: U.S. Patent and Trademark Office.