Digital Copyright Management Strategy of Digital Library Based on Blockchain Technology

Yufang Xiao1, Ruifang Xiao2, Congcong Zhu3, Shengfei Wei4
1Discipline Construction & Graduate Education Department, Weifang University, Weifang 261061, China
2Library, Shandong Second Medical University, Weifang 261042, China
3School of Computer Engineering, Weifang University, Weifang 261061, China
4School of Economics & Management, Shandong Youth University of Political Science, Jinan 250103, China

Abstract

Using blockchain technology to handle the entire chain of digital copyrights in digital libraries not only helps to improve the economy, validity, and fairness of the libraries’ digital resource offerings, but it also increases the revenue of digital copyright subjects in a sustainable manner. In this work, a decentralized, secure, and traceable digital copyright transaction system is designed and implemented using blockchain technology. The system serves creators, administrators, and subscribers through its user layer, business model layer, and Fabric network layer. To guarantee the accuracy and integrity of transaction data, smart contracts are used for the registration of digital works, transaction supervision, and smart contract execution. Fabric Composer is used in the development of the system and offers good scalability. The system still has issues with privacy protection, increasing performance, and complying with laws and regulations. It is anticipated that the digital copyright transaction system will advance in the area of digital copyright protection as blockchain technology develops.

Keywords: Digital copyright, Blockchain, Digital library, Management strategy

1. Introduction

The increasing distribution and sharing of digital works, whilst offering enormous convenience to the diffusion of culture and information, has at the same time sparked an urgent need for digital copyright protection [1]. Conventional digital copyright management systems are frequently run by centralized organizations, making them susceptible to data manipulation and single points of failure. Additionally, these organizations struggle to meet the demands of consumers and authors of digital works for safe and open transactions [2]. Building a digital copyright transaction system with a high level of decentralization, transparency, and security is therefore especially necessary.

Blockchain technology’s novel features make it the perfect solution for issues relating to digital copyright [3]. First off, because it is decentralized, there is no longer a need for conventional centralized management organizations. Additionally, because authors and users engage directly in digital copyright transactions, the complexity of intermediary links is reduced. When digital copyright information is maintained on the blockchain, it is difficult to be deliberately tampered with, offering a strong guarantee for copyright information. Secondly, the distributed ledger mechanism of the blockchain assures data security and tamperability [4]. Furthermore, since each transaction is documented on the blockchain, the traceability of transaction data offers a strong foundation for resolving disputes. Because of this, the digital copyright transaction system that this study built has a well-defined hierarchical structure. The user layer, which is separated into three user categories—creators, administrators, and subscribers—offers service interfaces for managing users and copyright [5, 6, 7]. By using smart contracts to specify the data structure and operational features of the digital copyright trading system, the business model layer ensures the security and openness of the trading data.By building a decentralized communication network by connecting the middle layer and the underlying layer via the Connection Profile file, the Fabric network layer acts as the foundational infrastructure. The construction of business models and the generation of interfaces are finished by Fabric Composer and composer-rest-server, through which users can accomplish the operations of digital copyright registration, transfer and subscription. Because every user action would be documented on the blockchain, the transaction will be traceable and secure [7, 8].

Though it has advanced significantly in many areas, the digital copyright trading system outlined in this study still confronts a number of difficulties. First off, protecting user privacy while maintaining transparency has always been a challenging topic in the realm of digital copyright protection, and more research is needed in this area [9]. Second, there is still concern about the system’s performance scalability, as more users and transactions could put a strain on the system’s capacity. Lastly, another urgent concern for the digital copyright trading system is the enforcement of laws and regulations. More thorough study is needed to determine how to integrate blockchain technology with existing legal frameworks to guarantee the system’s compliance and legitimacy.

All things considered, this paper’s blockchain-based digital copyright trading system offers a novel concept and remedy for digital copyright protection. Nonetheless, given the ongoing advancements in both technology and society, interdisciplinary research and multipronged approaches are still necessary to solve digital copyright issues. The digital copyright trading system based on blockchain is anticipated to become more significant in the field of digital cultural communication in the near future [10, 11].

2.1. System Organization

A blockchain-based digital copyright protection system is one that is built on the blockchain network and offers the benefits of decentralization, safe digital content storage, transaction record traceability, and tamper-proofing [12]. As a result, the new blockchain-based digital copyright transaction system that this study builds is depicted in Figure 1 along with its general architecture.

Figure 1. Copyright Trading System Structure

As shown in Figure 1 that the system is roughly separated into three layers based on the types of functions. The user layer, which is the top layer, is in charge of providing interfaces for user and copyright management services. Examples of these include user registration, login management, key management, personal information modification, and copyright registration, query, transaction, and deregistration interfaces.

The middle layer of digital copyright trading is the business model layer, which is created and implemented by the developers. In this layer, the account book keeps track of every user transaction, and the chain code, also known as a smart contract, specifies the data structure and functional features of the system. To accomplish the relevant business functions, users in the user layer use API+SDK to call the chain code in the business model [13]. The copyrighted transaction information may be tracked down the chain since every transaction is documented in the ledger. This paper’s business model can be installed on the nodes of various users more easily with the help of the Connection Profile, which connects the middle layer and the lowest layer, the Fabric network layer. This creates a decentralized communication network by defining the node information and communication ports.

The users targeted by this system are basically divided into 3 sorts of users: creators, administrators and subscribers.

  1. The original author of the digital product, or creator. In order to manipulate the chain code, deposit the details of the digital work (name, DCI, author, type, and creation time) on the blockchain, and change the DCI through the function interface, he can fill out the form with the DCI code of the digital copyright he applied for. He can also call the SDK and remote API provided by Fabric [14].

  2. Administrators, or the authoritative management group, have the ability to oversee the accounts of subscribers and creators while also publishing new contracts to the chain and removing outdated ones.

  3. The subscriber, who is the most frequent user of the public, has the ability to subscribe to a particular digital work on the chain. Upon calling the remote API and executing the subscription chain code, the subscriber gains the ability to read the digital work on the chain.

Contract code, also known as chaincode, is a technical term used in Hyperledger that is used to implement the system’s core logic. During the system’s first phase, the administrators deploy chaincode to the nodes. The user activates the chain code by logging into the client program and utilizing the remote API functions made available by the business model, after the chain code has been successfully configured, instantiated, and installed on the nodes in these three stages. Every node has a client software installed. Each chain code call log, user addition and deletion transaction records, copyright transfer transaction records, work subscription transaction records, and so forth are all kept in the ledger. The ledger is maintained through the process of keeping these transaction records up to date.

To introduce the transaction procedure of this system, consider publishing a copyright transfer transaction as an example in the following.

  1. After logging in and confirming their identity, the creator of a digital work receives an enrollment certificate (Ecert) and a transaction certificate (Tcert). Subsequently, the user can use the client to initiate a transaction [15].

  2. After logging onto the client successfully, the user drafts a proposal for copyright transfer and distributes it to every endorsing node.

  3. The proposal outcome is sent to the client by the endorsing nodes when they have completed the copyright transfer chain code.

  4. The client gets enough endorsement support and transmits the transaction to the sorting node, which includes the proposal outcome.

  5. A block containing the sequenced transaction is created by the sequencing node and forwarded to every validation node.

  6. Before a transaction is dropped, the validation node constantly conducts a last examination of the transaction from the sorted transaction block structure (including the transaction message structure, signature integrity, whether it is duplicated or not, whether the read and write collection versions match or not, etc.). Following the check, it completes the legal transaction and enters the outcome into the ledger. In addition, it creates a new block, modifies the metadata block within the block, and logs details like the transaction’s legality.

The procedure described above is comparable to publishing copyright subscription transactions, and it won’t be duplicated here. The system’s functions and architecture are covered in great length above. The blockchain-based digital copyright trading system provides the following benefits over traditional copyright management systems:

  1. The blockchain allows authors to preserve their digital copyright data, safeguarding their ownership of their creative creations;

  2. In order to reap financial rewards, creators can assign the copyright to their digital works to other users based on their own pricing. This is accomplished by invoking the copyright transfer chain code on the blockchain, which is transparent and observable throughout the entire fabric network. There won’t be any disagreement over the copyright transfer because the digital works’ copyright is transferred by invoking the copyright transfer chain code on the blockchain, which is visible and observable across the entire Fabric network [16];

  3. Offer a subscription interface for digital works on the chain, allowing regular users to obtain the right to read the digital works by paying a nominal charge to the original creator.

2.2. Description of the Business Model

The three modules of the digital copyright trading system-user, asset, and transaction-are covered in this section’s business model as shown in Figure 2.

Figure 2. Fabric Application-based Transaction Flow
2.2.1. User

Users are divided into three categories: creators, administrators, and normal users (i.e., the original proprietors of digital assets) [17]. User=Uid, userName, email, bal-ance, PK, SK, bookList, Admin=Uid, user Name, email, PK, SK, Author=Uid, userName, email, PK, SK, my BookList are the respective tuples that display their attribute structure design. Describe Person is the user base class; regular users, admin users, and creators are in the User category; PK and SK are the user’s public and private keys; balance is the user’s wallet balance; bookList and myBookList record all of the book information that the user has created or subscribed to. The digital copyright transaction is signed using the private key, which guarantees the accuracy and consistency of the transaction data in the copyright transaction [18]. The creator’s balance will rise and the consumer’s balance will fall when these two transactions occur because, as was previously established, the creator of a digital work might profit financially by transferring the copyright or making the work available.

2.2.2. Asset

The digital copyright work is the system’s asset, and the following tuple represents its attribute structure. Book= dci, name, category, createTime, description, content, owner, price, subscribePrice, subscribers , DigitalWork =dci, name, category, createTime, description, content, owner The digital work’s unique identifier is called dci; the name of the digitally copyrighted work is called name; the work’s classification is called category; the creation time is called createTime; a brief description of the work is called description; content is part of content information; the owner is identified as the owner of the work; the price is identified as the copyright transfer price; and the subscription price is called subscribePrice. The cost of subscribing to the work is called subscribePrice, and the group of all users who have done so is called subscribers.

2.2.3. Transactions

In the blockchain system, each invocation of a smart contract (or chain code) by a user is called a transaction [19]. By contacting the function interface supplied by composer-rest-serve, the user can invoke the contract and carry out the necessary actions. in Algorithms 1,2 and 3 display the primary codes for copyright registration, copyright transfer, and digital content subscription transactions.

Algorithm 1 Main code for Copyright Registration

  1. Initialization of the chain code, installation on the chain, calling the function name through the client, and passing in the packed new Work structure are the prerequisites
  2. function on Register Of Work (Work)
  3. var new Work = work;
  4. retum getAssetRegistry (org whu dci management. Work)
  5. then (function() return getAssetRegistry ( org . whu . dci management Book ));//
  6. Update the ledger and add any new work.

Algorithm 2 Primary Copyright Transfer code

  1. Initialization of the chain code, installation on the chain, and use of the client to call the function name to send in the packaged new Work structure are the prerequisites.
  2. function on Change Owner Of Work(Change Owner Of Work)
  3. var new Owner= ChangeOwnerOfWork.newOwner;
  4. get the assignee of the copyright assignment
  5. var Old Owner= ChangeOwnerOfWork.book. owner;
  6. get the assignor of the copyright transfer
  7. ChangeOwnerOfWork.book. owner=newOwner; var price= ChangeOwnerOfWork. book.
  8. owner=newOwner;
  9. get the assignee of the copyright transfer
  10. var price= ChangeOwnerOfWork. book price;
  11. get the user-defined transfer price in the transfer contract
  12. new Owner. balance= newOwner.balance- price;
  13. deduct the transfer fee from the wallet of the transferred party
  14. old Owner.balance= oldOwner.balance+price;
  15. add the transfer fee to the transferor’s wallet
  16. Update Use rRegistero;
  17. Update the user information in the ledger and this digital copyright information
  18. Update Dci Register(); return 1.

Algorithm 3 Digital Contet Subscription Main Code

  1. Prerequisite: chain code initialization, installed on the chain, the user uses the client to call the function name, pass in the new Work structure packaged
  2. function on SubscribeWork(Subscribe Work)
  3. var subscriber=SubscribeWork.subscriber;
  4. var authorsubscribe Work book.
  5. var author=SubscribeWork.book. owner;
  6. var subscribe Price=Subscribe Work.
  7. var subscribePrice=SubscribeWork.book.subscribe Price;
  8. var subscriber.
  9. subscriber.bookList.push(SubscribeWork.book);
  10. add a new digital work to ’bookshelf’ author.
  11. balance+=subscribePrice;
  12. account wallet amount is increased.
  13. subscriber.balance-=subscribePrice;
  14. subscriber wallet amount decreases
  15. Update Userregister();
  16. update the user information in the ledger and this digital rights information
  17. UpdateDciRegister(); return.

2.3. System Realization

We leverage IBM’s fabric1.0 federation chain project as the development platform and create our own digital copyright protection system to give select users the ability to manage users and edit data. According to the node deployment plan given by the official fabric, install docker and docker compose tool on each node, download the corresponding docker image and fabric source code, compile and generate Cryptogen program, and generate public and private keys and certificates with this program and the relevant crypto-conFigureyaml configuration file.

Two types of certificates are generated here: a user certificate issued by the CA for user login and permission control, and a TLS certificate ready for secure communication between nodes. The Genesis block and the Channel configuration block are then generated using configtxgen. After setting up the necessary files, the fabric container may be used to construct the channel, add peer nodes one at a time, and update the anchor node [20]. The fabric network is prepared in this way. The business chain code should then be installed into the fabric network.

The business model of the system is constructed using fabric composer, and the fabric chaincode supports both JavaScript and Golang. This increases the program’s scalability. Afterwards, remote interfaces for the business model can be created using composer-rest-server, and users can access transaction records, digital copyright records, and other data via these function interfaces. When a user provides asset registration data, other nodes package the transaction record into blocks and record it on the chain. Afterwards, the transaction record is unchangeable once it is there.

3. Discussion

3. A timestamp-based digital copyright registration system is developed. The fundamental element of distributed storage technology is the timestamp, which is essentially a perfectly verifiable string of letters that indicates the precise time node at which a data state changes. Digital libraries with conditions in China should construct a digital copyright registration system based on timestamps to guarantee that digital copyright information realizes real-time display query, using the Tsinghua University Digital Library’s practice of creating digital resources copyright registration database as a model [21]. First, offer a timestamp-based digital copyright confirmation service. For instance, it can work with established blockchain copyright registration platforms like “Huaxin Valley” and “Copyright Home” to provide the digital copyright registration service of “release as deposit,” issue copyright registration certificates with timestamps, and upload digital copyright registration data to the blockchain in real time. A “release-as-deposit” digital copyright registration service is provided by uploading the registration data in real time to the blockchain [22, 23]. Second, to ensure the information security of digital copyright registration, the timestamp traceability function is employed. The “timestamp + dynamic hyperlink” strategy can be used to stop unauthorized access to digital copyright registration information. Digital libraries can track down the source of copyright registration information tampering in real time by using the digital copyright registration platform and dynamic hyperlinks to store and monitor the information marked with timestamps [24].

On the other hand, P2P peer-to-peer network facilitates fair and transparent trades of digital copyright subjects [25].Distributed storage system is based on a peer-to-peer (P2P) network architecture that performs data transaction publicizing, network routing, and mining [26]. P2P networks can be used by digital libraries to support the relative equivalency of their copyright revenue and infringement liability, as well as to reinforce the contractual nature of digital copyright management [27]. First, a peer-to-peer digital copyright transaction mode based on P2P transmission links was established. In the event that the digital library’s resource retrieval system is converted into a P2P network, the embassy can use the P2P Super Ledger to establish the subject of digital copyright infringement responsibility for the first time and calculate the loss of copyright revenue using the P2P rights and interests proof code. The establishment of a knowledge payment system built on a P2P network is the second. For instance, the main interface of the digital library resource retrieval system has an integrated knowledge payment module that directs users to use this module to access value-added services for digital copyright resources. The P2P network will instantly cut off the proliferation channels of digital resources in the event that the library disobeys legal regulations by disseminating unregistered digital materials.

Employing the data encryption feature of smart contracts to firmly stop digital copyright theft The Tsinghua University Digital Library constructs the firewall of smart social services and makes sure that the digital copyright flow path is always supervised by smart contracts by using two primary data encryption algorithms in smart contracts: asymmetric encryption and cryptographic desensitization. Digital libraries should therefore make use of smart contracts’ data encryption feature to safeguard the confidentiality and integrity of digital copyrights. Asymmetric encryption technology is first utilized to strengthen digital copyright defenses against forgery assaults [28]. Both public and private key encryption are available for use by digital libraries to manage digital copyrights: public key encryption can be used to add digital watermarks to copyrights with low security levels, enforce identity verification and access control, and lower the risk of malicious copyright forgeries; private key encryption can be used to grant the copyright owner the ability to independently set up copyright invocation methods and to completely prevent the use of phishing to steal copyright information [6, 7]. Second, the security of digital copyright invocation is improved by the application of encryption and desensitization technologies. The Tsinghua University Digital Library’s digital copyright data contextualization desensitization scheme is one example that can be cited. It uses encryption and desensitization techniques like invalidation, random value replacement, data replacement, offset and rounding, among others, to counteract hacker attacks in intelligent social services and converts the frequently accessed digital copyright information database into an encryption and desensitization scheme [16].

Funding

This work was supported by Soft Science Project of Weifang Science and Technology Bureau: Information Construction of Scientific Research Files in Local Universities under the Cloud Computing platform (No.: 2022RKX038).

Conflict of Interest

The authors declare no conflict of interests.

References:

  1. Khan, A.U., Zhang, Z., Taleby Ahvanooey, M. and Rafique, W., 2022. Opinion mining towards blockchain technology adoption for accessing digital library resources. Aslib Journal of Information Management, 74(1), pp.135-157.
  2. Ro, J.Y. and Noh, Y., 2022. A Study on the Introduction of Library Services Based on Blockchain. Journal of the Korean BIBLIA Society for library and Information Science, 33(1), pp.371-401.
  3. Tella, A., Amuda, H.O. and Ajani, Y.A., 2022. Relevance of blockchain technology and the management of libraries and archives in the 4IR. Digital Library Perspectives, 38(4), pp.460-475.
  4. Ciriello, R.F., Torbensen, A.C.G., Hansen, M.R.P. and Müller-Bloch, C., 2023. Blockchain-based digital rights management systems: Design principles for the music industry. Electronic Markets, 33(1), p.5.
  5. Safdar, M., Qutab, S., Ullah, F.S., Siddique, N. and Khan, M.A., 2023. A mapping review of literature on Blockchain usage by libraries: Challenges and opportunities. Journal of Librarianship and Information Science, 55(3), pp.848-858.
  6. Ryan, M.D., Macrossan, P., Wright, S. and Adams, M., 2023. Blockchain and publishing: towards a publisher-centred distributed ledger for the book publishing industry. Creative Industries Journal, 16(1), pp.2-21.
  7. Bonnet, S. and Teuteberg, F., 2023. Impact of blockchain and distributed ledger technology for the management, protection, enforcement and monetization of intellectual property: a systematic literature review. Information Systems and e-Business Management, 21(2), pp.229-275.
  8. Mogol, N. and Crudu, R., 2022. Challenges and strategies for copyright protection in the digital era. Journal of Social Sciences, (4), pp.6-19.
  9. Zhen, Y., 2023. Design of library smart cloud service system based on blockchain technology. Security and Privacy, 6(2), p.e213.
  10. Li, N., Zhang, H., Du, R., Ai, S., Zheng, Y. and Brugha, C.M., 2022. Blockchain technology and intellectual property protection: a systematic literature review. International Journal of Blockchains and Cryptocurrencies, 3(2), pp.112-130.
  11. Alam, K.M., Rahman, J.A., Tasnim, A. and Akther, A., 2022. A blockchain-based land title management system for Bangladesh. Journal of King Saud University-Computer and Information Sciences, 34(6), pp.3096-3110.
  12. Rathee, T. and Singh, P., 2022. A systematic literature mapping on secure identity management using blockchain technology. Journal of King Saud University-Computer and Information Sciences, 34(8), pp.5782-5796.
  13. Das, M., Tao, X., Liu, Y. and Cheng, J.C., 2022. A blockchain-based integrated document management framework for construction applications. Automation in Construction, 133, p.104001.
  14. Nygaard, A. and Silkoset, R., 2023. Sustainable development and greenwashing: How blockchain technology information can empower green consumers. Business Strategy and the Environment, 32(6), pp.3801-3813.
  15. Ferro, E., Saltarella, M., Rotondi, D., Giovanelli, M., Corrias, G., Moncada, R., Cavallaro, A. and Favenza, A., 2023. Digital assets rights management through smart legal contracts and smart contracts. Blockchain: Research and Applications, 4(3), p.100142.
  16. Chowdhury, E.K., Khan, I.I. and Dhar, B.K., 2023. Strategy for implementing blockchain technology in accounting: Perspectives of stakeholders in a developing nation. Business Strategy & Development, 6(3), pp.477-490.
  17. Savelyeva, T. and Park, J., 2022. Blockchain technology for sustainable education. British Journal of Educational Technology, 53(6), pp.1591-1604.
  18. Dahiya, A., Gupta, B.B., Alhalabi, W. and Ulrichd, K., 2022. A comprehensive analysis of blockchain and its applications in intelligent systems based on IoT, cloud and social media. International Journal of Intelligent Systems, 37(12), pp.11037-11077.
  19. Khan, S.A., Mubarik, M.S., Kusi‐Sarpong, S., Gupta, H., Zaman, S.I. and Mubarik, M., 2022. Blockchain technologies as enablers of supply chain mapping for sustainable supply chains. Business Strategy and the Environment, 31(8), pp.3742-3756.
  20. Rusch, M., Schöggl, J.P. and Baumgartner, R.J., 2023. Application of digital technologies for sustainable product management in a circular economy: A review. Business Strategy and the Environment, 32(3), pp.1159-1174.
  21. Anser, M.K., Tabash, M.I., Nassani, A.A., Aldakhil, A.M. and Yousaf, Z., 2021. Toward the e-loyalty of digital library users: investigating the role of e-service quality and
  22. Sulistiani, H., Isnain, A.R., Yasin, I., Mega, E.D., Virgilia, A. and Akbar, A., 2022. Penerapan Dan Pelatihan Perpustakaan Digital Pada Smk N 1 Padang Cermin. Jurnal Widya Laksmi: Jurnal Pengabdian Kepada Masyarakat, 2(2), pp.82-87.
  23. Zhou, J., Liu, Q., Jiang, Q., Ren, W., Lam, K.M. and Zhang, W., 2023. Underwater camera: Improving visual perception via adaptive dark pixel prior and color correction. International Journal of Computer Vision, pp.1-19.
  24. Ali, J., Shan, G., Gul, N. and Roh, B.H., 2023. An Intelligent Blockchain-based Secure Link Failure Recovery Framework for Software-defined Internet-of-Things. Journal of Grid Computing, 21(4), p.57.
  25. Ren, X., Ahmed, I. and Liu, R., 2023. Study of Topological Behavior of Some Computer Related Graphs. Journal of Combinatorial Mathematics and Combinatorial Computing, 117, pp.3-14.
  26. Okunlaya, R.O., Syed Abdullah, N. and Alias, R.A., 2022. Artificial intelligence (AI) library services innovative conceptual framework for the digital transformation of university education. Library Hi Tech, 40(6), pp.1869-1892.
  27. Kapteyn, M.G., Knezevic, D.J., Huynh, D.B.P., Tran, M. and Willcox, K.E., 2022. Data‐driven physics‐based digital twins via a library of component‐based reduced‐order models. International Journal for Numerical Methods in Engineering, 123(13), pp.2986-3003.
  28. Goldin, T., Rauch, E., Pacher, C. and Woschank, M., 2022. Reference architecture for an integrated and synergetic use of digital tools in education 4.0. Procedia Computer Science, 200, pp.407-417.