International Journal of Electrical, Electronics and Computer Systems (IJEECS)
_______________________________________________________________________________________________
_______________________________________________________________________________________________
ISSN (Online): 2347-2820, Volume -4, Issue-7, 2016 43
An Enhanced Method to Protect the software from Various Kind of Software Piracy
1Sahana B R, 2Vartika Sharma
1,2Computer Science & Engineering, GSSSIETW, Mysuru, Karnataka, India
Abstract : Unauthorized copying and illegal copying of software is a very major issue in the field of software development and for the software companies. This paper describes some of the methods to prevent software piracy which is depicted by different authors. The paper discusses a unique method to overcome software piracy. The study or the methodology presented in this paper is very efficient and allows the software to install to only one system.
Keywords: Software Piracy, Reverse Engineering, Software Tampering, Piracy Inhibition.
I. INTRODUCTION
Software protection and securing the software against the cracking of software is the main objective of any software developers and /or companies. Complicated coding have been used to develop any software so that it will be very difficult to crack those software.
The crackers or the hackers finds many ways to crack the software even when the software are developed with difficult coding. The project aims in building very popular and strong algorithm for the purpose of crack proofing and the ideas advances the way of crack proofing. To build any powerful software and to attract the customers, very large amount of infrastructure is needed by the software companies[1].
Because of this piracy, the developers of software and the companies have to face problems like spending more money than required to develop the powerful and attractive software. This paper proposes a better method or module that is capable of copy protection improvement and the improvement of weakness of software modules. The methods of vulnerabilities and understanding them are the main objective of the proposed method and to make the research on trending models[2].
II. SURVEY DETAILS
1) Reverse Engineering for Software Tampering The intermediate languages such as .NET, JAVA etc, which are used for developing the project are very easy to decompile and for reverse engineering and tampering.
For malicious reuse, the mechanism of code licensing, implementation of algorithm and copy protection are more susceptible. So the author describes a method of
protection of copyright with the key hiding and encryption techniques and it also helps in protecting the intellectual property. The software executables will encrypted by this method of encryption and also prevents from reverse engineering[3].
2) Determinants of Software Piracy
Software piracy is a major crime and many countries are trying to avoid it by enforcing different kinds of penalty by the legislative authority. The software piracy problems have become an academic consideration and the consideration given for analyzing the software have become a limited concern by the criminological theories.
These criminological theories with software piracy have become more consistent to prevent and understand such an illegal behavior. Lens contamination theory is proposed in this study to overcome this software piracy with the tool called PLS structure equation modeling.
This tool evaluates and estimates the measurement model's psychometric properties and structural model's parameters. This PLS model is used for analyzing the dataset. This PLS tool is efficient because it can handle a relationship and very large number of variables[4][8].
3) Software Piracy Inhibition with Response Protocol Software piracy prevention is the major approach of software developer's of IT world. To prevent or to avoid software piracy, many kind of implementations have been done by the software developers. And many ideas were suggested to stop this software piracy. The author have proposed an approach which is based on the gateway system of SMS.
The authentication process will be initiated by the server and the genuine software copy will be identified on the client machine. To provide a maximum inhibition to the software piracy, general key distribution system have been implemented. The authentication challenge will be sent by the server to client to start the process and then the client will response and response will be verified by the server.
In this study, the author tried to provide maximum protection using the SMS gateway. To identify the fake and unauthorized users and to check for authenticity of the software, key distribution system will be used[5].
International Journal of Electrical, Electronics and Computer Systems (IJEECS)
_______________________________________________________________________________________________
_______________________________________________________________________________________________
ISSN (Online): 2347-2820, Volume -4, Issue-7, 2016 44
4) Demographic Factors of Software Piracy
This Paper reports the survey based on different demographic factors and exploratory study about the software piracy. Software piracy factors are attracting the academics interests rather than the quantitative researches.
Most of the studies related to software piracy has been limited only to the academics and students and some to IT professionals of different organization. The survey on this factors were conducted for the person working as IT professionals and academicians from the private organization sectors of government. The negatively impacting and rampant properties of software piracy of different kinds are delved by the author for both consumers and business people.
The most frequent kind of software which is using is the hard disk loading which was surveyed in north India by the author. By giving some ideas and suggestions, the author finishes the discussions on combating the particular kind of software piracy[6][7].
III. SYSTEM DESIGN
The project consist of two modules: one is the client module and another one is the server module. The client will login to the portal where all the products are available. First, the user needs to register himself to the domain and need to login to it. The selected software for purchasing again asks for the user credentials for authentication. After this process the user will be provided with the download option. Once the user clicks on the download button, the software starts downloading to the system. At the time of installation, the MAC address and other details of the system will be stored in the server registry.
If the software is copied to an external storage device and tried to install in some other system, then the software will not work. Because the server will check for the MAC address and if the MAC address is different, then the application aborts the process of installation. And without internet the application will not allow the software to install or to proceed. The whole process which is explained is shown in the figure 1.
Figure 1: System Architecture
IV. PROPOSED METHOD
Software Piracy have become the major ethical impact for the software developers and the software companies.
The method in this project used is the key generation and the encryption of the key to overcome piracy of the software. By applying the encryption algorithm like triple DES and the RSA algorithm, the secret key will be generated. While installing the software, the application gets the MAC address of the system and stores into the registry. The MAC address will be encrypted using the encryption algorithm so that the application if copied to other system should not work. The application will check for the MAC address while installing the software. If the system's MAC address is same then the application will allow the software to run.
V. EXPERIMENTAL RESULTS
The result of this implementation is shown in the figure 2, figure 3 and figure 4. The first figure depicts that the software installed to the system by providing the user credentials. The second figure depicts that the software can be successfully run and the third figure depicts that if the same software is copied to other system gives the notification and will not proceed further.
International Journal of Electrical, Electronics and Computer Systems (IJEECS)
_______________________________________________________________________________________________
_______________________________________________________________________________________________
ISSN (Online): 2347-2820, Volume -4, Issue-7, 2016 45
Figure 2: User Login
Figure 3: Successfully running software
Figure 4: Notification Window
VI. CONCLUSION
Software piracy have made the software companies to face much loss in their investments on the software development. The developers also facing many problems because of this software piracy. The proposed method can efficiently solve the problem of both developers and the companies. This proposed method is designed such a way that it should work only in one particular system and there is no chance of pirated software to be installed in other system. This method will be the efficient way for eliminating the software piracy.
REFERENCES
[1] Usama, M. & Sobh, M., 2011. Software Licensing based and Copy Protection. IEEE, pp.
856-861.
[2] arcdigitalsolutions.com. 'software licensing'
[online]. Available:
http://www.arcsdigitalsolutions.com/softwarelice nsing.aspx.[Accessed: 05-08-2016].
[3] Hu, Jain Jun, et al. "A key hiding based software encryption protection scheme." Communication Technology (ICCT), 2011 IEEE 13th International Conference on. IEEE, 2011.
[4] Goel, Rajeev K., and Michael A. Nelson.
"Determinants of software piracy: economics, institutions, and technology." The Journal of Technology Transfer34.6 (2009): 6 37-658.
[5] Mahajan, Surendra, et al. "Inhibition to Software Piracy Using Challenging Response Protocol." International Journal of Innovative Research and Development (2014).
[6] Jamwal, Shubhnandan S., and Nishant Gupta.
"Demographic Factors of Software Piracy."
[7] componentart.com. 'License manager crashes- componenart' [online].Available:
http://componentart.com/community/forum/t/491 47.aspx. [Accessed: 10-08-2016].
[8] Usama, Mohab, and Mohamed Sobh. "Software Copy Protection and Licensing based on XrML and PKCS# 11." Communications, Computers and Signal Processing (PacRim), 2011 IEEE Pacific Rim Conference on. IEEE, 2011.