期刊文献+

Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection

Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection
原文传递
导出
摘要 In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management(DRM)scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem. In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management (DRM) scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期443-447,共5页 上海交通大学学报(英文版)
基金 the National Science Council(No.NSC102-2221-E-327-013-MY3)
关键词 identity authentication elliptic curve cryptosystem privacy protection digital rights management(DRM) identity authentication, elliptic curve cryptosystem, privacy protection, digital rights management (DRM)
  • 相关文献

参考文献16

  • 1DELETTRE C, BOUDAOUD K, R.IVEILL M. Cloud com- puting, security and data concealment [C]// Proceed- ings of 2011 IEEE Symposium on Computers and Communications (ISCC). Piscataway, USA: IEEE, 2011: 424-431.
  • 2CHEN D, ZHAO U. Data security and privacy pro- tection issues in cloud computing [C]//Proceedings of 2012 Intetnational Conference on Computer Science and Eleetronics Engineering ( ICCSEE). Piscataway, USA: IEEE, 2009: 647-651.
  • 3JANG E, KOH B, CttoI Y. An authentication mecha- nism of digital contents in pervasive computing envi- romnent [C]//Proceedings of 2008 International Con- ferenee on Information Security and Assurance ( ISA ). Piscataway, USA: IEEE, 2008: 527-533.
  • 4HARTUNG F, RAMME F. Digital rights management and watermarking of multimedia content for m- commerce applications [J]. Communications Magazine, IEEE, 2000, 38(11): 78-84.
  • 5EI A1MANI L, RAEKOW Y. Reselling digital content [C]//Proeeedings of ARES'IO International Confer- ence on Availability, Reliability and Security. Piscat- away, USA: IEEE, 2010: 391-396.
  • 6AZAD M IYI, AHMED A H S, ALAM A. Digital rights management [J]. International Journal of Computer Science and Network Security, 2010, 10(11): 24-33.
  • 7Adobe content server [EB/OL]. (2013-10-28). http:// en.wikipedia.org/wiki/adobe_content _server, 2013.
  • 8FEIJO B. Visualization, digital content, and simulation [J]. MultiMedia, IEEE, 2009, 16(1): 8-12.
  • 9US 20020077988 A1, Distributing digital content [S].
  • 10Ltu Q, SAFAVI-NAINI R, SHEPPARD N P. Digital rights management for content distribution [C]//Proccedings of the Australasian Information Security Workshop Conference on ACSW Frontiers. Darlinghurst, Aus- tralia: Australian Computer Society, 2003: 49-58.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部