Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection

被引:0
|
作者
黄政嘉 [1 ]
卢佩君 [2 ]
庄文胜 [2 ]
范俊逸 [1 ]
林政扬 [2 ]
林俊宏 [2 ]
机构
[1] Department of Computer Science and Engineering, National Sun Yat-sen University
[2] Department of Information Management, National Kaohsiung First University of Science and Technology
关键词
identity authentication; elliptic curve cryptosystem; privacy protection; digital rights management(DRM);
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management(DRM)scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem.
引用
收藏
页码:443 / 447
页数:5
相关论文
共 50 条
  • [1] Secure and efficient digital rights management mechanisms with privacy protection
    Huang J.-J.
    Lu P.-C.
    Juang W.-S.
    Fan C.-I.
    Lin Z.-Y.
    Lin C.-H.
    [J]. Journal of Shanghai Jiaotong University (Science), 2014, 19 (4) : 443 - 447
  • [2] Applying digital rights management systems to privacy rights management
    Kenny, S
    Korba, L
    [J]. COMPUTERS & SECURITY, 2002, 21 (07) : 648 - 664
  • [3] Towards an Efficient and Secure Online Digital Rights Management Scheme in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Fu Jingyi
    Yang Yixian
    Niu Xinxin
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 159 - 168
  • [4] A Reversible Framework for Efficient and Secure Visual Privacy Protection
    Zhang, Yushu
    Ye, Xi
    Xiao, Xiangli
    Xiang, Tao
    Li, Hongwei
    Cao, Xiaochun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3334 - 3349
  • [5] Secure and efficient privacy protection system for medical records
    Ramzan, Muhammad
    Habib, Mohammed
    Khan, Sajid Ali
    [J]. SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2022, 35
  • [6] Digital Rights and Privacy Policies Management as a Service
    Delgado, Jaime
    Llorente, Silvia
    Rodriguez, Eva
    [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 527 - 531
  • [7] Privacy-preserving digital rights management
    Conrado, C
    Petkovic, M
    Jonker, W
    [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 83 - 99
  • [8] Digital rights management: The future is secure hardware
    Sibert, O
    [J]. ELECTRONIC DESIGN, 2000, 48 (10) : 56 - 56
  • [9] A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment
    Chang, Chin-Chen
    Chang, Shih-Chang
    Yang, Jen-Ho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 972 - 984
  • [10] A secure and efficient certificateless content extraction signature with privacy protection
    Zhao, Can
    Liu, Jiabing
    Zheng, Fuyong
    Wang, Dejun
    Meng, Bo
    [J]. PLOS ONE, 2021, 16 (11):