Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection

被引:0
|
作者
黄政嘉 [1 ]
卢佩君 [2 ]
庄文胜 [2 ]
范俊逸 [1 ]
林政扬 [2 ]
林俊宏 [2 ]
机构
[1] Department of Computer Science and Engineering, National Sun Yat-sen University
[2] Department of Information Management, National Kaohsiung First University of Science and Technology
关键词
identity authentication; elliptic curve cryptosystem; privacy protection; digital rights management(DRM);
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management(DRM)scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem.
引用
收藏
页码:443 / 447
页数:5
相关论文
共 50 条
  • [21] A license management protocol for protecting user privacy and digital contents in digital rights management systems
    Park, BN
    Lee, W
    Kim, JW
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (08) : 1958 - 1965
  • [22] Secure and flexible digital rights management in a pervasive usage mode
    Ma Zhaofeng
    Yang Yixian
    Niu Xinxin
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 863 - +
  • [24] PrecePt:: A privacy-enhancing license management protocol for digital rights management
    Park, BN
    Kim, JW
    Lee, W
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, 2004, : 574 - 579
  • [25] FRNet: An MCS Framework for Efficient and Secure Data Sensing and Privacy Protection in IoVs
    Wang, Zhihua
    Li, Zeminghui
    Li, Zhenyu
    Xu, Yingheng
    Yang, Xiaolong
    Qi, Fazhi
    Jia, Hongyong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16343 - 16357
  • [27] A secure digital camera architecture for integrated real-time digital rights management
    Mohanty, Saraju P.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2009, 55 (10-12) : 468 - 480
  • [28] Secure and Flexible Data Sharing With Dual Privacy Protection in Vehicular Digital Twin Networks
    Wang, Chenhao
    Ming, Yang
    Liu, Hang
    Feng, Jie
    Zhang, Ning
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (09) : 1 - 14
  • [29] Secure Revocation Features in eKYC- Privacy Protection in Central Bank Digital Currency
    Takaragi, Kazuo
    Kubota, Takashi
    Wohlgemuth, Sven
    Umezawa, Katsuyuki
    Koyanagi, Hiroki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (03) : 325 - 332
  • [30] Can hyperlinks and digital rights management secure affordable access to information?
    Deveci, Hasan A.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (06) : 651 - 661