A Blockchain-Based Copyright Protection Scheme With Proactive Defense

被引:6
|
作者
Chen, Xiaohu [1 ]
Yang, Anjia [1 ]
Weng, Jian [1 ]
Tong, Yao [2 ]
Huang, Cheng [3 ]
Li, Tao [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[2] Fongwell Data Ltd Co, Guangzhou 510623, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
中国国家自然科学基金;
关键词
Blockchain; copyright protection; double-authentication-preventing signature; INTERNET; THINGS;
D O I
10.1109/TSC.2023.3246476
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Copyright protection, including copyright registration, copyright transfer and infringement penalty, plays a critical role in preventing illegal usage of original works. The mainstream traditional copyright protection schemes need an authority online all the time to handle copyright issues and face some problems such as intricate copyright transfer, single point of failure and so on. To alleviate the burden of the authority, a few blockchain-based copyright protection schemes are proposed. However, most of them do not consider copyright transfer, and their infringement penalty may only happen after copyright owners discover the infringement behavior (i.e., "ex-post penalty"). In this article, we propose a new security strategy, called "Proactive Defense" in copyright protection which can prevent infringement before it occurs. With our proposed proactive defense strategy, we design a secure copyright protection scheme which provides advantages of compact copyright transfer and prior infringement penalty. More concrete, both copyright registration and transfer are regarded as transactions and recorded to the blockchain. Based on the double-authentication-prevention signature and non-interactive zero-knowledge proof techniques, illegal copyright transfer can be detected and the infringement penalty can be done automatically with a tailored smart contract before the completion of the transfer. Our security analysis shows that the proposed scheme can achieve all desirable security properties. Moreover, we implement our scheme in Java and evaluate the performance experimentally. Experimental results show that the proposed scheme has good security and efficiency, which can be applied for the copyright protection.
引用
收藏
页码:2316 / 2329
页数:14
相关论文
共 50 条
  • [41] A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
    Chen, Guo
    Peng, Weijun
    Wu, Jing
    Fang, Youxuan
    Ye, Keke
    Xin, Yanshuang
    CHINA COMMUNICATIONS, 2024, 21 (07) : 267 - 277
  • [42] BFOD: Blockchain-Based Privacy Protection and Security Sharing Scheme of Flight Operation Data
    Li, Xinyan
    Zhao, Huimin
    Deng, Wu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 3392 - 3401
  • [43] Blockchain-based secure and fair crowdsourcing scheme
    Zhang, Junwei
    Cui, Wenxuan
    Ma, Jianfeng
    Yang, Chao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (07)
  • [44] A blockchain-based clock synchronization Scheme in IoT
    Fan, Kai
    Sun, Shili
    Yan, Zheng
    Pan, Qiang
    Li, Hui
    Yang, Yintang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 524 - 533
  • [45] Blockchain-based searchable symmetric encryption scheme
    Li, Huige
    Tian, Haibo
    Zhang, Fangguo
    He, Jiejie
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 32 - 45
  • [46] Blockchain-based collaborative intrusion detection scheme
    Dang, Tianran
    Tian, Guohua
    Wei, Jianghong
    Liu, Shuqin
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2023, 26 (04) : 418 - 429
  • [47] A Blockchain-Based Conditional Anonymous Authentication Scheme
    Wang, Sen
    Zhang, Yin
    Xiong, Ling
    2023 5TH INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2023, 2023, : 15 - 20
  • [48] An efficient blockchain-based authentication scheme with transferability
    Jin, Xiushu
    Omote, Kazumasa
    PLOS ONE, 2024, 19 (09):
  • [49] Blockchain-based scheme for the mobile number portability
    Shah, Jay
    Agarwal, Sarthak
    Shukla, Arpit
    Tanwar, Sudeep
    Tyagi, Sudhanshu
    Kumar, Neeraj
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [50] A Scalable Blockchain-Based Integrity Verification Scheme
    Zhou, Zequan
    Luo, Xiling
    Bai, Yi
    Wang, Xiaochao
    Liu, Feng
    Liu, Gang
    Xu, Yifu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022