In the Internet or cloud computing environments, service providers provide more and more content
services. Users can use these convenient content services in daily life. The major data of the user are maintained
by the service providers except that some personal privacy data are stored at the client device. An attacker
may try to invade the systems, and it will cause the damage of users and service providers. Also, users may
lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy
protection of users become an important issue in these environments. Besides, since many mobile devices are used
in these environments, secure authentication and data protection methods must be efficient in these low resource
environments. In this paper, we propose an efficient and privacy protection digital rights management (DRM)
scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since
the key delegation center of the third party has the robust security protection, our proposed scheme stores the
encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the
user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his
devices for solving the device losing problem.
HUANG Jheng-jia1 (黄政嘉), LU Pei-chun2 (卢佩君), JUANG Wen-shenq2* (庄文胜), FAN Chun-i1 (范俊逸), LIN Zheng-yang2 (林政扬), LIN Chun-hung2 (林俊宏)
. Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection[J]. Journal of Shanghai Jiaotong University(Science), 2014
, 19(4)
: 443
-447
.
DOI: 10.1007/s12204-014-1523-5
[1] Delettre C, Boudaoud K, Riveill M. Cloud computing,security and data concealment [C]// Proceedings of 2011 IEEE Symposium on Computers and Communications (ISCC). Piscataway, USA: IEEE,2011: 424-431.
[2] Chen D, Zhao H. Data security and privacy protection issues in cloud computing [C]//Proceedings of 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). Piscataway,USA: IEEE, 2009: 647-651.
[3] Jang E, Koh B, Choi Y. An authentication mechanism of digital contents in pervasive computing environment [C]//Proceedings of 2008 International Conference on Information Security and Assurance (ISA).Piscataway, USA: IEEE, 2008: 527-533.
[4] Hartung F, Ramme F. Digital rights management and watermarking of multimedia content for mcommerce applications [J]. Communications Magazine,IEEE, 2000, 38(11): 78-84.
[5] Ei Aimani L, Raekow Y. Reselling digital content [C]//Proceedings of ARES’10 International Conference on Availability, Reliability and Security. Piscataway,USA: IEEE, 2010: 391-396.
[6] Azad M M, Ahmed A H S, Alam A. Digital rights management [J]. International Journal of Computer Science and Network Security, 2010, 10(11): 24-33.
[7] Adobe content server [EB/OL]. (2013-10-28). http://en.wikipedia.org/wiki/adobe content server, 2013.
[8] Feijo B. Visualization, digital content, and simulation[J]. MultiMedia, IEEE, 2009, 16(1): 8-12.
[9] US 20020077988 A1, Distributing digital content [S].
[10] Liu Q, Safavi-Naini R, Sheppard N P. Digital rights management for content distribution [C]//Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers. Darlinghurst, Australia:Australian Computer Society, 2003: 49-58.
[11] US 6697944 B1, Digital content distribution, transmission and protection system and method, and portable device for use therewith [S].
[12] Lin Lun-yu. Design and implementation of a mechanism for document protection and recording: Using PDF and TXT documents as examples [D]. Hsinchu,China: Institute of Computer Science and Engineering,National Chiao Tung University, 2008 (in Chinese).
[13] Lu Pei-chun, Juang Wen-shenq. Secure and efficient data and privacy protection mechanisms in cloud computing[C]//Proceedings of the 18th Conference on Information Management & Practice. Taipei, China:CSIM, 2012 (in Chinese).
[14] Wu S, Zhu Y. Efficient and secure password-based authenticated key exchange protocol [C]//Proceedings of 2006 International Conference on Computational Intelligence and Security. Piscataway, USA: IEEE, 2006:1269-1272.
[15] Amara M, Siad A. Elliptic curve cryptography and its application [C]//Proceedings of 2011 7th International Workshop on Systems, Signal Processing and their Applications. Piscataway, USA: IEEE, 2011: 247-250.
[16] FIPS-PUB-198, The keyed-hash message authentication code [S].