Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture

被引:0
|
作者
Dutta, Ratna [1 ]
Mishra, Dheerendra [1 ]
Mukhopadhyay, Sourav [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
SECURITY ASPECTS IN INFORMATION TECHNOLOGY | 2011年 / 7011卷
关键词
DRM; key management; content protection; security; access structure; access policy; IBE; ABE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a multi-level multi-distributor based DRM architecture that facilitates client mobility and propose key management mechanism for this system using Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE). The encrypted digital content sent by a package server can only be decrypted by the DRM client and is protected from attacks by other parties/servers in the system. Our key management protects the key used to encrypt a digital content during its delivery from the package server to the DRM client, not only from purchasers but also from the distribution servers and the license server. The IBE and ABE enables efficiency gains in computation time and storage over the existing certificate-based Public Key Infrastructure (PKI) based approaches as no certificate management and verification is needed by the entities in the system.
引用
收藏
页码:57 / 71
页数:15
相关论文
共 50 条
  • [1] Key Management in Multi-Distributor based DRM System with Mobile Clients using IBE
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Dowling, Tom
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 597 - +
  • [2] Hybrid Multi-level Cache Management Policy
    Chikhale, Krupal
    Shrawankar, Urmila
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 1119 - 1123
  • [3] A New HDFS Key Management Mechanism Based on Multi-level Hash Keychain
    Wang, Guiyuan
    Ning, Hongyun
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON BIG DATA RESEARCH (ICBDR 2018), 2018, : 163 - 169
  • [4] Multi-level Architecture on Web Services Based Policy Domain Use Cases Simulator
    Aizstrauts, Artis
    Ginters, Egils
    Lauberte, Ieva
    Piera Eroles, Miquel Angel
    ENTERPRISE AND ORGANIZATIONAL MODELING AND SIMULATION, EOMAS 2013, 2013, 153 : 130 - 145
  • [5] Multi-level delegations with trust management in access control systems
    Li, Min
    Sun, Xiaoxun
    Wang, Hua
    Zhang, Yanchun
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 39 (03) : 611 - 626
  • [6] Multi-level delegations with trust management in access control systems
    Min Li
    Xiaoxun Sun
    Hua Wang
    Yanchun Zhang
    Journal of Intelligent Information Systems, 2012, 39 : 611 - 626
  • [7] Multi-level and Multi-key Trust in PPDM
    Sriharsha, A. V.
    Parthasarathy, C.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [8] Landslide Risk Management in Uganda: A Multi-level Policy Approach
    Maes, Jan
    Poesen, Jean
    Parra, Constanza
    Kabaseke, Clovis
    Bwambale, Bosco
    Mertens, Kewan
    Jacobs, Liesbet
    Dewitte, Olivier
    Vranken, Liesbet
    de Hontheim, Astrid
    Kervyn, Matthieu
    ADVANCING CULTURE OF LIVING WITH LANDSLIDES, VOL 3: ADVANCES IN LANDSLIDE TECHNOLOGY, 2017, : 395 - 403
  • [9] A multi-level policy representation for management services in maritime networks
    St-Onge, Francis
    Kidston, David
    Labbe, Isabelle
    Eighth IEEE International Workshop on Policies for Distributed Systems and Networks - Proceedings, 2007, : 96 - 105
  • [10] Multi-Level Secure JTAG Architecture
    Pierce, Luke
    Tragoudas, Spyros
    2011 IEEE 17TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2011,