LIGHTWEIGHT KEY MANAGEMENT OF DRM SYSTEMS

被引:0
|
作者
Chen, Tzung-Her [1 ]
Hung, Tsung-Hao [1 ]
Wu, Yan-Ting [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 60004, Taiwan
关键词
Digital rights management; Copyright protection; Key management; Mobile device; DIGITAL RIGHTS MANAGEMENT; PROTECTION; SCHEME; VIDEO;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the past decade, digital rights management's (DRM) goal of helping creators of digital content protect their intellectual property has captured the attention of both academia and industry. The DRM concept has emerged as a blanket term for copyright protection, ownership assertion, digital content authentication, access control and so on. Many corporations, such as Microsoft and Apple, have developed their own DRM systems; however, certain trust relationships are central to their success, especially the content owner's trust in the license server, but such trust is not always justified. Tins paper first addresses the security problem related to collusion attacks in the approach proposed by Jeong at al. Then it presents an efficient and secure key-delivery scheme in a DRM system based on the realistic assumption that the license server may be tempted by extra profit from illegal distribution. The proposed method's main contributions include 1): reducing the threat of collusion attacks by preventing the license server from obtaining a complete content-encryption key; 2): lower computational costs without the need for a public key infrastructure; 3): easy implementation in lightweight mobile devices.
引用
收藏
页码:5657 / 5664
页数:8
相关论文
共 50 条
  • [1] Lightweight Key Distribution Protocol for Streaming Media DRM
    Li, Hao
    Tang Xuyue
    Tian, Jiayin
    Liu, Jianbo
    Yang, Cheng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 275 - 284
  • [2] Key management in open DRM platforms
    Serrao, Carlos
    Dias, Miguel
    Delgado, Jaime
    AXMEDIS 2007: THIRD INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI-CHANNEL DISTRIBUTION, PROCEEDINGS, 2007, : 47 - +
  • [3] Use of MPEG-21 for license protection and key management in DRM systems
    Rodriguez, Eva
    Gallego, Isabel
    Delgado, Jaime
    AXMEDIS 2007: THIRD INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI-CHANNEL DISTRIBUTION, PROCEEDINGS, 2007, : 163 - 170
  • [4] A secure DRM framework for user's domain and key management
    Lee, Jinheung
    Lee, Sanggon
    Shin, Sanguk
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 420 - +
  • [5] A Lightweight and Security Key Management for WSN
    Xie, Bin
    Zhang, Li
    Jin, Yuquan
    Huang, Dan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND COMPUTER APPLICATION, 2016, 30 : 470 - 476
  • [6] A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC)
    Alsaghier, Hisham M.
    Ahamad, Shaik Shakeel
    Udgata, Siba K.
    Reddy, L. S. S.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 475 - 483
  • [7] Construction of a secure and efficient content key distribution framework for DRM systems
    Mishra, Dheerendra
    Obaidat, Mohammad S.
    Kasi, Abhijit
    Rewal, Purva
    Mishra, Ankita
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (17)
  • [8] Lightweight key management for wireless sensor networks
    Eltoweissy, M
    Younis, M
    Ghumman, K
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 813 - 818
  • [9] A Review on Key Management and Lightweight Cryptography for IoT
    Latif, Mohammad Ayub
    Bin Ahmad, Maaz
    Khan, Muhammad Khalid
    2020 GLOBAL CONFERENCE ON WIRELESS AND OPTICAL TECHNOLOGIES (GCWOT), 2020,
  • [10] Lightweight key management on sensitive data in the cloud
    Cui, Zongmin
    Zhu, Hong
    Chi, Lianhua
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1290 - 1299