Key Management in Multi-Distributor based DRM System with Mobile Clients using IBE

被引:2
|
作者
Dutta, Ratna [1 ]
Mukhopadhyay, Sourav [2 ]
Dowling, Tom [1 ]
机构
[1] NUI, Claude Shannon Inst, Maynooth, Kildare, Ireland
[2] Dublin City Univ, Sch Elect Engn, Dublin 9, Ireland
关键词
DRM; key management; content protection; security; DIGITAL RIGHTS MANAGEMENT; COPYRIGHT; SCHEME;
D O I
10.1109/ICADIWT.2009.5273858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current Digital Rights Management (DRM) systems support only two-party systems, involving the package server and purchaser. However, for a scalable business model of transacting digital assets, a multi-party DRM system is often necessary which involves more than one distributors, who can promote and distribute the content in regions unknown to the package server. We propose a key management scheme for a DRM system that involves more than one distributors with the DRM client's flexibility of choosing a distributor according to his own preference. For instance, a mobile DRM client may contact to a distribution server who is nearest to him by location or who offers promotions/discounts on the price or offers more commissions. In our scheme, the package server does not trust the distribution servers or the license server. The encrypted digital content sent by a package server can only be decrypted by the DRM client who has a valid license and is protected from attacks by other parties/servers in the system. Moreover, we use Identity-Based Encryption (IBE) that incurs less computation cost and storage as certificate managements are not necessary and certificate verifications are no longer needed. These features make our DRM system suitable for more effective business models/applications with the flexibility in deciding a wide range of business strategies as compared to the existing works.
引用
收藏
页码:597 / +
页数:2
相关论文
共 50 条
  • [1] Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture
    Dutta, Ratna
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 57 - 71
  • [2] Key Management Scheme Using Secret Sharing for Multi-Device based DRM
    Kim, Junghoon
    Lee, Hoonjung
    Son, Junggab
    Rhim, Wonwoo
    Kim, Sangjin
    Oh, Heekuck
    2012 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2012, : 384 - +
  • [3] A Secure Mobile DRM System Based on Cloud Architecture
    Chen, Chin-Ling
    Tsaur, Woei-Jiunn
    Chen, Yu-Yi
    Chang, Yao-Chung
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (03) : 925 - 941
  • [4] DRM encryption system using the key exchange with matrix puzzle
    Jung, Yong-hoon
    Kim, Jung-jae
    Jun, Moon-seog
    2006 International Conference on Hybrid Information Technology, Vol 1, Proceedings, 2006, : 627 - 633
  • [5] M-IBE based key management protocol for heterogeneous sensor networks
    Ma, Chunguang
    Wang, Jiuru
    Wu, Peng
    Zhang, Hua
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (10): : 2109 - 2116
  • [7] Exotica/FMDC: A workflow management system for mobile and disconnected clients
    Alonso, G
    Gunthor, R
    Kamath, M
    Agrawal, D
    ElAbbadi, A
    Mohan, C
    DISTRIBUTED AND PARALLEL DATABASES, 1996, 4 (03) : 229 - 247
  • [8] Trusted license distribution system based on IPSec VPN for mobile DRM
    Wang, Jian, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [9] Trusted license distribution system based on ipsec vpn for mobile drm
    Wang, Jian
    Zhang, Zhiyong
    Xiang, Fei
    Yu, Weihua
    Open Electrical and Electronic Engineering Journal, 2014, 8 (01): : 34 - 41
  • [10] A multi-mobile agent based information management system
    Du, JP
    Guo, WS
    Tu, XY
    2005 IEEE Networking, Sensing and Control Proceedings, 2005, : 71 - 73