Fu Jingyi, Ma Zhaofeng, Huang Qinlong, Yang Yixian
언어
영어(ENG)
URL
https://www.earticle.net/Article/A230982
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
Content abusing is increasingly common with the rapid development of the Internet, which damages the benefits of copyright owners, how to effectively prevent the abuse of digital contents is a big challenge. In this paper, we propose a secure DRM scheme supporting dynamic authorization, which first encrypts content with content encryption key (CEK), and then protects CEK based on distributed attribute-based encryption. At last encrypted CEK will be packaged and distributed with encrypted content, which eliminates independent key management and reduces the burden on the DRM server. In our scheme, user is labeled with a set of attributes and CEK is associated with access policy, only the user whose attributes satisfy access policy of content can recover CEK, which also achieves fine-grained access control. Moreover, to improve Muller et al.’s DRM scheme, our scheme achieves dynamic authorization by adding action control in the license, while the action control is related to user’s payment. Hence, when the user accesses the content, attributes comparison and license checking must be enforced, which lowers the trust required in DRM client. The analysis and comparison show our scheme is efficient and secure.
목차
Abstract 1. Introduction 2. Related Work 3. Preliminaries 3.1. CP-ABE Algorithms 3.2. DABE Algorithms 4. Framework of Proposed Scheme 5. Details of the Proposed Framework 5.1. Initialization Phase 5.2. Content Encryption Phase 5.3. License Acquisition Phase 5.4. Content Decryption Phase 6. Security and Performance Analysis 6.1. Security Analysis 7. Conclusion and Next Works Acknowledgements References
키워드
Digital Rights ManagementAttribute-Based EncryptionDynamic AuthorizationAccess Control
저자
Fu Jingyi [ Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China, Beijing National Security Science and Technology Co., Ltd, Beijing, China ]
Ma Zhaofeng [ Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China, Beijing National Security Science and Technology Co., Ltd, Beijing, China ]
Huang Qinlong [ Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China, Beijing National Security Science and Technology Co., Ltd, Beijing, China ]
Yang Yixian [ Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China ]
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.8 No.4