Review Of Secure And Privacy Preserving DRM Scheme
Keywords:
Digital Rights Management (DRM), Interoperability, Proxy Re-encryption, Homomorphic encryptionAbstract
Digital rights management (DRM) is becoming a key enabling technology to protect intellectual property of digital contents and it controls dissemination and usage of digital content. Numerous researches have been conducted for DRM since the past decade. This paper summarizes the basic concepts in DRM and present the typical DRM reference architecture. Secondly, requirements in this domain are studied. Furthermore, the some existing techniques are presented with detail analysis to point out the advantages and disadvantages respectively.
References
Durand, M. Eluard, S. Lelievre, and C. Vincent. “Smartpro : A smart card based digital content protection for professional workflow.”In Smart Card Research and Advanced Applications,8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, Lecture Notes in Computer Science, pages 255– 266. Springer, 2008.
D. W. Kravitz and T. S. Messerges. “Achieving media Portability through local content translation and end-to-end right management.”In Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pages 27– 36. ACM, 2005.
S. Lee, H. Park, and J. Kim. “A secure and mutual-profitable drm interoperability scheme”. In Proceedings of the The IEEE symposium on Computers and Communications, ISCC ’10,pages 75–80,Washington, DC, USA, 2010. IEEE Computer Society.
Aafa J S and Soja Salim, "Fingerprint Privacy Protection Techniques: A Comparative Study", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (86-89), Jul -2014, E-ISSN: 2347-2693
G. Taban, A. A. C´ardenas, and V. D. Gligor. “Towards a secure and interoperable drm architecture”. In Proceedings
of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA,October 30, 2006, pages 69–78. ACM, 2006.
He Y J, Hui L C K, Yiu S M. “Avoid illegal encrypted DRM content sharing with non-transferable re-encryption”. Proceedings of the IEEE 13th International Conference on Communication Technology (ICCT’11), Sep 25−28, 2011, Jinan, China. Piscataway, NJ, USA: IEEE, 2011: 703−708.
Y.-J. He, T. W. Chim, L. C. K. Hui, and S. M. Yiu. “Non- Transferable proxy re-encryption scheme for data dissemination Control”. http://eprint. iacr.org/2010/192.pdf.
Petrlic R. “Proxy re-encryption in a privacy-preserving cloud Computing DRM scheme”. Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS’12), Dec 12−13, 2012, Melbourne, Australia. LNCS 7672. Berlin, Germany:Springer-Verlag, 2012: 194−211
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1–30, 2006.
HUANG Qin-long, MA Zhao-feng, YANG Yi-xian, FU Jing-yi, NIU Xin-xin. “Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing” The Journal of China Universities of Posts and Telecommunications, pages 88–95, December 2013.
Rivest R L, Adleman L, Dertouzos M L. “On data banks and privacy homomorphisms. In: Foundations of Secure Computation”. New York, NY, USA: Academic Press, 1978: 169−177
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
