Identity Based Drm System with Total Anonymity and Device Flexibility Using Ibes
نویسنده
چکیده
Most of the Digital Rights Management (DRM) systems fail to cover all requirements like user anonymity, user fairness, security and others. Device based DRM systems, adopted by most providers, lack user fairness and mostly follow proprietary formats. On the contrary, Smart Card DRM systems satisfy user anonymity and fairness, but have certain vulnerabilities, as identified in this paper. We propose a DRM system using Identity Based Encryption System (IBES) that overcomes the deficiencies and vulnerabilities of the existing DRM systems. The proposed DRM system is an approach towards an open framework, wherein, the content processing application can be independent of the DRM provider, and the security is controlled with the help of the smart cards.
منابع مشابه
Ticket Based Identity System for DRM
One of the major stumbling blocks in achieving interoperability in DRM systems is due to the variety of different user authentication systems utilised by DRM systems. For example, in [6], the authors detailed how Microsoft’s Rights Management System fails in fulfilling its requirements mainly because of a lack of its user identity system. The authors discussed how, because one DRM system cannot...
متن کاملSecure Anonymously Authenticated and Traceable Enterprise DRM System
Anonymity is one of the important services that must be available to users in the digital world as long as they behave honestly. Users’ communication must be kept authenticated and anonymous unless malicious behaviors are detected. In this case the accused user’s clear identity must be traced and revealed by the system to solve accusations. Enterprise Digital Rights Management (E-DRM) protects ...
متن کاملNew Efficient Identity-Based Encryption From Factorization
Identity Based Encryption (IBE) systems are often constructed using pairings or lattices. Three exceptions are due to Cocks in 2001, Boneh, Gentry and Hamburg in 2007, and Paterson and Srinivasan in 2009. The main goal of this paper to propose new IBE schemes, which may give a way to find IBEs without pairing or lattice. Essentially, the security of our IBE schemes is rooted in the intractabili...
متن کاملA secure mobile DRM system based on cloud architecture
Public cloud architecture offers a public access software service. Users can login to access the cloud resources via various devices. The main advantage of the SaaS (Software as a Service) cloud service is that it supports different software and devices, in order to open web browsers, to authenticate the users through the standard format. E-books are protected by digital rights management (DRM)...
متن کاملPrivacy-Preserving Digital Rights Management
Digital Rights Management (DRM) is a technology that provides content protection by enforcing the use of digital content according to granted rights. DRM can be privacy-invasive due to many reasons. The solution is not easy: there are economic and legitimate reasons for distributors and network operators to collect data about users and their activities, such as traffic modelling for infrastruct...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008