Journal on Communications ›› 2014, Vol. 35 ›› Issue (2): 95-103.doi: 10.3969/j.issn.1000-436x.2014.02.013

• academic paper • Previous Articles     Next Articles

Privacy-preserving digital rights management scheme in cloud computing

Qin-long HUANG1,2,3,Zhao-feng MA1,2,3,Jing-yi FU1,2,3,Yi-xian YANG1,2,Xin-xin NIU1,2   

  1. 1 Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2 National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    3 Beijing National Security Science and Technology Co Ltd, Beijing 100086, China
  • Online:2014-02-25 Published:2017-07-25

Abstract:

In order to meet the needs of digital content and user privacy protection in cloud computing environment, a privacy-preserving digital rights management (DRM) scheme in cloud computing was proposed. The framework of digital content copyright lifecycle protection and user privacy protection in cloud computing was firstly designed, which includes four protocols: system setup, content encryption, license acquisition and content decryption, and then a content encryption key protection and distribution mechanism based on attribute-based encryption and additively homomorphic encryption was proposed, which ensures the security of content encryption key. In addition, the pro-posed scheme also allows the users to purchase content and acquire license anonymously from cloud service provider, which protects the user privacy and prevents cloud service provider, license server and key server in the cloud from collecting the user's sensitive information. Compared with existing DRM schemes in cloud computing, the proposed scheme which not only protects the data security and user privacy, but also supports fine-grained access control, and supports online and super-distribution application modes, is more applicable in the copyright protection for cloud computing.

Key words: digital rights management, privacy preserving, attribute-based encryption, homomorphic encryption, cloud computing

No Suggested Reading articles found!