首页 | 本学科首页   官方微博 | 高级检索  
     


Construction of a secure and efficient content key distribution framework for DRM systems
Authors:Dheerendra Mishra  Mohammad S. Obaidat  Abhijit Kasi  Purva Rewal  Ankita Mishra
Affiliation:1. Department of Mathematics, Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, India;2. Chair & Professor of Computer Science Department and Director of Cybersecurity Center, University of Texas-Permian Basin, Odessa, Texas, USA

King Abdullah II School of Information Technology, University of Jordan, Amman, Jordan

School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China;3. Department of Mathematics, Govt Motilal Vigyan Mahavidyalaya, Bhopal, India

Abstract:Recent advances in networks and digital technology have provided many user-friendly environments such as telemedicine, e-banking, e-content, and e-commerce. It has revolutionized the multimedia industry and made it accessible anytime and anywhere. However, its limitation also appeared in digital content piracy, which is more prevalent nowadays. Digital rights management (DRM) systems were developed to control the illegal spreading of digital content. Protocols are being developed to enable effective and secure communication in DRM systems. As security and efficiency are essential parameters, the approach should be two birds with one stone; i.e., the protocol should achieve efficiency and security together. Our investigation identified that secure mechanisms either have increased computation/communication overhead or fail to meet specified security criteria when discussing efficient content key delivery mechanisms. So, an efficient protocol design with the right security attributes is required. We have worked on designing a content delivery mechanism keeping in mind the desirable attribute of security and without decreasing overhead. The suggested solution targets “two birds with one stone.” We proved the security of the scheme in the random oracle model. We verify the security against active attacks using the formal simulation tool AVISPA. Detailed analysis is performed for the evaluation of computational and communication overhead. The comparative study is also presented to understand the gains in efficiency and security.
Keywords:authentication  computational efficiency  digital rights management  multimedia systems  security
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号