Open Access   Article Go Back

Review Of Secure And Privacy Preserving DRM Scheme

Bhavana S. Rote1 , M. M. Deshpande2

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-02 , Page no. 7-10, Apr-2016

Online published on May 10, 2016

Copyright © Bhavana S. Rote, M. M. Deshpande . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Bhavana S. Rote, M. M. Deshpande, “Review Of Secure And Privacy Preserving DRM Scheme,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.7-10, 2016.

MLA Style Citation: Bhavana S. Rote, M. M. Deshpande "Review Of Secure And Privacy Preserving DRM Scheme." International Journal of Computer Sciences and Engineering 04.02 (2016): 7-10.

APA Style Citation: Bhavana S. Rote, M. M. Deshpande, (2016). Review Of Secure And Privacy Preserving DRM Scheme. International Journal of Computer Sciences and Engineering, 04(02), 7-10.

BibTex Style Citation:
@article{Rote_2016,
author = {Bhavana S. Rote, M. M. Deshpande},
title = {Review Of Secure And Privacy Preserving DRM Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {04},
Issue = {02},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {7-10},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=42},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=42
TI - Review Of Secure And Privacy Preserving DRM Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Bhavana S. Rote, M. M. Deshpande
PY - 2016
DA - 2016/05/10
PB - IJCSE, Indore, INDIA
SP - 7-10
IS - 02
VL - 04
SN - 2347-2693
ER -

           

Abstract

Digital rights management (DRM) is becoming a key enabling technology to protect intellectual property of digital contents and it controls dissemination and usage of digital content. Numerous researches have been conducted for DRM since the past decade. This paper summarizes the basic concepts in DRM and present the typical DRM reference architecture. Secondly, requirements in this domain are studied. Furthermore, the some existing techniques are presented with detail analysis to point out the advantages and disadvantages respectively.

Key-Words / Index Term

Digital Rights Management (DRM), Interoperability, Proxy Re-encryption, Homomorphic encryption

References

[1] Durand, M. Eluard, S. Lelievre, and C. Vincent. “Smartpro : A smart card based digital content protection for professional workflow.”In Smart Card Research and Advanced Applications,8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, Lecture Notes in Computer Science, pages 255– 266. Springer, 2008.
[2] D. W. Kravitz and T. S. Messerges. “Achieving media Portability through local content translation and end-to-end right management.”In Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pages 27– 36. ACM, 2005.
[3] S. Lee, H. Park, and J. Kim. “A secure and mutual-profitable drm interoperability scheme”. In Proceedings of the The IEEE symposium on Computers and Communications, ISCC ’10,pages 75–80,Washington, DC, USA, 2010. IEEE Computer Society.
[4] Aafa J S and Soja Salim, "Fingerprint Privacy Protection Techniques: A Comparative Study", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (86-89), Jul -2014, E-ISSN: 2347-2693
[5] G. Taban, A. A. C´ardenas, and V. D. Gligor. “Towards a secure and interoperable drm architecture”. In Proceedings

of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA,October 30, 2006, pages 69–78. ACM, 2006.
[6] He Y J, Hui L C K, Yiu S M. “Avoid illegal encrypted DRM content sharing with non-transferable re-encryption”. Proceedings of the IEEE 13th International Conference on Communication Technology (ICCT’11), Sep 25−28, 2011, Jinan, China. Piscataway, NJ, USA: IEEE, 2011: 703−708.
[7] Y.-J. He, T. W. Chim, L. C. K. Hui, and S. M. Yiu. “Non- Transferable proxy re-encryption scheme for data dissemination Control”. http://eprint. iacr.org/2010/192.pdf.
[8] Petrlic R. “Proxy re-encryption in a privacy-preserving cloud Computing DRM scheme”. Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS’12), Dec 12−13, 2012, Melbourne, Australia. LNCS 7672. Berlin, Germany:Springer-Verlag, 2012: 194−211
[9] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1–30, 2006.
[10] HUANG Qin-long, MA Zhao-feng, YANG Yi-xian, FU Jing-yi, NIU Xin-xin. “Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing” The Journal of China Universities of Posts and Telecommunications, pages 88–95, December 2013.
[11] Rivest R L, Adleman L, Dertouzos M L. “On data banks and privacy homomorphisms. In: Foundations of Secure Computation”. New York, NY, USA: Academic Press, 1978: 169−177