A secure mobile DRM system based on cloud architecture

Public cloud architecture offers a public access software service. Users can login to access the cloud resources via various devices. The main advantage of the SaaS (Software as a Service) cloud service is that it supports different software and devices, in order to open web browsers, to authenticate the users through the standard format. E-books are protected by digital rights management (DRM), and users can use mobile devices to read them. However, the users' identity need to be authenticated or the communication between the user and the cloud server will be at risk. The processes by which users submit their proof of identity to the cloud needs to be protected. In this paper, information security can be achieved efficiently via cloud server architecture and a cryptography mechanism. The proposed scheme focuses on using a mobile device to access the cloud service. The DRM mechanisms can protect digital content; once the mobile users pass the authentication they can access the cloud services, with authenticated users able to easily use mobile devices to read digital content.

[1]  Bruno Carpentieri,et al.  Text Compression and Encryption through Smart Devices for Mobile Communication , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[2]  Wei-Bin Lee,et al.  A Portable DRM Scheme Using Smart Cards , 2007, J. Organ. Comput. Electron. Commer..

[3]  Chin-Ling Chen,et al.  Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[4]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[5]  Alfredo De Santis,et al.  Do You Trust Your Phone? , 2009, EC-Web.

[6]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..

[7]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[8]  Chin-Ling Chen,et al.  Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks , 2013, Comput. Sci. Inf. Syst..

[9]  Anders Eriksson,et al.  What Networking of Information Can Do for Cloud Computing , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[10]  Ilsun You,et al.  A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.

[11]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Yu-Yi Chen,et al.  A Fair-Use DRM System Based on Web Service , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[14]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[15]  Chin-Ling Chen,et al.  A secure and traceable E-DRM system based on mobile device , 2008, Expert Syst. Appl..

[16]  Christian Esposito,et al.  Interconnecting Federated Clouds by Using Publish-Subscribe Service , 2013, Cluster Computing.