Digital Rights Management - Current Status and Future Trends

In this paper, a taxonomy of privacy-preserving approaches employed in digital right management systems are presented. These approaches are classified into two main approaches according to their design philosophy: cryptographic and noncryptographic approaches. Moreover, the pros and cons of the presented approaches are reported and compared in light of different viewpoints. Furthermore, some new directions are highlighted based on the insightful comparison of the existing work.

[1]  Ronald Petrlic,et al.  Towards practical privacy-preserving digital rights management for cloud computing , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[2]  Ronald Petrlic,et al.  Unlinkable content playbacks in a multiparty DRM system , 2013, DBSec.

[3]  Yixian Yang,et al.  Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing , 2013 .

[4]  Mohan S. Kankanhalli,et al.  Privacy Preserving Multiparty Multilevel DRM Architecture , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[5]  Yixian Yang,et al.  Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing , 2013, J. Comput..

[6]  Jianmin Wang,et al.  A cloud based SIM DRM scheme for the mobile internet , 2010, CCS '10.

[7]  S. Mukhopadhyay,et al.  Privacy preserving hierarchical content distribution in multiparty multilevel DRM , 2012, 2012 World Congress on Information and Communication Technologies.

[8]  Zhiguang Qin,et al.  Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System , 2016, Int. J. Netw. Secur..

[9]  Radia J. Perlman,et al.  Privacy-preserving DRM , 2010, IDTRUST '10.

[10]  Huang Qinlong,et al.  Attribute based DRM scheme with dynamic usage control in cloud computing , 2014, China Communications.

[11]  Kim Seung-Hyun,et al.  Accountable privacy based on publicly verifiable secret sharing , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[12]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[13]  Ronald Petrlic,et al.  Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme , 2012, CSS.

[14]  Sourav Mukhopadhyay,et al.  A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System , 2013, QSHINE.

[15]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[16]  Hung-Wen Yang,et al.  Identity-Based DRM in Ubiquitous Multimedia System , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[17]  Tony Thomas,et al.  Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption , 2012, IEEE Transactions on Multimedia.

[18]  Willem Jonker,et al.  Privacy-Preserving Digital Rights Management , 2004, Secure Data Management.

[19]  Yang Yi-xian,et al.  Secure DRM Scheme Supporting Dynamic Authorization Using Attribute-Based Encryption , 2014 .

[20]  Yong Wang,et al.  A new usage control protocol for data protection of cloud environment , 2016, EURASIP J. Inf. Secur..

[21]  Stefan Katzenbeisser,et al.  A New DRM Architecture with Strong Enforcement , 2010, 2010 International Conference on Availability, Reliability and Security.

[22]  Yixian Yang,et al.  Attribute based DRM scheme with dynamic usage control in cloud computing , 2014 .

[23]  Brent Waters,et al.  Functional Encryption for Regular Languages , 2012, CRYPTO.

[24]  Jianhua Chen,et al.  An efficient certificateless designated verifier signature scheme , 2013, Int. Arab J. Inf. Technol..