A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing

Digital Rights Management (DRM) of multimedia contents in the open network environment is a hot research spot in recent years, and DRM controller in client has been facing versatile attacks, such as break and alteration. Based on cloud computing and remote certification, this paper proposed a usage control architecture and bidirectional integrality verification security protocol of multimedia digital contents in cloud environment. DRM controller is set in cloud multimedia server by as a service, and user calls DRM controlling function through client GUI. By comparisons and analyses on the schemes available, the novel approach realizes enhanced secure, trusted and controllable digital rights protection mechanism, in combination with trusted computing enabled high security terminal platforms, ensures bidirectional trust relation between the multimedia contents providers and the end users, and meanwhile satisfies the basic privacy protection and security requirement of the user end platform configuration.

[1]  Shiguo Lian,et al.  Fuzzy Risk Assessments on Security Policies for Digital Rights Management , 2009 .

[2]  Lili Zhang,et al.  A Novel DRM Security Scheme and its Prototype System Implementation , 2011 .

[3]  Lin Yang,et al.  Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[4]  Bu-Sung Lee,et al.  Optimization of Resource Provisioning Cost in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[5]  Andrew S. Tanenbaum,et al.  A DRM security architecture for home networks , 2004, DRM '04.

[6]  Hyunsoo Yoon,et al.  Digital Rights Management with Right Delegation for Home Networks , 2006, ICISC.

[7]  Zhiyong Zhang,et al.  Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .

[8]  Niu Xin-xin Trusted digital rights management protocol supporting for time and space constraint , 2008 .

[9]  Ma Jian-feng,et al.  Attestation proxy party-supported remote attestation model and its secure protocol , 2009 .

[10]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[11]  Zhiyong Zhang Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.

[12]  Jianfeng Ma,et al.  Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario , 2011, Intell. Autom. Soft Comput..

[13]  Reihaneh Safavi-Naini,et al.  Location constraints in digital rights management , 2008, Comput. Commun..

[14]  Christoph Sorge,et al.  Privacy-Preserving DRM for Cloud Computing , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.