A Personal DRM Scheme Based on Social Trust[J]. Chinese Journal of Electronics, 2012, 21(4): 719-724.
Citation: A Personal DRM Scheme Based on Social Trust[J]. Chinese Journal of Electronics, 2012, 21(4): 719-724.

A Personal DRM Scheme Based on Social Trust

Funds:  null
  • Received Date: 2011-11-01
  • Rev Recd Date: 2011-12-01
  • Publish Date: 2012-10-25
  • Existing commercial Digital rights management (DRM) schemes are not suitable for personal content protection because of centralized architecture and rigid constraints. To enable secure and flexible sharing of sensitive personal content, a new DRM scheme is proposed in this paper. Social trust between content sharers is modeled as computable concepts with DRM related contexts; based on the trust model, decentralized DRM architecture and scalable content sharing protocols are presented. Using the proposed DRM scheme, personal content owners can perform authentication and authorization without the intervention of Trusted authority (TA); by performing content sharing recommendations, authorized content users can conditionally have content shared with friends. Prototype implementation and simulation experiments indicate that the proposed scheme achieves satisfactory security and usability.
  • loading
  • J.S. Erickson, “Fair use, DRM, and trusted computing”, Communicationsof the ACM, Vol.46, No.4, pp.34-39, 2003.
    S. Bhatt, R. Sion, B. Carbunar, “A personal mobile DRM managerfor smartphones”, Computers & Security, Vol.28, No.6,pp.327-340, 2009.
    Z. Zhang, Q. Pei, J. Ma et al., “Security and trust in digitalrights management: A survey”, International Journal of NetworkSecurity, Vol.9, No.3, pp.247-263, 2009.
    Z. Zhang, Q. Pei, J. Ma et al., “Establishing multi-party trustarchitecture for DRM by using game-theoretic analysis of securitypolicies”, Chinese Journal of Electronics, Vol.18, No.3,pp.519-524, 2009.
    Microsoft Information Rights Management, http://office.microsoft.com/en-in/excel-help/information-rights-management-inthe-2007-microsoft-office-system-HA010102918.aspx
    Voltage SecureFile, http://www.voltage.com/products/sfclient.htm
    C.C. Marshall, S. Bly, “Sharing encountered information: Digitallibraries get a social life”, Proc. of Joint ACM/IEEE Conferenceon Digital Libraries (JCDL), Tucson, Arizona, USA,pp.218-227, 2004.
    S.P. Marsh, “Formalizing trust as a computational concept”,Ph.D. Thesis, University of Stirling, UK, 1994.
    C.R. McInerney, S. Mohr, “Trust and knowledge sharing in organizations:Theory and practice”, Information Science andKnowledge Management, Vol.12, No.5, pp.65-86, 2007.
    C. Collberg, J. Nagra, Surreptitious Software: Obfuscation,Watermarking, and Tamperproofing for Software Protection,Pearson Education, Massachusetts, USA, pp.401-464, 2010.
    A. Abdul-Rahman, S. Halles, “A distributed trust model”, Proc.of the 1997 Workshop on New Security Paradigms, Langdale,Cumbria, UK, pp.48-60, 1998.
    Y. Sun, W. Yu, Z. Han, K.J.R. Liu, “Information theoreticframework of trust modeling and evaluation for ad hoc networks”,IEEE Journal on Selected Areas in Communications(J-SAC), Special Issue on Security in Wireless Ad Hoc Networks,Vol.24, No.2, pp.305-317, 2006.
    A. Josang, “An algebra for assessing trust in certificationchains”, Proc. of Network and Distributed Systems SecuritySymposium (NDSS), San Diego, California, USA, pp.1-10,1999.
    A. Josang, M. Daniel, “Strategies for combining conflicting dogmaticbeliefs”, Proc. of 6th International Conference on InformationFusion, Cairns, Australia, pp.1133-1140, 2003.
    M.J. Atallah, M. Blanton, N. Fazio, K.B. Frikken, “Dynamicand efficient key management for access hierarchies”, ACMTransactions on Information and System Security (TISSEC),Vol.12, No.3, Article 18, pp.1-43, 2009.
    Y. Zhu, Z. Hu, H. Wang, H. Hu, G.J. Ahn, “A collaborativeframework for privacy protection in Online Social Networks”,Proc. of 6th International Conference on Collaborative Computing:Networking, Applications and Worksharing (CollaborateCom),Chicago, Illinois, USA, pp.1-15, 2010.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (396) PDF downloads(1244) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return