Advertisement

Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme

  • Ronald Petrlic
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7672)

Abstract

In a cloud-computing scenario where users buy software from software providers and execute it at computing centers, a digital rights management (DRM) system has to be in place to check the software licenses during each software execution. However, the exposure of users to privacy invasion in the presence of DRM systems is problematic.

We come up with a concept that unites software providers’ and users’ demands for a secure and privacy-preserving DRM system for cloud computing. The employment of proxy re-encryption allows for a prevention of profile building (under pseudonym) of users by any party.

Keywords

Trusted Third Party Digital Right Management Message Sequence Chart Software Provider Digital Right Management System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cohen, J.E.: DRM and privacy. Berkeley Technology Law Journal 18, 575–617 (2003); Georgetown Public Law Research Paper No. 372741Google Scholar
  2. 2.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)CrossRefGoogle Scholar
  3. 3.
    Blaze, M., Bleumer, G., Strauss, M.J.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  4. 4.
    El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  5. 5.
    Perlman, R., Kaufman, C., Perlner, R.: Privacy-preserving DRM. In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST 2010, pp. 69–83. ACM, New York (2010)CrossRefGoogle Scholar
  6. 6.
    Conrado, C., Petković, M., Jonker, W.: Privacy-Preserving Digital Rights Management. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 83–99. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Petrlic, R., Sorge, C.: Privacy-preserving DRM for cloud computing. In: Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 1286–1291. IEEE Computer Society (2012)Google Scholar
  8. 8.
    Lee, S., Park, H., Kim, J.: A secure and mutual-profitable DRM interoperability scheme. In: Proceedings of the IEEE Symposium on Computers and Communications, ISCC 2010, pp. 75–80. IEEE Computer Society, Washington, DC (2010)Google Scholar
  9. 9.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586–615 (2003)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series). Chapman & Hall/CRC (2007)Google Scholar
  11. 11.
    Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030–1044 (1985)CrossRefGoogle Scholar
  12. 12.
    National Institute of Standards and Technology (NIST): Secure Hash Signature Standard (SHS) (FIPS PUB 180-2) (August 2002)Google Scholar
  13. 13.
    Internet Engineering Task Force (IETF): The Transport Layer Security (TLS) Protocol, Version 1.2 (August 2008); RFC 5246Google Scholar
  14. 14.
    Lynn, B.: The pairing-based cryptography library. Webpage (April 2012), http://crypto.stanford.edu/pbc/
  15. 15.
    Green, M.: The JHU-MIT Proxy Re-cryptography Library (PRL). Webpage, http://spar.isi.jhu.edu/prl/
  16. 16.
    Dingledine, R., Mathewson, N., Syverson, P.: TOR: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, vol. 13, p. 21. USENIX Association, Berkeley (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ronald Petrlic
    • 1
  1. 1.University of PaderbornPaderbornGermany

Personalised recommendations