A Blockchain-Based Copyright Protection Scheme With Proactive Defense

被引:7
作者
Chen, Xiaohu [1 ]
Yang, Anjia [1 ]
Weng, Jian [1 ]
Tong, Yao [2 ]
Huang, Cheng [3 ]
Li, Tao [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[2] Fongwell Data Ltd Co, Guangzhou 510623, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
中国国家自然科学基金;
关键词
Blockchain; copyright protection; double-authentication-preventing signature; INTERNET; THINGS;
D O I
10.1109/TSC.2023.3246476
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Copyright protection, including copyright registration, copyright transfer and infringement penalty, plays a critical role in preventing illegal usage of original works. The mainstream traditional copyright protection schemes need an authority online all the time to handle copyright issues and face some problems such as intricate copyright transfer, single point of failure and so on. To alleviate the burden of the authority, a few blockchain-based copyright protection schemes are proposed. However, most of them do not consider copyright transfer, and their infringement penalty may only happen after copyright owners discover the infringement behavior (i.e., "ex-post penalty"). In this article, we propose a new security strategy, called "Proactive Defense" in copyright protection which can prevent infringement before it occurs. With our proposed proactive defense strategy, we design a secure copyright protection scheme which provides advantages of compact copyright transfer and prior infringement penalty. More concrete, both copyright registration and transfer are regarded as transactions and recorded to the blockchain. Based on the double-authentication-prevention signature and non-interactive zero-knowledge proof techniques, illegal copyright transfer can be detected and the infringement penalty can be done automatically with a tailored smart contract before the completion of the transfer. Our security analysis shows that the proposed scheme can achieve all desirable security properties. Moreover, we implement our scheme in Java and evaluate the performance experimentally. Experimental results show that the proposed scheme has good security and efficiency, which can be applied for the copyright protection.
引用
收藏
页码:2316 / 2329
页数:14
相关论文
共 40 条
[1]  
Alyammahi S., 2016, P IEEE 59 INT MIDW S, P1
[2]   PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains [J].
Andreina, Sebastien ;
Bohli, Jens-Matthias ;
Karame, Ghassan O. ;
Li, Wenting ;
Marson, Giorgia Azzurra .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) :2173-2187
[3]  
Blum M., 2019, Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, P329, DOI DOI 10.1145/3335741.3335757
[4]  
Bowen Ning, 2021, 2021 International Conference on Culture-oriented Science & Technology (ICCST), P354, DOI 10.1109/ICCST53801.2021.00080
[5]   Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains [J].
Cai, Chengjun ;
Zheng, Yifeng ;
Du, Yuefeng ;
Qin, Zhan ;
Wang, Cong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) :1893-1907
[6]   Endorsed E-cash [J].
Camenisch, Jan ;
Lysyanskaya, Anna ;
Meyerovich, Mira .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :101-+
[7]  
Camenisch J, 2006, LECT NOTES COMPUT SC, V4116, P141
[8]   Effective watermarking technique using optimal discrete wavelet transform and sanitization technique [J].
Chaturvedi, Anoop Kumar ;
Shukla, Piyush Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) :13161-13177
[9]   A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET [J].
Chen, Xiaohu ;
Yang, Anjia ;
Tong, Yao ;
Weng, Jian ;
Weng, Jiasi ;
Li, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) :23130-23141
[10]  
Chor B., 1985, 26th Annual Symposium on Foundations of Computer Science (Cat. No.85CH2224-4), P383, DOI 10.1109/SFCS.1985.64