An authenticated access control framework for digital right management system

被引:10
作者
Rana, Saurabh [1 ]
Mishra, Dheerendra [2 ]
机构
[1] LNM Inst Informat Technol, Dept Math, Jaipur 302031, Rajasthan, India
[2] Maulana Azad Natl Inst Technol, Dept Math, Bhopal, India
关键词
Digital right management; Access control; Authentication; Security; Privacy;
D O I
10.1007/s11042-021-10813-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing development in digital content distribution, researchers focus on the construction of an access right enabled digital content distribution framework for the legal user. Digital rights management (DRM) is the system which tries to ensure authorized content distribution. Current, DRM systems either provide authentication or constrain access right, but access control with legal authentication in the digital content distribution has remained a challenging issue for public-key cryptography (PKC) or identity-based public-key cryptography (ID-PKC). PKC associates certificate management, which includes revocation, storage, distribution and verification of certificates. As a result, certificate authority becomes the bottleneck in a large network. On the other hand, ID-PKC has the drawback of key escrow. For secure and authorized content distribution, evacuation from these problems is needed. In this paper, we present an authenticated access control protocol, which maintains user's right with authorized content distribution for the digital right management system. Its security has been proved in the random oracle model. An analysis of performance shows enhancement in efficiency, which indicates that the proposed scheme presents a secure and authorized access control mechanisms for resource-constrained devices.
引用
收藏
页码:25255 / 25270
页数:16
相关论文
共 27 条
[1]   Efficient resource management and workload allocation in fog-cloud computing paradigm in IoT using learning classifier systems [J].
Abbasi, Mahdi ;
Yaghoobikia, Mina ;
Rafiee, Milad ;
Jolfaei, Alireza ;
Khosravi, Mohammad R. .
COMPUTER COMMUNICATIONS, 2020, 153 :217-228
[2]   A secure fog-based platform for SCADA-based IoT critical infrastructure [J].
Baker, Thar ;
Asim, Muhammad ;
MacDermott, Aine ;
Iqbal, Farkhund ;
Kamoun, Faouzi ;
Shah, Babar ;
Alfandi, Omar ;
Hammoudeh, Mohammad .
SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (05) :503-518
[3]   A new scalable authentication and access control mechanism for 5G-based IoT [J].
Behrad, Shanay ;
Bertin, Emmanuel ;
Tuffin, Stephane ;
Crespi, Noel .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :46-61
[4]   Efficient Decentralized Attribute Based Access Control for Mobile Clouds [J].
De, Sourya Joyee ;
Ruj, Sushmita .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) :124-137
[5]   Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication [J].
Diro, Abebe ;
Reda, Haftu ;
Chilamkurti, Naveen ;
Mahmood, Abdun ;
Zaman, Noor ;
Nam, Yunyoung .
IEEE ACCESS, 2020, 8 :60539-60551
[6]  
Hu V.C., 2013, NIST SPECIAL PUBLICA, V800, P1, DOI DOI 10.6028/NIST.SP.800-162
[7]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[8]   Revocable attribute-based access control in mutli-autority systems [J].
Imine, Youcef ;
Lounis, Ahmed ;
Bouabdallah, Abdelmadjid .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 122 :61-76
[9]   Reliable Data Aggregation in Internet of ViSAR Vehicles Using Chained Dual-Phase Adaptive Interpolation and Data Embedding [J].
Khosravi, Mohammad Reza ;
Samadi, Sadegh .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :2603-2610
[10]  
Kifayat K, 2013, SECURITY ENGINEERING FOR CLOUD COMPUTING: APPROACHES AND TOOLS, P123, DOI 10.4018/978-1-4666-2125-1.ch007