An authenticated access control framework for digital right management system

被引:10
作者
Rana, Saurabh [1 ]
Mishra, Dheerendra [2 ]
机构
[1] LNM Inst Informat Technol, Dept Math, Jaipur 302031, Rajasthan, India
[2] Maulana Azad Natl Inst Technol, Dept Math, Bhopal, India
关键词
Digital right management; Access control; Authentication; Security; Privacy;
D O I
10.1007/s11042-021-10813-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing development in digital content distribution, researchers focus on the construction of an access right enabled digital content distribution framework for the legal user. Digital rights management (DRM) is the system which tries to ensure authorized content distribution. Current, DRM systems either provide authentication or constrain access right, but access control with legal authentication in the digital content distribution has remained a challenging issue for public-key cryptography (PKC) or identity-based public-key cryptography (ID-PKC). PKC associates certificate management, which includes revocation, storage, distribution and verification of certificates. As a result, certificate authority becomes the bottleneck in a large network. On the other hand, ID-PKC has the drawback of key escrow. For secure and authorized content distribution, evacuation from these problems is needed. In this paper, we present an authenticated access control protocol, which maintains user's right with authorized content distribution for the digital right management system. Its security has been proved in the random oracle model. An analysis of performance shows enhancement in efficiency, which indicates that the proposed scheme presents a secure and authorized access control mechanisms for resource-constrained devices.
引用
收藏
页码:25255 / 25270
页数:16
相关论文
共 27 条
[21]  
Tan YL, 2011, COMM COM INF SC, V251, P238
[22]   Edge Server Quantification and Placement for Offloading Social Media Services in Industrial Cognitive IoV [J].
Xu, Xiaolong ;
Shen, Bowen ;
Yin, Xiaochun ;
Khosravi, Mohammad R. ;
Wu, Huaming ;
Qi, Lianyong ;
Wan, Shaohua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2910-2918
[23]  
Xu XL, 2020, IEEE INTERNET THINGS, V7, P7919, DOI [10.1109/TITS.2020.2995622, 10.1109/JIOT.2020.3000871]
[24]   Multi-authority proxy re-encryption based on CPABE for cloud storage systems [J].
Xu, Xiaolong ;
Zhou, Jinglan ;
Wang, Xinheng ;
Zhang, Yun .
JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2016, 27 (01) :211-223
[25]   Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage [J].
Yang, Kan ;
Jia, Xiaohua .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) :1735-1744
[26]   DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems [J].
Yang, Kan ;
Jia, Xiaohua ;
Ren, Kui ;
Zhang, Bo ;
Xie, Ruitao .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) :1790-1801
[27]   Towards leakage-resilient fine-grained access control in fog computing [J].
Yu, Zuoxia ;
Au, Man Ho ;
Xu, Qiuliang ;
Yang, Rupeng ;
Han, Jinguang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :763-777