Back to Search
Start Over
Attribute based DRM scheme with dynamic usage control in cloud computing
- Source :
- China Communications. 11:50-63
- Publication Year :
- 2014
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2014.
-
Abstract
- In order to achieve fine-grained access control in cloud computing, existing digital rights management (DRM) schemes adopt attribute-based encryption as the main encryption primitive. However, these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud. In this paper, we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing. We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption. Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content. The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users, and also enables the license server to implement immediate attribute and user revocation. Moreover, our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption, which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext. Extensive analytical results indicate that our proposed scheme is secure and efficient.
- Subjects :
- Computer Networks and Communications
business.industry
Computer science
Client-side encryption
Encryption
computer.software_genre
Computer security
Multiple encryption
Filesystem-level encryption
Probabilistic encryption
Keyfile
Attribute-based encryption
Electrical and Electronic Engineering
On-the-fly encryption
business
computer
Subjects
Details
- ISSN :
- 16735447
- Volume :
- 11
- Database :
- OpenAIRE
- Journal :
- China Communications
- Accession number :
- edsair.doi...........834ff3f1f0b4ed4382a9e2b7e4b5f100
- Full Text :
- https://doi.org/10.1109/cc.2014.6827568