Secure and Privacy-Preserving DRM for Mobile Devices with Web Service Security∗ – An Experience Report –

نویسندگان

  • Carsten Kleiner
  • Lukas Grittner
  • Daniel Kadenbach
چکیده

Preserving the customer’s privacy has to be a major concern when implementing a commercial DRM system. In [12] a privacy-preserving digital rights management (DRM) architecture based on the widely used Open Mobile Alliance (OMA) DRM [17] specification for mobile devices has been suggested. In this paper the design of a possible implementation of the proposed architecture is explained which uses Web Service Security (WSS). This choice has been made since the web services originally designed in the architecture have to meet several security features which are necessary for privacy-preservation. Thus specifically selected WSS features facilitate validation of correctness of the security enhanced concept. This validation is reflected by a detailed security assessment. Moreover a prototypical implementation of privacy-preserving DRM by using a recent WSS implementation (WSS4J) is briefly explained. Finally, along with the experiences from the implementation, a discussion of a potential extension of our suggested architecture and implementation to other DRM systems is given. This discussion also reviews privacy and DRM, both mobile and stationary, in general from a technological point of view. The conclusion is that a similar extension would be possible for all DRM specifications that do not require an online on-access license validation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CrowdShare: Secure Mobile Resource Sharing

Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources. A popular example is tethering. However, resource sharing also raises privacy and security concerns. In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private res...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A secure mobile DRM system based on cloud architecture

Public cloud architecture offers a public access software service. Users can login to access the cloud resources via various devices. The main advantage of the SaaS (Software as a Service) cloud service is that it supports different software and devices, in order to open web browsers, to authenticate the users through the standard format. E-books are protected by digital rights management (DRM)...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Digital Rights Management for Mobile Commerce Using Web Services

Performing digital rights management (DRM) on mobile distribution services encounters many technical problems. Major problems include privacy and trust, coordination and interoperability, security, license management, DRM operations, and payment. This paper proposes a generic DRM framework to tackle these problems. The proposed framework consists of (1) an operational mobile infrastructure; (2)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008