The Study on Privacy Protection of Digital Rights Management for Mobile Devices
Autor: | CHEN, ZHI-WEI, 陳致瑋 |
---|---|
Rok vydání: | 2017 |
Druh dokumentu: | 學位論文 ; thesis |
Popis: | 105 With the rapid development of science and technology, many application technology was born. Today, most of the books, multimedia materials or other forms of software are digital stored; traditional content (such as paper materials, music videos, etc.,) will also been converted into digital contents. Through transmission by Internet, a wide range of digital contents at an alarming rate spread around the world. However, the convenience of the Internet has also brought a lot of security concerns and digital content privacy and copyright protection issues. Digital rights management system (DRM system) is a set of technologies that limit the use, modification and distribution of protected digital content. Therefore, how to protect the privacy of digital content using DRM system is an important issue. Besides, in response to the development trend of technologies, mobile devices are designed to be smaller and lighter. Mobile devices also offer greater convenience for people. As a result, the chances of using digital content on mobile devices are significantly increased by mobile users. So, we think that the DRM system should also be able to support the access of digital content on mobile devices. In this study, we will analyze the related works on DRM system in recent years. And in response to the demand of mobile devices, the mathematical principle of biometrics and elliptic curve cryptography are added to DRM system communication protocol. Through the biometric-based user authentication mechanism and the low computational cost of elliptic curve cryptography to propose a new protocol which improve the secure and effective of the DRM system. The proposed protocol can be divided into three parts: (1) we overcome the weaknesses of Mishra et al.’s scheme, and improve a better scheme for DRM system; (2) we modify the disadvantages of Jung et al.’s protocol which is suitable for EPR information system, and proposed the biometric-based protocol for the DRM system; (3) through the amendment of Amin et al.’s protocol based on ECC for cloud computing environment, we propose the low computational cost protocol for DRM system. The above three parts. As compared with their protocols, the security and performance analysis show that our propose protocols are more secure and efficient than related works, and proposed protocols are more suitable for the DRM system. |
Databáze: | Networked Digital Library of Theses & Dissertations |
Externí odkaz: |