Computer Science ›› 2015, Vol. 42 ›› Issue (4): 132-135.doi: 10.11896/j.issn.1002-137X.2015.04.026

Previous Articles     Next Articles

Delegation Authorization Protocol Based on Remote Attestation Applied in Multimedia DRM

FENG Wei-ning, ZHANG Zhi-yong and ZHAO Chang-wei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The main content of existing delegation authorization model is about whether the delegatee can execute the delegated assignment(privilege),and the trust of the delegator’s platform is not mentioned.In view of this,the paper presented a delegation authorization security protocol based on remote attestation under multimedia environment.Multimedia contents’ trusted delegation authorization can be guaranteed in the protocol.This protocol not only ensures delegator and the multimedia server trust in delegatee’s authentication and platform integrity,but also achieves the trusted access to the multimedia.Delegation verification,message interactions between entities were stated.The potential attacks were enumerated and analysed.The delegation authorization protocol based on remote attestation applied in DRM realizes the trusted delegation and the functions are more perfect compared to the existing protocols.

Key words: Delegation authorization,Trusted,Remote attestation,Security protocol

[1] 孟芳慧,曹宝香,杨义先.钮心忻多媒体数字产品版权保护模型研究与设计[J].计算机科学,2013,0(1):98-102
[2] 张硕,马兆丰,芦效峰,等.音乐内容动态加密与许可授权系统设计与实现[J].计算机科学,2011,8(12):43-48
[3] 锁琰,徐小岩,张毓森,等.支持组件动态更新的远程证明[J].西安电子科技大学学报,2012,8(4):11-19
[4] Park J,Sandhu R.The UCON ABC usage control model[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):128-174
[5] Zhang Z,Yang L,Pei Q,et al.Research on usage control model with delegation characteristics based on OM-AM methodology[C]∥IFIP International Conference on Network and Parallel Computing Workshops,2007(NPC Workshops).IEEE,2007:238-243
[6] Hu X L,Osborn S L.A new approach for delegation in usagecontrol[C]∥Proceedings of the third ACM conference on Data and application security and privacy.ACM,2013:269-276
[7] Lei Jian-yun.Weighted Directed Graph-Based Authorization De-legation Model[J].Journal of Networks,2013,8(12):2812-2815
[8] Gaaloul K,Proper H A,Charoy F.Delegation Protocols in Human-Centric Workflows[C]∥Proceedings 13th IEEE International Conference on Commerce and Enterprise Computing 2011(CEC 2011).New Jersey,NJ:IEEE Computer Society,2011:219-224
[9] Sun Dao-qing.UCSSDAP:Ubiquitous Computing Service Securi-ty Delegation Authorization Protocol[C]∥2011 IEEE International Conference on Automation and Logistics(ICAL 2011).New Jersey,NJ:IEEE Computer Society,2011:371-374
[10] Osborn S L,He Wang.A Survey of Delegation from an RBAC Perspective[J].Journal of Software,2013,8(2):266-275
[11] 冯雪,俞银燕,汤帜.具有硬件适应性的多设备内容共享与版权保护方法[J].北京大学学报:自然科学版,2011,7(6):1009-1016
[12] Zhang Yong,Xiang Xue,Hai Feng,et al.An anonymous remote attestation for trusted cloud computing[C]∥Proceedings 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems 2012.(IEEE CCIS 2012)Washington,DC:IEEE Computer Society,2012:426-429
[13] Yu Yue,Wang Huai-min,Liu Bo,et al.A Trusted remote attestation model based on trusted computing[C]∥2013 12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications,2013.Washington,DC:IEEE Computer Society,2013:1504-1509
[14] Guo Jia-ming,Wei Jiang.Analysis and research of remote attestation based on trusted computing[C]∥2013 Fourth International Conference on Digital Manufacturing & Automation,2013.Washington,DC:IEEE Computer Society,2013:192-195
[15] Li Ya-ping,Zhou Wei-liang.Research on the delegation schemes of the UCONABC[J].Journal of University of Science and Technology of China,2012,2(2):154-160

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!