计算机科学 ›› 2015, Vol. 42 ›› Issue (4): 132-135.doi: 10.11896/j.issn.1002-137X.2015.04.026

• 信息安全 • 上一篇    下一篇

面向多媒体数字版权保护的委托授权远程证明协议

丰伟宁,张志勇,赵长伟   

  1. 河南科技大学信息工程学院 洛阳471023,河南科技大学信息工程学院 洛阳471023,河南科技大学信息工程学院 洛阳471023
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61370220),河南省科技创新人才计划杰出青年基金(134100510006),河南省教育厅科学技术研究重点项目基础研究计划(13A520240,4A520048),河南科技大学研究生创新基金项目(CXJJ-ZR12)资助

Delegation Authorization Protocol Based on Remote Attestation Applied in Multimedia DRM

FENG Wei-ning, ZHANG Zhi-yong and ZHAO Chang-wei   

  • Online:2018-11-14 Published:2018-11-14

摘要: 现有的委托授权模型主要侧重于受托方是否具有执行委托任务(权利)的能力,没有考虑到受托方平台的可信性;基于此,提出了多媒体环境下基于远程证明(Remote Attestation,RA)的委托授权安全协议,实现了对多媒体数字内容的可信委托授权。协议既保证了委托方对受托方身份与平台完整性的信任、多媒体资源服务器对受托方身份与平台完整性的信任,也实现了多媒体内容的安全访问。阐述了委托验证过程、实体间消息的交互过程以及委托授权可用性验证过程。列举与分析了协议可能遭遇的攻击,同现有的协议相比,应用于数字版权保护(Digital Rights Mana-gement,DRM)的委托授权远程证明协议的委托授权过程安全性更高,功能更完善。

关键词: 委托授权,可信,远程证明,安全协议

Abstract: The main content of existing delegation authorization model is about whether the delegatee can execute the delegated assignment(privilege),and the trust of the delegator’s platform is not mentioned.In view of this,the paper presented a delegation authorization security protocol based on remote attestation under multimedia environment.Multimedia contents’ trusted delegation authorization can be guaranteed in the protocol.This protocol not only ensures delegator and the multimedia server trust in delegatee’s authentication and platform integrity,but also achieves the trusted access to the multimedia.Delegation verification,message interactions between entities were stated.The potential attacks were enumerated and analysed.The delegation authorization protocol based on remote attestation applied in DRM realizes the trusted delegation and the functions are more perfect compared to the existing protocols.

Key words: Delegation authorization,Trusted,Remote attestation,Security protocol

[1] 孟芳慧,曹宝香,杨义先.钮心忻多媒体数字产品版权保护模型研究与设计[J].计算机科学,2013,0(1):98-102
[2] 张硕,马兆丰,芦效峰,等.音乐内容动态加密与许可授权系统设计与实现[J].计算机科学,2011,8(12):43-48
[3] 锁琰,徐小岩,张毓森,等.支持组件动态更新的远程证明[J].西安电子科技大学学报,2012,8(4):11-19
[4] Park J,Sandhu R.The UCON ABC usage control model[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):128-174
[5] Zhang Z,Yang L,Pei Q,et al.Research on usage control model with delegation characteristics based on OM-AM methodology[C]∥IFIP International Conference on Network and Parallel Computing Workshops,2007(NPC Workshops).IEEE,2007:238-243
[6] Hu X L,Osborn S L.A new approach for delegation in usagecontrol[C]∥Proceedings of the third ACM conference on Data and application security and privacy.ACM,2013:269-276
[7] Lei Jian-yun.Weighted Directed Graph-Based Authorization De-legation Model[J].Journal of Networks,2013,8(12):2812-2815
[8] Gaaloul K,Proper H A,Charoy F.Delegation Protocols in Human-Centric Workflows[C]∥Proceedings 13th IEEE International Conference on Commerce and Enterprise Computing 2011(CEC 2011).New Jersey,NJ:IEEE Computer Society,2011:219-224
[9] Sun Dao-qing.UCSSDAP:Ubiquitous Computing Service Securi-ty Delegation Authorization Protocol[C]∥2011 IEEE International Conference on Automation and Logistics(ICAL 2011).New Jersey,NJ:IEEE Computer Society,2011:371-374
[10] Osborn S L,He Wang.A Survey of Delegation from an RBAC Perspective[J].Journal of Software,2013,8(2):266-275
[11] 冯雪,俞银燕,汤帜.具有硬件适应性的多设备内容共享与版权保护方法[J].北京大学学报:自然科学版,2011,7(6):1009-1016
[12] Zhang Yong,Xiang Xue,Hai Feng,et al.An anonymous remote attestation for trusted cloud computing[C]∥Proceedings 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems 2012.(IEEE CCIS 2012)Washington,DC:IEEE Computer Society,2012:426-429
[13] Yu Yue,Wang Huai-min,Liu Bo,et al.A Trusted remote attestation model based on trusted computing[C]∥2013 12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications,2013.Washington,DC:IEEE Computer Society,2013:1504-1509
[14] Guo Jia-ming,Wei Jiang.Analysis and research of remote attestation based on trusted computing[C]∥2013 Fourth International Conference on Digital Manufacturing & Automation,2013.Washington,DC:IEEE Computer Society,2013:192-195
[15] Li Ya-ping,Zhou Wei-liang.Research on the delegation schemes of the UCONABC[J].Journal of University of Science and Technology of China,2012,2(2):154-160

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!