Improving security and efficiency of enterprise digital rights management

dc.AffiliationOctober University for modern sciences and Arts (MSA)
dc.contributor.authorSoliman A.H.
dc.contributor.authorIbrahim M.H.
dc.contributor.authorEl-Hennawy A.E.
dc.contributor.otherECE Department
dc.contributor.otherFaculty of Engineering
dc.contributor.otherMSA University
dc.contributor.otherEgypt; Department of Electronics
dc.contributor.otherCommunications and Computers
dc.contributor.otherFaculty of Engineering
dc.contributor.otherHelwan University
dc.contributor.otherEgypt; ECE Department
dc.contributor.otherFaculty of Engineering
dc.contributor.otherAin Shams University
dc.contributor.otherEgypt
dc.date.accessioned2020-01-09T20:41:40Z
dc.date.available2020-01-09T20:41:40Z
dc.date.issued2016
dc.descriptionScopus
dc.description.abstractRecently, private enterprises, governmental and military institutions have been relied mainly on digitizing their work. Digital files containing sensitive information should be protected against external and internal malicious attacks. Enterprise digital rights management (E-DRM) schemes provides several approaches to protect and securely distribute digital contents while empowering the enterprise's administration to monitor and control access to these contents. In this paper we propose a new secure and efficient E-DRM system based on the Information Dispersal Algorithm (IDA). We achieved an improvement in the overall storage requirements, and the computations complexity at each server in the system, as well as preserving the security of information and system robustness. � 2015 IEEE.en_US
dc.description.sponsorshipUniversity of North Texasen_US
dc.identifier.doihttps://doi.org/10.1109/ICCCNT.2015.7395177
dc.identifier.isbn9.78E+12
dc.identifier.otherhttps://doi.org/10.1109/ICCCNT.2015.7395177
dc.identifier.urihttps://ieeexplore.ieee.org/document/7395177
dc.language.isoEnglishen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofseries6th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2015
dc.subjectجامعة أكتوبر للعلوم الحديثة والآداب
dc.subjectMSA University
dc.subjectUniversity for Modern Sciences and Arts
dc.subjectOctober University for Modern Sciences and Arts
dc.subjectefficient reliable storageen_US
dc.subjectenterprise digital rights managementen_US
dc.subjectinformation dispersalen_US
dc.subjectsecure storageen_US
dc.subjectthreshold decryptionen_US
dc.subjectAccess controlen_US
dc.subjectInformation managementen_US
dc.subjectNetwork securityen_US
dc.subjectSecurity of dataen_US
dc.subjectDigital Rights Managementen_US
dc.subjectInformation dispersalen_US
dc.subjectInformation dispersal algorithmsen_US
dc.subjectMonitor and controlen_US
dc.subjectSecure storageen_US
dc.subjectSensitive informationsen_US
dc.subjectStorage requirementsen_US
dc.subjectThreshold decryptionen_US
dc.subjectCopyrightsen_US
dc.titleImproving security and efficiency of enterprise digital rights managementen_US
dc.typeConference Paperen_US
dcterms.isReferencedByKumari, S., Khan, M.K., Li, X., A more secure digital rights management authentication scheme based on smart card (2014) Multimed. Tools Appl., , Dec; Thanh, T.M., Iwakiri, M., A proposal of digital rights management based on incomplete cryptography using invariant Huffman code length feature (2014) Multimed. Syst., 20 (2), pp. 127-142. , Jun; Win, L.L., Thomas, T., Emmanuel, S., Privacy enabled digital rights management without trusted third party assumption (2012) IEEE Trans. Multimed., 14 (3), pp. 546-554. , Jun; Yen, C.-T., Liaw, H.-T., Lo, N.-W., Digital rights management system with user privacy, usage transparency, and superdistribution support (2014) Int. J Commun. Syst., 27 (10), pp. 1714-1730. , Oct; Chang, E.-C., Huang, K.-H., Lu, A.-B., Lai, F., Enterprise dIgItal nghts management system based on smart card 2011 (2011) IEEE 15th International Symposium on Consumer Electronics (ISCE), pp. 363-368; Chang, C.-C., Yang, J.-H., A group-oriented digital right management scheme with reliable and flexible access policies (2013) I. J Netw. Secur., 15 (6), pp. 471-477; Chen, C.L., Chen, Y.Y., Chen, Y.H., Group-based authentication to protect digital content for business applications (2009) Int. J Innov. Comput. Inf. Control, 5 (5), pp. 1243-1251; Lin, C.-C.L.C.-C., Wu, S.-C.W.S.-C., Chiang, P.-H.C.P.-H., Chen, C.-C.C.C.-C., Enterprise-oriented digital rights management mechanism: EDRM (2009) 2009 International Conference on Availability, Reliability and Security, pp. 923-928; Ubaidillah, I., Badarsyah, B., Rosmansyah, Y., Digital nghts management with ABAC implementation to improve enterprise document protection (2014) 2014 48th International Conference on Telecommunication Systems Services and Applications (TSSA), pp. 1-6; Rabin, M.O., Efficient dispersal of information for security, load balancing, and fault tolerance (1989) JACM, 36 (2), pp. 335-348. , Apr; Garay, J.A., Gennaro, R., Jutla, C., Rabin, T., Secure distributed storage and retrieval (2000) Theor. Comput. Sci., 243 (1-2), pp. 363-389. , Jul; Ibrahim, M.H., Secure and robust enterprise digital rights management protocol with efficient storage (2015) International Journal of Information, 18 (2), pp. 625-640; Shamir, A., How to share a secret (1979) Commun. ACM, 22 (2), pp. 612-613. , Nov; Krawczyk, H., Secret sharing made short (1994) Adv. Cryptol.-CRYPTO' 93, 773, pp. 136-146; Green, M., Secure blind decryption (2011) Proc. 14th Int. Conf. Pract. Theory Public Key Cryptogr. Conf. Public Key Cryptogr., pp. 265-282; Chaum, D., Blind signatures for untraceable payments (1983) Advances in Cryptology, pp. 199-203. , Springer US; Zhou, L.Z.L., Schneider, F.B., Marsh, M.A., Redz, A., Distributed blinding for distributed Eigamal re-encryption (2005) 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), p. 824; Dodis, Y., Halevi, S., Rabin, T., A cryptographic solution to a game theoretic problem (2000) Advances in CryptologyCRYPTO 2000, pp. 112-130; Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms (1985) IEEE Trans. Inf. Theory, 31 (4), pp. 469-472. , Jul; Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems (1978) Commun. ACM, 21 (2), pp. 120-126. , Feb; Desmedt, Y., Frankel, Y., Threshold cryptosystems (1990) Advances in Cryptology-CRYPTO' 89 Proceedings, pp. 307-315; Cramer, R., Gennaro, R., Schoenmakers, B., A secure and optimally efficient multi-authority election scheme (1997) Advances in Cryptology EUROCRYPT 97, 1233 (5), pp. 103-118; Pedersen, T., A threshold cryptosystem without a trusted party (1991) Advances in Cryptology-EUROCRYPT'91, pp. 522-526; Dossogne, J., Lafitte, F., Van Heule, D., Secure and practical threshold RSA (2013) Proceedings of the 6th International Conference on Security of Information and Networks-SIN '13, pp. 79-85; Maged, A.H.E.-S., Ibrahim, H., Ibrahim, I.I., Fast fully distributed and threshold RSA function sharing (2004) Proceedings of the Information Systems: New Generations (ISNG'04), pp. 13-18; Xu, Q.-L., Chen, T.-S., An efficient threshold RSA digital signature scheme (2005) Appl. Math. Comput., 166 (1), pp. 25-34. , Jul; Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T., Secure distributed key generation for discrete-log based cryptosystems (1999) Advances in Cryptology-EUROCRYPT '99, 1592, pp. 295-310; Wolf, P., Steinebach, M., Diener, K., Complementing DRM with digital watermarking: Mark, search, retrieve (2007) Online Inf. Rev., 31 (1), pp. 10-21. , Feb; Tardos, G., Optimal probabilistic fingerprint codes (2003) Proceedings of the Thirty-fifth ACM Symposium on Theory of Computing-STOC '03, p. 116; Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T., Robust threshold DSS signatures (2001) Inf. Comput., 164 (1), pp. 54-84. , Jan
dcterms.sourceScopus

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
avatar_scholar_256.png
Size:
6.31 KB
Format:
Portable Network Graphics
Description: