{"title":"具有强执行力的新DRM体系结构","authors":"Sascha Müller, S. Katzenbeisser","doi":"10.1109/ARES.2010.26","DOIUrl":null,"url":null,"abstract":"We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using novel cryptographic techniques of attribute-based encryption that make it possible to limit access to media to a subset of users that has to fulfill certain properties which are specified during the encryption process. We call these properties static rules. Static rules add an additional layer to the dynamic DRM enforcement framework that has to be overcome by potential attackers even if a DRM media operates in an unprotected environment. Finally, we demonstrate the practicability of this architecture by describing how static rules can be automatically extracted from licenses formulated in the standardized Open Digital Rights Language (ODRL).","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A New DRM Architecture with Strong Enforcement\",\"authors\":\"Sascha Müller, S. Katzenbeisser\",\"doi\":\"10.1109/ARES.2010.26\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using novel cryptographic techniques of attribute-based encryption that make it possible to limit access to media to a subset of users that has to fulfill certain properties which are specified during the encryption process. We call these properties static rules. Static rules add an additional layer to the dynamic DRM enforcement framework that has to be overcome by potential attackers even if a DRM media operates in an unprotected environment. Finally, we demonstrate the practicability of this architecture by describing how static rules can be automatically extracted from licenses formulated in the standardized Open Digital Rights Language (ODRL).\",\"PeriodicalId\":360339,\"journal\":{\"name\":\"2010 International Conference on Availability, Reliability and Security\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Availability, Reliability and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ARES.2010.26\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2010.26","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
摘要
我们提出了一种新的DRM体系结构,它利用两步实施过程,即使在DRM查看器受损的情况下也能实现强大的安全性。这是通过使用基于属性的新型加密技术实现的,这种加密技术可以将对媒体的访问限制为必须满足加密过程中指定的某些属性的用户子集。我们称这些属性为静态规则。静态规则为动态DRM实施框架添加了一个额外的层,即使DRM媒体在未受保护的环境中运行,潜在的攻击者也必须克服这个层。最后,我们通过描述如何从标准化开放数字版权语言(Open Digital Rights Language, ODRL)制定的许可中自动提取静态规则来演示该体系结构的实用性。
We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using novel cryptographic techniques of attribute-based encryption that make it possible to limit access to media to a subset of users that has to fulfill certain properties which are specified during the encryption process. We call these properties static rules. Static rules add an additional layer to the dynamic DRM enforcement framework that has to be overcome by potential attackers even if a DRM media operates in an unprotected environment. Finally, we demonstrate the practicability of this architecture by describing how static rules can be automatically extracted from licenses formulated in the standardized Open Digital Rights Language (ODRL).