iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11042-020-08683-2
Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system | Multimedia Tools and Applications Skip to main content
Log in

Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is increasingly used through smart devices with internet-based networks. Communication and data sharing between these devices have also grown in several ways. It is presenting a new dimension to the whole digital right management (DRM) industry. The main focus of IoT based DRM technology is to facilitate the authorised user for using multimedia content through smart devices. However, threats of information breach between communication channels also rapidly increasing, which is making content distribution a challenging task. Moreover, the computation and communication efficiency along with user privacy also requires an ideal DRM system. To address concerns of security, efficiency and privacy over internet-based networks, we design a content key distribution framework for DRM systems. The security proof of the proposed framework is given in the random oracle model along with informal security analysis. Moreover, the security analysis performed using widely adopted simulation tool, namely, “Automated Validation of Internet Security Protocol and Application (AVISPA)”. The study of performance is conducted, which indicates that it fulfils the requirements of computation and computation efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam PC, Kouchnarenko O, Mantovani J et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International Conference on Computer Aided Verification, Springer, pp 281–285

  2. Armando A, Basin D, Cuellar J, Rusinowitch M, Viganò L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64(January)

  3. Ashton K, et al. (2009) That internet of things thing. RFID J 22(7):97–114

    Google Scholar 

  4. Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 139–155

  5. Chang CC, Chang SC, Yang JH (2013) A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Secur Commun Netw 6(8):972–984

    Article  Google Scholar 

  6. Chang CC, Yang JH, Wang DW (2010) An efficient and reliable e-drm scheme for mobile environments. Expert Syst Appl 37(9):6176–6181

    Article  Google Scholar 

  7. Chen CL (2008) A secure and traceable e-drm system based on mobile device. Expert Syst Appl 35(3):878–886

    Article  Google Scholar 

  8. Chen HB, Lee WB, Chen TH (2018) A novel drm scheme for accommodating expectations of personal use. Multimedia Tools and Applications, pp 1–16

  9. Chen YY, Wang YJ, Chen CJ (2008) A fair-use drm system based on web service. In: Eighth International Conference on Intelligent Systems Design and Applications, 2008. ISDA’08, vol 3, IEEE, pp 11–16

  10. Conrado C, Kamperman F, Schrijen GJ, Jonker W (2003) Privacy in an identity-based drm system. In: 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings, IEEE, pp 389–395

  11. Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 523–540

  12. Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  MATH  Google Scholar 

  13. Jung J, Kang D, Lee D, Won D (2017) An improved and secure anonymous biometric-based user authentication with key agreement scheme for the integrated epr information system. Plos One 12(1):e0169414

    Article  Google Scholar 

  14. Kim H (2007) Scalable drm system for media portability. In: Annual Asian Computing Science Conference, Springer, pp 78–85

  15. Lee CC, Li CT, Chen ZW, Lai YM (2018) A biometric-based authentication and anonymity scheme for digital rights management system. Inf Technol Control 47 (2):262–274

    Google Scholar 

  16. Lee CC, Li CT, Chen ZW, Lai YM, Shieh JC (2018) An improved e-drm scheme for mobile environments. J Inf Secur Appl 39:19–30

    Google Scholar 

  17. Lee I, Lee K (2015) The internet of things (iot): applications, investments, and challenges for enterprises. Bus Horiz 58(4):431–440

    Article  Google Scholar 

  18. Lee WB, Wu WJ, Chang CY (2007) A portable drm scheme using smart cards. J Organ Comput Electron Commer 17(3):247–258

    Article  Google Scholar 

  19. Li CT, Weng CY, Lee CC, Wang CC (2015) A hash based remote user authentication and authenticated key agreement scheme for the integrated epr information system. J Med Syst 39(11):144

    Article  Google Scholar 

  20. Mishra D, Das AK, Mukhopadhyay S (2015) An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Secur Commun Netw 8(18):3383–3404

    Article  Google Scholar 

  21. Odelu V, Das AK, Goswami A (2015) An efficient ecc-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1–19

    Google Scholar 

  22. Odelu V, Das AK, Wazid M, Conti M (2018) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9(3):1900–1910

    Google Scholar 

  23. Peinado M (2006) Binding a digital license to a portable device or the like in a digital rights management (drm) system and checking out/checking in the digital license to/from the portable device or the like. US Patent 7,073,063

  24. Popescu BC, Crispo B, Tanenbaum AS, Kamperman FL (2004) A drm security architecture for home networks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, ACM, pp 1–10

  25. Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: Vision and challenges. IEEE Internet Things J 3(5):637–646

    Article  Google Scholar 

  26. Sovio S, Asokan N, Nyberg K (2003) Defining authorization domains using virtual devices. In: 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings, IEEE, pp 331–336

  27. Sundmaeker H, Guillemin P, Friess P, Woelfflé S (2010) Vision and challenges for realising the internet of things. Cluster of European Research Projects on the Internet of Things, European Commision 3(3):34–36

    Google Scholar 

  28. Tewari A, Gupta B (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using rfid tags. J Supercomput 73(3):1085–1102

    Article  Google Scholar 

  29. Tewari A, Gupta B (2017) A lightweight mutual authentication protocol based on elliptic curve cryptography for iot devices. Int J Adv Intell Paradig 9(2-3):111–121

    Article  Google Scholar 

  30. Wang J, Wang C (2018) Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. International Journal of High Performance Computing and Networking 12(2):111–117

    Article  Google Scholar 

  31. Wang M, Fan K, Pei Q, Wang S, Cao S (2007) A novel digital content protection system based on iris biometric. In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007. FSKD 2007, vol 4, IEEE, pp 221–225

  32. Werner SR, Cope WB, McConnell V (2013) Application digital rights management (drm) and portability using a mobile device for authentication. US Patent 8,353,048

  33. Xiao G, Guo J, Da Xu L, Gong Z (2014) User interoperability with heterogeneous iot devices through transformation. IEEE Trans Ind Inform 10 (2):1486–1496

    Article  Google Scholar 

  34. Zhang YC, Yang L, Xu P, Zhan YS (2009) A drm authentication scheme based on smart-card. In: International Conference on Computational Intelligence and Security, 2009. CIS’09, vol 2, IEEE, pp 202–207

Download references

Acknowledgements

This work is supported by Science and Engineering Research Board under File No:ECR/2015/000243.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dheerendra Mishra.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rana, S., Mishra, D. Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system. Multimed Tools Appl 79, 20319–20341 (2020). https://doi.org/10.1007/s11042-020-08683-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08683-2

Keywords

Navigation