Privacy-preserving multiparty digital rights management:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Aachen
Shaker
2014
|
Schriftenreihe: | Berichte aus der Informatik
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 120, XXXI S. graph. Darst. 21 cm |
ISBN: | 9783844028300 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042029653 | ||
003 | DE-604 | ||
005 | 20170721 | ||
007 | t | ||
008 | 140819s2014 gw d||| m||| 00||| eng d | ||
015 | |a 14,N23 |2 dnb | ||
015 | |a 14,A28 |2 dnb | ||
015 | |a 14,H08 |2 dnb | ||
016 | 7 | |a 1051452929 |2 DE-101 | |
020 | |a 9783844028300 |c kart. : EUR 48.80 (DE), EUR 48.80 (AT), sfr 61.00 (freier Pr.) |9 978-3-8440-2830-0 | ||
024 | 3 | |a 9783844028300 | |
035 | |a (OCoLC)890048028 | ||
035 | |a (DE-599)DNB1051452929 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-NW | ||
049 | |a DE-473 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 206 |0 (DE-625)143614: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Petrlic, Ronald |e Verfasser |0 (DE-588)1136026134 |4 aut | |
245 | 1 | 0 | |a Privacy-preserving multiparty digital rights management |c Ronald Petrlic |
264 | 1 | |a Aachen |b Shaker |c 2014 | |
300 | |a 120, XXXI S. |b graph. Darst. |c 21 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Berichte aus der Informatik | |
502 | |a Zugl.: Paderborn, Univ., Diss., 2014 | ||
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Digital Rights Management |0 (DE-588)4774276-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Digital Rights Management |0 (DE-588)4774276-8 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |D s |
689 | 0 | 3 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027471125&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027471125 |
Datensatz im Suchindex
_version_ | 1804152452316921856 |
---|---|
adam_text | CONTENTS
ACKNOWLEDGMENT V
ABSTRACT VII
1 INTRODUCTION 1
1.1 DIGITAL RIGHTS MANAGEMENT 1
1.1.1 TOWARDS A DEFINITION OF DRM 2
1.1.2 TRADITIONAL DRM 3
1.1.3 CLOUD COMPUTING AND MULTIPARTY DRM 5
1.2 PRIVACY PROTECTION 9
1.2.1 PRIVACY IN THE CLOUD? 9
1.2.2 PRIVACY IN DRM? 10
1.2.3 A NOTE ON BUSINESS SECRECY 11
1.3 RESEARCH GAP AND CONTRIBUTION 11
1.4 DISSERTATION OUTLINE 12
2 TERMINOLOGY, RELATED WORK, AND PRELIMINARIES 13
2.1 TERMINOLOGY 13
2.2 RELATED WORK 17
2.2.1 DIGITAL RIGHTS MANAGEMENT 18
2.2.2 PRIVACY-ENHANCING TECHNOLOGIES 23
2.2.3 SYSTEMATIZATION OF UNLINKABILITY 28
2.2.4 CONCLUSION OF RELATED WORK 32
2.3 PRELIMINARIES 32
2.3.1 CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION 32
2.3.2 PROXY RE-ENCRYPTION 34
2.3.3 ADDITIVELY HOMOMORPHIC ENCRYPTION 35
2.3.4 ANONYMOUS PAYMENT SCHEME 36
2.3.5 TRUSTED COMPUTING 39
3 SYSTEM MODEL 41
3.1 REQUIREMENTS TO A PPM-DRM SYSTEM 41
3.1.1 GENERAL DRM REQUIREMENTS ANALYSIS 41
3.1.2 STAKEHOLDER AND INCENTIVE DETERMINATION 42
I
HTTP://D-NB.INFO/1051452929
CONTENTS
3.1.3 REQUIREMENTS DETERMINATION FOR THE PROPOSED PPM-DRM SYS
TEM 45
3.2 SECURITY AND PRIVACY IN A MULTIPARTY DRM SYSTEM 47
3.2.1 THE ROLE OF TRUST 47
3.2.2 SECURITY AND PRIVACY MODEL 49
3.2.3 SECURITY AND PRIVACY REQUIREMENTS 50
4 CONCEPT 55
4.1 PPM-DRM SYSTEM WITHOUT A TRUSTED THIRD PARTY 55
4.1.1 REVISED SYSTEM MODEL 55
4.1.2 PROTOCOL DESCRIPTION 57
4.2 PPM-DRM SYSTEM BASED ON SECURE HARDWARE 61
4.2.1 REVISED SYSTEM MODEL 61
4.2.2 PROTOCOL DESCRIPTION 63
4.3 PPM-DRM SYSTEM BASED ON A SEMI-TRUSTED THIRD PARTY 67
4.3.1 APPROACHES BASED ON RE-ENCRYPTION 68
4.3.2 APPROACH BASED ON TRUSTED COMPUTING 77
5 EVALUATION AND DISCUSSION 83
5.1 EVALUATION OF THE PROPOSED APPROACHES 83
5.1.1 DR.M REQUIREMENTS 83
*5.2 SECURITY AND PRIVACY DISCUSSION 84
5.2.1 EVALUATION MODEL FOR UNLINKABILITY 85
5.2.2 APPROACH WITHOUT A TTP 87
5.2.3 APPROACH BASED ON SECURE HARDWARE 91
5.2.4 APPROACHES BASED ON RE-ENCRYPTION 94
5.2.5 APPROACH BASED ON TRUSTED COMPUTING 98
5.3 IMPLEMENTATION DETAILS 99
5.3.1 OVERHEAD ANALYSIS 99
5.3.2 SECURE HARDWARE 100
*5.4 INTEGRATION INTO APPLICATION SCENARIOS 101
5.4.1 ON-THE-FLY COMPUTING 101
5.4.2 STATE-OF-THE-ART DR.M SYSTEMS 105
5.5 COMPARISON OF MY APPROACHES 106
5.5.1 SUPPORTED MODELS 108
5.5.2 NEED FOR TTP 108
5.5.3 RESISTANCE TO COLLABORATION ATTACKS 108
5.5.4 COMPUTATION OVERHEAD 109
5.5.5 COMMUNICATION OVERHEAD 109
5.5.6 CONCLUSION: PROPOSED APPROACHES 110
5.6 COMPARISON TO RELATED WORK 110
5.6.1 NEED FOR TTP 110
5.6.2 NEED FOR TRUSTED HARDWARE 112
5.6.3 FLEXIBILITY IN CHOOSING A RIGHTS MODEL 112
CONTENTS
5.6.4 UNLINKABILITY OF CONTENT PURCHASES 112
5.6.5 UNLINKABILITY OF CONTENT EXECUTIONS 113
5.6.6 RESISTANCE AGAINST COLLABORATION ATTACKS 113
5.6.7 FLEXIBILITY IN CHOOSING A CONTENT EXECUTION CENTER 114
5.6.8 CONCLUSION: COMPARISON TO RELATED WORK 114
6 CONCLUSION AND OUTLOOK 115
A CRYPTOGRAPHY BACKGROUND, PROOFS, AND FURTHER ANALYSIS 117
A.L CPA SECURITY 117
A.2 DISTRIBUTION OF THE TEMPORARY USER S PUBLIC KEY 117
A.3 RANDOMIZED RE-ENCRYPTION SECURITY 117
A.4 FURTHER OVERHEAD ANALYSIS 119
A.4.1 SUPPORTED MODELS 119
A.4.2 NEED FOR TTP 119
A.4.3 RESISTANCE TO COLLABORATION ATTACKS 119
A.4.4 COMPUTATION OVERHEAD 120
A.4.5 COMMUNICATION OVERHEAD 120
LIST OF FIGURES IX
LIST OF TABLES XI
LIST OF DEFINITIONS XIII
LIST OF LISTINGS XV
ACRONYMS XVII
BIBLIOGRAPHY XIX
|
any_adam_object | 1 |
author | Petrlic, Ronald |
author_GND | (DE-588)1136026134 |
author_facet | Petrlic, Ronald |
author_role | aut |
author_sort | Petrlic, Ronald |
author_variant | r p rp |
building | Verbundindex |
bvnumber | BV042029653 |
classification_rvk | ST 206 |
ctrlnum | (OCoLC)890048028 (DE-599)DNB1051452929 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02151nam a2200541 c 4500</leader><controlfield tag="001">BV042029653</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170721 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140819s2014 gw d||| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,N23</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,A28</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,H08</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1051452929</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783844028300</subfield><subfield code="c">kart. : EUR 48.80 (DE), EUR 48.80 (AT), sfr 61.00 (freier Pr.)</subfield><subfield code="9">978-3-8440-2830-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783844028300</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890048028</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1051452929</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-NW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 206</subfield><subfield code="0">(DE-625)143614:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Petrlic, Ronald</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1136026134</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy-preserving multiparty digital rights management</subfield><subfield code="c">Ronald Petrlic</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Aachen</subfield><subfield code="b">Shaker</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">120, XXXI S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">21 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Berichte aus der Informatik</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Paderborn, Univ., Diss., 2014</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Digital Rights Management</subfield><subfield code="0">(DE-588)4774276-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Digital Rights Management</subfield><subfield code="0">(DE-588)4774276-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027471125&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027471125</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV042029653 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:10:56Z |
institution | BVB |
isbn | 9783844028300 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027471125 |
oclc_num | 890048028 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | 120, XXXI S. graph. Darst. 21 cm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Shaker |
record_format | marc |
series2 | Berichte aus der Informatik |
spelling | Petrlic, Ronald Verfasser (DE-588)1136026134 aut Privacy-preserving multiparty digital rights management Ronald Petrlic Aachen Shaker 2014 120, XXXI S. graph. Darst. 21 cm txt rdacontent n rdamedia nc rdacarrier Berichte aus der Informatik Zugl.: Paderborn, Univ., Diss., 2014 Privatsphäre (DE-588)4123980-5 gnd rswk-swf Mehrparteienprotokoll (DE-588)4480818-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Digital Rights Management (DE-588)4774276-8 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Digital Rights Management (DE-588)4774276-8 s Privatsphäre (DE-588)4123980-5 s Mehrparteienprotokoll (DE-588)4480818-5 s Trusted Computing (DE-588)7562931-8 s Kryptosystem (DE-588)4209132-9 s DE-604 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027471125&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Petrlic, Ronald Privacy-preserving multiparty digital rights management Privatsphäre (DE-588)4123980-5 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd Kryptosystem (DE-588)4209132-9 gnd Trusted Computing (DE-588)7562931-8 gnd Digital Rights Management (DE-588)4774276-8 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)4480818-5 (DE-588)4209132-9 (DE-588)7562931-8 (DE-588)4774276-8 (DE-588)4113937-9 |
title | Privacy-preserving multiparty digital rights management |
title_auth | Privacy-preserving multiparty digital rights management |
title_exact_search | Privacy-preserving multiparty digital rights management |
title_full | Privacy-preserving multiparty digital rights management Ronald Petrlic |
title_fullStr | Privacy-preserving multiparty digital rights management Ronald Petrlic |
title_full_unstemmed | Privacy-preserving multiparty digital rights management Ronald Petrlic |
title_short | Privacy-preserving multiparty digital rights management |
title_sort | privacy preserving multiparty digital rights management |
topic | Privatsphäre (DE-588)4123980-5 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd Kryptosystem (DE-588)4209132-9 gnd Trusted Computing (DE-588)7562931-8 gnd Digital Rights Management (DE-588)4774276-8 gnd |
topic_facet | Privatsphäre Mehrparteienprotokoll Kryptosystem Trusted Computing Digital Rights Management Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027471125&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT petrlicronald privacypreservingmultipartydigitalrightsmanagement |