• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian. A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment[J]. Journal of Computer Research and Development, 2015, 52(12): 2659-2668. DOI: 10.7544/issn1000-1239.2015.20150749
Citation: Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian. A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment[J]. Journal of Computer Research and Development, 2015, 52(12): 2659-2668. DOI: 10.7544/issn1000-1239.2015.20150749

A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment

More Information
  • Published Date: November 30, 2015
  • DRM (digital rights management) is an important part of the construction of informatization in China. Unfortunately, high investment costs and poor user experience are two issues of DRM for further promotion in practice. Previous studies for DRM focused merely on storage service of cloud computing, lacking of concerning on the advantage of its computing service. This paper proposes a DRM scheme supporting attribute revocation and outsourced decryption in the cloud computing environment. In order to protect the users privacy in the DRM system, we propose that users purchase licenses through anonymous tags. In addition, in order to give full play to the advantages of cloud computing in computing and be flexible, fine-grained revocation of the user’s attributes, a supporting revocation of the outsourcing decryption CP-ABE scheme is proposed. Compared with the existing digital rights management schemes based on cloud computing, the proposed scheme protects content security and user privacy. Besides, it supports flexible access control mechanism and fine-grained user’s attributes revocation, and it is more applicable in the content protection in the cloud computing.
  • Related Articles

    [1]Zhang Zilin, Liu Duo, Tan Yujuan, Wu Yu, Luo Longpan, Wang Weilüe, Qiao Lei. An Erasure-Coded Data Update Method for Distributed Storage Clusters[J]. Journal of Computer Research and Development, 2022, 59(11): 2451-2466. DOI: 10.7544/issn1000-1239.20210211
    [2]Chen Jinyin, Huang Guohan, Zhang Dunjie, Zhang Xuhong, Ji Shouling. GRD-GNN: Graph Reconstruction Defense for Graph Neural Network[J]. Journal of Computer Research and Development, 2021, 58(5): 1075-1091. DOI: 10.7544/issn1000-1239.2021.20200935
    [3]Li Guorui, Meng Jie, Peng Sancheng, Wang Cong. A Distributed Data Reconstruction Algorithm Based on Jacobi ADMM for Compressed Sensing in Sensor Networks[J]. Journal of Computer Research and Development, 2020, 57(6): 1284-1291. DOI: 10.7544/issn1000-1239.2020.20190587
    [4]Tang Yingjie, Wang Fang, Xie Yanwen. An Efficient Failure Reconstruction Based on In-Network Computing for Erasure-Coded Storage Systems[J]. Journal of Computer Research and Development, 2019, 56(4): 767-778. DOI: 10.7544/issn1000-1239.2019.20170834
    [5]Fu Yingxun, Wen Shilin, Ma Li, Shu Jiwu. Survey on Single Disk Failure Recovery Methods for Erasure Coded Storage Systems[J]. Journal of Computer Research and Development, 2018, 55(1): 1-13. DOI: 10.7544/issn1000-1239.2018.20160506
    [6]Liu Hai, Li Xinghua, Ma Jianfeng. Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism[J]. Journal of Computer Research and Development, 2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511
    [7]Li Yibin, Jia Zhiping, Xie Shuai, and Liu Fucai. Partial Dynamic Reconfigurable WSN Node with Power and Area Efficiency[J]. Journal of Computer Research and Development, 2014, 51(1): 173-179.
    [8]Fan Liya, Zhang Fa, Wang Gongming, Liu Zhiyong. Algorithm Analysis and Efficient Parallelization of the Single Particle Reconstruction Software Package: EMAN[J]. Journal of Computer Research and Development, 2010, 47(12).
    [9]Zhang Hongcan and Xue Wei. Reliability Analysis of Cluster RAID5 Storage System[J]. Journal of Computer Research and Development, 2010, 47(4): 727-735.
    [10]Ma Yili, Fu Xianglin, Han Xiaoming, and Xu Lu. The Separation between Storage and Computation[J]. Journal of Computer Research and Development, 2005, 42(3).
  • Cited by

    Periodical cited type(5)

    1. 张钦宇,张智凯,安丽荣,杨君一,张瑞. 面向天基数据中心的编码修复数据流调度. 移动通信. 2023(07): 21-26 .
    2. 杨浩,李竣业. 电力用户多渠道自动缴费习惯预判预警系统设计. 信息技术. 2021(03): 155-160 .
    3. 包涵,王意洁,许方亮. 基于生成矩阵变换的跨数据中心纠删码写入方法. 计算机研究与发展. 2020(02): 291-305 . 本站查看
    4. 李慧,李贵洋,胡金平,周悦,江小玉,韩鸿宇. 基于分布式存储的OHitchhiker码. 计算机工程与设计. 2020(07): 1941-1946 .
    5. 严新成,陈越,巴阳,贾洪勇,朱彧. 云环境下支持可更新加密的分布式数据编码存储方案. 计算机研究与发展. 2019(10): 2170-2182 . 本站查看

    Other cited types(11)

Catalog

    Article views (1293) PDF downloads (809) Cited by(16)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return