• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian. A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment[J]. Journal of Computer Research and Development, 2015, 52(12): 2659-2668. DOI: 10.7544/issn1000-1239.2015.20150749
Citation: Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian. A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment[J]. Journal of Computer Research and Development, 2015, 52(12): 2659-2668. DOI: 10.7544/issn1000-1239.2015.20150749

A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment

More Information
  • Published Date: November 30, 2015
  • DRM (digital rights management) is an important part of the construction of informatization in China. Unfortunately, high investment costs and poor user experience are two issues of DRM for further promotion in practice. Previous studies for DRM focused merely on storage service of cloud computing, lacking of concerning on the advantage of its computing service. This paper proposes a DRM scheme supporting attribute revocation and outsourced decryption in the cloud computing environment. In order to protect the users privacy in the DRM system, we propose that users purchase licenses through anonymous tags. In addition, in order to give full play to the advantages of cloud computing in computing and be flexible, fine-grained revocation of the user’s attributes, a supporting revocation of the outsourcing decryption CP-ABE scheme is proposed. Compared with the existing digital rights management schemes based on cloud computing, the proposed scheme protects content security and user privacy. Besides, it supports flexible access control mechanism and fine-grained user’s attributes revocation, and it is more applicable in the content protection in the cloud computing.
  • Related Articles

    [1]Li Xinran, Li Rongshou, Qin Chuan, Qian Zhenxing, Zhang Xinpeng. Generative Information Hiding Method Based on Couplet Carrier[J]. Journal of Computer Research and Development, 2025, 62(3): 779-789. DOI: 10.7544/issn1000-1239.202330663
    [2]Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu. Intelligent and Efficient Method for Optimal Penetration Path Generation[J]. Journal of Computer Research and Development, 2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012
    [3]He Yanxiang, Chen Yong, Wu Wei, Xu Chao, Li Qingan. Bus-Invert Encoding Oriented Low Power Scheduling Method[J]. Journal of Computer Research and Development, 2014, 51(8): 1773-1780. DOI: 10.7544/issn1000-1239.2014.20130066
    [4]Wang Changjing, Luo Haimei, Zuo Zhengkang. Formal Software Specification Generation Approach Based on Problem Patterns[J]. Journal of Computer Research and Development, 2013, 50(2): 352-360.
    [5]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [6]Luo Zuying, Pan Yuedou. Transistor-Level Methodology on Power Optimization for CMOS Circuits[J]. Journal of Computer Research and Development, 2008, 45(4): 734-740.
    [7]Zhou Hongwei, Zhang Chengyi, and Zhang Minxuan. A Method of Statistics-Based Cache Leakage Power Estimation[J]. Journal of Computer Research and Development, 2008, 45(2): 367-374.
    [8]Wen Dongxin, Yang Xiaozong, and Wang Ling. A High Level Synthesis Scheme and Its Realization for Low Power Design in VLSI[J]. Journal of Computer Research and Development, 2007, 44(7): 1259-1264.
    [9]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low Power Data Cache Design Based on Very Narrow-Width Value[J]. Journal of Computer Research and Development, 2007, 44(5): 775-781.
    [10]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low-Power Instruction Cache Design Based on Record Buffer[J]. Journal of Computer Research and Development, 2006, 43(4): 744-751.

Catalog

    Article views (1293) PDF downloads (809) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return