Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/24187
標題: 隨處運算環境下數位版權管理之研究
The Study of Digital Rights Management (DRM) under Ubiquitous Environment
作者: 蕭如君
Hsiao, Ju-Chun
關鍵字: digital rights management
數位權利管理
wireless connection
ubiquitous computing environment
identity authentication
information security
行動上網
無所不在運算環境
身分驗證
資訊安全
出版社: 資訊管理學系所
引用: [1] Opera. (2009, Feb.). Which country experienced the greatest growth in mobile Web usage last year? Available: http://www.opera.com/press/releases/2009/02/25/ [2] A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology - Crypto 84, 1985, pp. 47-53. [3] Q. Liu, R. Safavi-Naini, and N. P. Sheppard, "Digital rights management for content distribution," in Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003, 2003, p. 58. [4] S. R. Subramanya and B. K. Yi, "Digital rights management," IEEE Potentials, vol. 25, pp. 31-34, 2006. [5] Microsoft. (2010, Jan.). Digital Rights Management (DRM). Available: http://www.microsoft.com/windows/windowsmedia/forpros/drm/default.mspx [6] InterTrust. (2009, Nov.). InterTrust. Available: http://www.intertrust.com/ [7] IBM. (2010, Mar.). Electronic Media Management System (EMMS) (IBM Corp) - Site Management/Publishing - Datamation Product Watch. Available: http://products.datamation.com/site_management/publishing/980261449.html [8] RealNetworks. (2001, Oct.). RealSystem Media Commerce Suite (RealNetworks, Inc) - Site Management/Publishing - Datamation Product Watch. Available: http://products.datamation.com/site_management/publishing/993052015.html [9] S. Bhatt, R. Sion, and B. Carbunar, "A personal mobile DRM manager for smartphones," Computers & Security, vol. 28, pp. 327-340, 2009. [10] W. Diffie and M. Hellman, "New directions in cryptography," IEEE Transactions on information Theory, vol. 22, pp. 644-654, 1976. [11] W. Diffie, P. Oorschot, and M. Wiener, "Authentication and authenticated key exchanges," Designs, Codes and Cryptography, vol. 2, pp. 107-125, 1992. [12] C. Chen, "A secure and traceable E-DRM system based on mobile device," Expert Systems with Applications, vol. 35, pp. 878-886, 2008. [13] Wikipedia. (2010, Feb.). Digital rights management - Wikipedia, the free encyclopedia. Available: http://en.wikipedia.org/wiki/Digital_rights_management [14] Y. Jeong, J. Kim, and K. Yoon, "Audio DRM Conversion between Different DRM Content Formats," in International Conference on Consumer Electronics, 2008, pp. 1-2. [15] C. Conrado, F. Kamperman, G. J. Schrijen, and W. Jonker, "Privacy in an Identity-based DRM System," in IEEE Proceedings of the 14th International Workshop on Database and Expert Systems Applications 2003, 2003, pp. 389-395. [16] M. Weiser, "The computer for the twenty-first century," Scientific American, vol. 265, pp. 94-104, 1991. [17] J. Ioannidis and G. Maguire Jr, "The design and implementation of a mobile internetworking architecture," in Proceedings of the Winter USENIX Technical, 1993, pp. 489-500. [18] C. Perkins, "Mobile ip," International Journal of Communication Systems, vol. 11, pp. 3-20, 1998. [19] M. Weiser, "Some computer science issues in ubiquitous computing," Communications of the ACM, vol. 36, pp. 75-84, 1993. [20] I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, vol. 47, pp. 445-487, 2005. [21] J. Barbosa, R. Hahn, D. Barbosa, and C. Geyer, "Learning in Small and Large Ubiquitous Computing Environments," in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008, pp. 401-407. [22] W. Yuan, D. Guan, and S. Lee, "Trust Management for Ubiquitous Healthcare," in International Symposium on Parallel and Distributed Processing with Applications, 2008, pp. 63-70. [23] E. Niemela and J. Latvakoski, "Survey of requirements and solutions for ubiquitous software," in Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, 2004, pp. 71-77. [24] A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, pp. 612-613, 1979. [25] D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology - CRYPTO 2001, 2001, pp. 213-229. [26] J. Kohl and C. Neuman, "RFC1510: The Kerberos network authentication service (V5)," RFC Editor United States, 1993. [27] J. G. Steiner, C. Neuman, and J. I. Schiller, "Kerberos: An authentication service for open network systems," in Proceedings of the Usenix Winter Conference, 1988, pp. 191-202. [28] A. Roy, A. Datta, A. Derek, and J. Mitchell, "Inductive proofs of computational secrecy," Computer Security, vol. 4734, pp. 219-234, 2007. [29] J. Such, J. Alberola, A. Garcia-Fornes, A. Espinosa, and V. Botti, "Kerberos-based secure multiagent platform," Programming Multi-Agent Systems, pp. 197-210, 2009. [30] M. J. Toussaint, "A new method for analyzing the security of cryptographic protocols," IEEE Journal on Selected Areas in Communications, vol. 11, pp. 702-714, 1993.
摘要: 隨著資訊科技技術的蓬勃發展以及通訊技術的躍進,網際網路已成為查詢資訊的主要管道之一,許多使用者、企業組織、政府部門皆依賴網路獲得比傳統平面媒體更大量、更即時、更多樣的資源,包括任何可數位化的影像、音訊、圖片、文件以及軟體等。再者,無線網路及其將來相關的應用已是當前網路科技的重點發展目標,台灣分別在2008、2009年,政府提出了「U台灣」、「桃園U-City」計畫,希望整合各種類型的無線網路技術,讓使用者可以「無所不在」(Ubiquitous) 與網路連結。隨著無線網路頻寬的增加、訊號穩定度的提升以及消費者手持行動裝置的普及,可以預見將來使用者資料傳輸的習慣將逐漸從以往固網式延伸為行動式,行動上網不再只侷限於擷取即時資訊,使用者甚至可以在行動漫遊時即時地向所在地的無線網路供應者購買所需的電子檔案,例如:當地詳細地圖。 欲架構上述的電子商務環境,安全交易機制為系統的第一考量。因此使用者需要與檔案供應業者建立互相驗證機制,以確認正確的交易對象。本篇論文引用了身份導向加密系統與Kerberos通行票概念來簡化驗證流程,避免繁複的運算量造成小型電子設備的負擔。 然而,使用者持其行動裝置到每個地方都能被方便地驗證身分此特性,可能是優點,也有可能成為降低使用意願的原因,因為使用者會認為其個人資訊很有可能洩漏於無線通訊的過程中,甚至懷疑陌生的外部領域管理者所宣稱的隱私權政策真實性。因此在本研究中,使用者可以在最初對所屬領域的管理者進行註冊時,即指定一個將來使用的暫時性代號取代真實身分,甚至漫遊到外部的陌生領域時,也可以使用此暫時性代號被驗證成功,進而更換新的代號。 另外,不同使用者在不同無線領域所購買的具DRM保護之電子檔案,很有可能因為各無線領域採取不同的加密技術而產生互通的困難,這也是目前市面上眾多DRM系統最令使用者詬病的缺點之一。很明顯的是,此類研究主題屬於「使用者導向」的研究領域,因此本篇架構亦提供了DRM格式轉換的功能,來提高使用者對系統的使用動機與接受度。 簡而言之,如何保護版權擁有者的權益,且讓使用者在隨意漫遊時合法地購買數位檔案,以應用於無所不在的行動網路環境、增進使用者交易的方便性,是本篇論文的研究重點。
Duo to the remarkable advance in information and network technology, Internet has been the main manner of people's data searching tool. Many users, corporations, and Government all rely on Internet to request a variety of resources, such as digital audios, videos, pictures, documents, and software. In addition, the wireless technology and the related applications are also the key point of communication development. For example, Taiwan Government proposed “u-Taiwan” and “U-City in Taoyuan” in 2008 and 2009 respectively, to integrate different kinds of wireless communication channels for giving people an ubiquitous online environment. Thanks to the wireless infrastructure, radio stability, and bandwidth have been raised a lot, there will be a trend that users change their habit of data transmission from fixed line to wireless way, and it's foreseeable. The wireless Internet can present users the communication information, as well as selling roaming data about users' current location from the regional infrastructure provider, e.g. the detail maps or travel data. To establishing the wireless e-commerce, security design is the essential concern. Users and service providers should do mutual authentication to make sure the transaction participants. This paper uses identity-based cryptographic and Kerberos system to simplify authentication process, and prevents complicated compute from being the load on small mobile devices. However, the characteristic of easy authentication process may be an advantage, but also may be a reason that depress users' system acceptance. Because users could doubt the privacy policy of strange service providers, they afraid their personal information been taken to other usage. Therefore, in the proposed scheme, users can choose a temporary identity instead of real to use in their registration domain, even can be authenticated when roams to outside region in the future, then change (or not change) to another new temporary ID. Besides, after the user takes mobile devices to roam to domains and buys protected digital contents with DRM systems, which is the most common way to against copyright infringement, those files could be in different DRM formats, so that can't be accepted by non-corresponding machine. It restricts consumers can only play content on particular device. Since this presented paper belongs to a user-oriented research topic, the proposed scheme also provides the DRM format conversion function, to promote the user's using motivation. To make short of the matter, the proposed scheme allows users roaming securely in an ubiquitous computing environment, and buy the digital files legally during the roaming process, moreover, joins the DRM format conversion function to enhance the user's convenience.
URI: http://hdl.handle.net/11455/24187
其他識別: U0005-2906201018592400
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-2906201018592400
Appears in Collections:資訊管理學系

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.