This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting... more This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM system in which users interact with the system in a pseudonymous way, while preserving all the security requirements of usual DRM systems. To achieve this goal, a set of protocols and methods is proposed for managing user identities and interactions with the basic system during the acquisition and consumption of digital content. Privacy-enhancing extensions are also proposed. Unlinkable purchase of content, which prevents content providers from linking all content purchased by a given user, is discussed. Moreover, a method that allows a user to transfer content rights to another user without the two users being linked by the content provider is provided.
Privacy is becoming a serious concern in the connected world. This chapter presents privacy issue... more Privacy is becoming a serious concern in the connected world. This chapter presents privacy issues, requirements and privacy protection concepts related to consumers’ private content. First, privacy issues and requirements are described by means of several scenarios. Then, a DRM approach for protecting ownership and controlled sharing of private content is presented. A system is introduced for realizing such a privacy-enhancing approach for home media centers. Particular solutions for protecting and sharing personal content, ownership management, and content deletion in a privacy-preserving way are described.
Documents, Data and Advanced Web Technologies, 2012
Abstract The e-business concept goes beyond traditional electronic enterprise systems that are ty... more Abstract The e-business concept goes beyond traditional electronic enterprise systems that are typically owned and controlled by one company. In e-business systems the data is exchanged in a distributed environment where different components and systems are ...
2011 IEEE 4th International Conference on Cloud Computing, 2011
Cloud computing is an emerging technology that is expected to support Internet scale critical app... more Cloud computing is an emerging technology that is expected to support Internet scale critical applications which could be essential to the healthcare sector. Its scalability, resilience, adaptability, connectivity, cost reduction, and high performance features have high potential to lift the efficiency and quality of healthcare. However, it is also important to understand specific risks related to security and privacy that
... PK nor the SC's pseudonym RAN. Moreover, the only entity which can obtai... more ... PK nor the SC's pseudonym RAN. Moreover, the only entity which can obtain RAN from the certificate is the SC (via decryption with the private key SK). The value RAN may then be checked by a verifier via the hash value in the certificate. The use of a pseudo-nym RAN allows ...
Current Digital Rights Management (DRM) systems lack a functionality that allows a user to have m... more Current Digital Rights Management (DRM) systems lack a functionality that allows a user to have more control over his content licenses to preserve his privacy or otherwise protect his interests. This paper presents an approach to increasing user’s control of domain-based protected content without sacrificing content owner’s control. The proposed method is based on a specific form of a delegation
This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting... more This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM system in which users interact with the system in a pseudonymous way, while preserving all the security requirements of usual DRM systems. To achieve this goal, a set of protocols and methods is proposed for managing user identities and interactions with the basic system during the acquisition and consumption of digital content. Privacy-enhancing extensions are also proposed. Unlinkable purchase of content, which prevents content providers from linking all content purchased by a given user, is discussed. Moreover, a method that allows a user to transfer content rights to another user without the two users being linked by the content provider is provided.
Privacy is becoming a serious concern in the connected world. This chapter presents privacy issue... more Privacy is becoming a serious concern in the connected world. This chapter presents privacy issues, requirements and privacy protection concepts related to consumers’ private content. First, privacy issues and requirements are described by means of several scenarios. Then, a DRM approach for protecting ownership and controlled sharing of private content is presented. A system is introduced for realizing such a privacy-enhancing approach for home media centers. Particular solutions for protecting and sharing personal content, ownership management, and content deletion in a privacy-preserving way are described.
Documents, Data and Advanced Web Technologies, 2012
Abstract The e-business concept goes beyond traditional electronic enterprise systems that are ty... more Abstract The e-business concept goes beyond traditional electronic enterprise systems that are typically owned and controlled by one company. In e-business systems the data is exchanged in a distributed environment where different components and systems are ...
2011 IEEE 4th International Conference on Cloud Computing, 2011
Cloud computing is an emerging technology that is expected to support Internet scale critical app... more Cloud computing is an emerging technology that is expected to support Internet scale critical applications which could be essential to the healthcare sector. Its scalability, resilience, adaptability, connectivity, cost reduction, and high performance features have high potential to lift the efficiency and quality of healthcare. However, it is also important to understand specific risks related to security and privacy that
... PK nor the SC's pseudonym RAN. Moreover, the only entity which can obtai... more ... PK nor the SC's pseudonym RAN. Moreover, the only entity which can obtain RAN from the certificate is the SC (via decryption with the private key SK). The value RAN may then be checked by a verifier via the hash value in the certificate. The use of a pseudo-nym RAN allows ...
Current Digital Rights Management (DRM) systems lack a functionality that allows a user to have m... more Current Digital Rights Management (DRM) systems lack a functionality that allows a user to have more control over his content licenses to preserve his privacy or otherwise protect his interests. This paper presents an approach to increasing user’s control of domain-based protected content without sacrificing content owner’s control. The proposed method is based on a specific form of a delegation
Uploads
Papers by Milan Petković