SlideShare a Scribd company logo
1 of 1
Impulse Technologies
                                      Beacons U to World of technology
        044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
       Privacy Enabled Digital Rights Management Without Trusted
                        Third Party Assumption
   Abstract
          Digital rights management systems are required to provide security and
   accountability without violating the privacy of the entities involved. However,
   achieving privacy along with accountability in the same framework is hard as these
   attributes are mutually contradictory. Thus, most of the current digital rights
   management systems rely on trusted third parties to provide privacy to the entities
   involved. However, a trusted third party can become malicious and break the
   privacy protection of the entities in the system. Hence, in this paper, we propose a
   novel privacy preserving content distribution mechanism for digital rights
   management without relying on the trusted third party assumption. We use simple
   primitives such as blind decryption and one way hash chain to avoid the trusted
   third party assumption. We prove that our scheme is not prone to the “oracle
   problem” of the blind decryption mechanism. The proposed mechanism supports
   access control without degrading user's privacy as well as allows revocation of
   even malicious users without violating their privacy.




  Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
                                                                                          1

More Related Content

What's hot

My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressMy article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
Vera Trubacheva
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Dotnet  security analysis of a single sign-on mechanism for distributed compu...Dotnet  security analysis of a single sign-on mechanism for distributed compu...
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Ecway Technologies
 

What's hot (20)

Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 
Benefits of Using a Password Manager Tool
Benefits of Using a Password Manager ToolBenefits of Using a Password Manager Tool
Benefits of Using a Password Manager Tool
 
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGEPRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
 
Encryption-Decryption of Email
Encryption-Decryption of EmailEncryption-Decryption of Email
Encryption-Decryption of Email
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
 
2019 and 2020 dot net ieee
2019 and 2020 dot net ieee2019 and 2020 dot net ieee
2019 and 2020 dot net ieee
 
My article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD ExpressMy article about DLP Web Conference from RnD Express
My article about DLP Web Conference from RnD Express
 
What is blockchain?
What is blockchain?What is blockchain?
What is blockchain?
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
MITx_Cyber security_Syllabus
MITx_Cyber security_SyllabusMITx_Cyber security_Syllabus
MITx_Cyber security_Syllabus
 
Role of blockchain technology in critical infrastructure security
Role of blockchain technology in critical infrastructure securityRole of blockchain technology in critical infrastructure security
Role of blockchain technology in critical infrastructure security
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLP
 
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
 
CROWDSALE LAUNCHED TO BUILD BLOCKCHAIN-BASED GUN VERIFICATION SYSTEM
CROWDSALE LAUNCHED TO BUILD BLOCKCHAIN-BASED GUN VERIFICATION SYSTEMCROWDSALE LAUNCHED TO BUILD BLOCKCHAIN-BASED GUN VERIFICATION SYSTEM
CROWDSALE LAUNCHED TO BUILD BLOCKCHAIN-BASED GUN VERIFICATION SYSTEM
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networks
 
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Dotnet  security analysis of a single sign-on mechanism for distributed compu...Dotnet  security analysis of a single sign-on mechanism for distributed compu...
Dotnet security analysis of a single sign-on mechanism for distributed compu...
 

Viewers also liked

해외토토분석 ■●★too93.com◈∈⊆∬사설놀이터 가족놀이터
해외토토분석 ■●★too93.com◈∈⊆∬사설놀이터 가족놀이터해외토토분석 ■●★too93.com◈∈⊆∬사설놀이터 가족놀이터
해외토토분석 ■●★too93.com◈∈⊆∬사설놀이터 가족놀이터
htsfrdstgtftg
 
Vacancies for linkedin
Vacancies for linkedinVacancies for linkedin
Vacancies for linkedin
silkevogel
 
อินเตอร์เน็ตไร้สายบน Bmw
อินเตอร์เน็ตไร้สายบน Bmwอินเตอร์เน็ตไร้สายบน Bmw
อินเตอร์เน็ตไร้สายบน Bmw
Kan Pgi
 

Viewers also liked (13)

Operating Integrity
Operating IntegrityOperating Integrity
Operating Integrity
 
356 dispensacion de medicamentos en una sala de observacion de urgencias sefh...
356 dispensacion de medicamentos en una sala de observacion de urgencias sefh...356 dispensacion de medicamentos en una sala de observacion de urgencias sefh...
356 dispensacion de medicamentos en una sala de observacion de urgencias sefh...
 
Fimofon
FimofonFimofon
Fimofon
 
LE NUOVE FRONTIERE DELL'E-LEARNING
LE NUOVE FRONTIERE DELL'E-LEARNINGLE NUOVE FRONTIERE DELL'E-LEARNING
LE NUOVE FRONTIERE DELL'E-LEARNING
 
해외토토분석 ■●★too93.com◈∈⊆∬사설놀이터 가족놀이터
해외토토분석 ■●★too93.com◈∈⊆∬사설놀이터 가족놀이터해외토토분석 ■●★too93.com◈∈⊆∬사설놀이터 가족놀이터
해외토토분석 ■●★too93.com◈∈⊆∬사설놀이터 가족놀이터
 
Vacancies for linkedin
Vacancies for linkedinVacancies for linkedin
Vacancies for linkedin
 
Graphics card upgrade
Graphics card upgradeGraphics card upgrade
Graphics card upgrade
 
Rrr final/cosmetic dentistry courses
Rrr final/cosmetic dentistry coursesRrr final/cosmetic dentistry courses
Rrr final/cosmetic dentistry courses
 
остапенко
остапенкоостапенко
остапенко
 
Diploma vanesa murillo
Diploma vanesa murilloDiploma vanesa murillo
Diploma vanesa murillo
 
อินเตอร์เน็ตไร้สายบน Bmw
อินเตอร์เน็ตไร้สายบน Bmwอินเตอร์เน็ตไร้สายบน Bmw
อินเตอร์เน็ตไร้สายบน Bmw
 
Calentamiento 2º
Calentamiento 2ºCalentamiento 2º
Calentamiento 2º
 
Tecnicas de estudio pdf
Tecnicas de estudio pdfTecnicas de estudio pdf
Tecnicas de estudio pdf
 

Similar to 5

Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
nsangary
 

Similar to 5 (20)

What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITOR
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
A01450131
A01450131A01450131
A01450131
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Is4560
Is4560Is4560
Is4560
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdf
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthings
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 

More from Impulse_Technology1

More from Impulse_Technology1 (20)

11
1111
11
 
10
1010
10
 
9
99
9
 
8
88
8
 
7
77
7
 
6
66
6
 
5
55
5
 
4
44
4
 
12
1212
12
 
1
11
1
 
30
3030
30
 
29
2929
29
 
28
2828
28
 
27
2727
27
 
9
99
9
 
8
88
8
 
7
77
7
 
6
66
6
 
4
44
4
 
3
33
3
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

5

  • 1. Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption Abstract Digital rights management systems are required to provide security and accountability without violating the privacy of the entities involved. However, achieving privacy along with accountability in the same framework is hard as these attributes are mutually contradictory. Thus, most of the current digital rights management systems rely on trusted third parties to provide privacy to the entities involved. However, a trusted third party can become malicious and break the privacy protection of the entities in the system. Hence, in this paper, we propose a novel privacy preserving content distribution mechanism for digital rights management without relying on the trusted third party assumption. We use simple primitives such as blind decryption and one way hash chain to avoid the trusted third party assumption. We prove that our scheme is not prone to the “oracle problem” of the blind decryption mechanism. The proposed mechanism supports access control without degrading user's privacy as well as allows revocation of even malicious users without violating their privacy. Your Own Ideas or Any project from any company can be Implemented at Better price (All Projects can be done in Java or DotNet whichever the student wants) 1