A Secure Mobile DRM System Based on Cloud Architecture
- Department of Computer Science and Information Engineering, Chaoyang University of Technology
Taichung, 41349, Taiwan
clc@mail.cyut.edu.tw, cyc200@gmail.com - Department of Information Management, Da-Yeh University
Changhua, 51591, Taiwan
wjtsaur@mail.dyu.edu.tw - Department of Management Information systems, National Chung Hsing University
Taichung, 402, Taiwan
chenyuyi@nchu.edu.tw
Abstract
Public cloud architecture offers a public access software service. Users can login to access the cloud resources via various devices. The main advantage of the SaaS (Software as a Service) cloud service is that it supports different software and devices, in order to open web browsers, to authenticate the users through the standard format. E-books are protected by digital rights management (DRM), and users can use mobile devices to read them. However, the users' identity need to be authenticated or the communication between the user and the cloud server will be at risk. The processes by which users submit their proof of identity to the cloud needs to be protected. In this paper, information security can be achieved efficiently via cloud server architecture and a cryptography mechanism. The proposed scheme focuses on using a mobile device to access the cloud service. The DRM mechanisms can protect digital content; once the mobile users pass the authentication they can access the cloud services, with authenticated users able to easily use mobile devices to read digital content.
Key words
Cloud, DRM, Authentication, Mobile Devices, Security
Digital Object Identifier (DOI)
https://doi.org/10.2298/CSIS130919057C
Publication information
Volume 11, Issue 3 (August 2014)
Special Issue on Mobile Collaboration Technologies and Internet Services
Year of Publication: 2014
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium
Full text
Available in PDF
Portable Document Format
How to cite
Chen, C., Tsaur, W., Chen, Y., Chang, Y.: A Secure Mobile DRM System Based on Cloud Architecture. Computer Science and Information Systems, Vol. 11, No. 3, 925–941. (2014), https://doi.org/10.2298/CSIS130919057C