File(s) under permanent embargo
You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center
journal contribution
posted on 2020-11-01, 00:00 authored by Leo ZhangLeo Zhang, Y Zheng, J Weng, C Wang, Z Shan, K RenThe wide adoption of cloud greatly facilitates the sharing of explosively generated media content today, yet deprives content providers' direct control over the outsourced media content. Thus, it is pivotal to build an encrypted cloud media center where only authorized access is allowed. Enforcing access control alone, however, cannot fully protect content providers' interests, as authorized users may later become traitors that illegally redistribute media content to the public. Such realistic threat should have been seriously treated yet is largely overlooked in the literature. In this paper, we initiate the first study on secure media sharing with fair traitor tracing in the encrypted cloud media center, through a new marriage of proxy re-encryption (for secure media sharing) and fair watermarking (for fair traitor tracing). Our key insight is to fully leverage the homomorphic properties residing in proxy re-encryption to embrace operations in fair watermarking. Two protocols are proposed for different application scenarios. We also provide complexity analysis for performance, showing that our work can also be treated as secure outsourcing of fair watermarking, and thus kills two birds with one stone. We thoroughly analyze the security strengths and conduct extensive experiments to validate the effectiveness of our design.
History
Journal
IEEE transactions on dependable and secure computingVolume
17Issue
6Season
Nov-DecPagination
1218 - 1231Publisher
Institute of Electrical and Electronics EngineersLocation
Piscataway, N.J.Publisher DOI
ISSN
1545-5971Language
engPublication classification
C1 Refereed article in a scholarly journalCopyright notice
2018, IEEEUsage metrics
Categories
Keywords
access controlencrypted cloud media centerproxy re-encryptiontraitor tracingwatermarkingScience & TechnologyTechnologyComputer Science, Hardware & ArchitectureComputer Science, Information SystemsComputer Science, Software EngineeringComputer ScienceMediaCloud computingCryptographySECURECHALLENGESEFFICIENTComputer SoftwareData FormatDistributed Computing