Font Size: a A A

The Research And Design Of Encryption Schemes On DRM

Posted on:2012-10-26Degree:MasterType:Thesis
Country:ChinaCandidate:M HeFull Text:PDF
GTID:2218330338953297Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of network communication and computer technology,digital products spread on internet such as audio frequency and video, eBooks, pictures and software have been integrated into the daily life of people. These digital products have some characteristics such as spreading speedily, easy replication and distribution etc. However, the piracy incidents on line occurred more frequently while they bring convenience to people, and the piracy and tort of digital products has become the biggest obstacle to digital industrialization. To protect the copyright of digital products and the lawful rights of the authors, all social circles put in a great deal of resources to struggle with piracy, and then the Digital Rights Management(DRM) System appeared. DRM System encapsulates digital products by various of security technologies, making that only users who acquire related permissions can use the digital products but others can't get related contents, thus the interests of the copyright owners and the relevant parties can get guarantee effective. As one of the most basic information security technology, data encryption can provide the most basic and safest protection to digital products in the DRM System. However, it takes a very expensive system resources and time to encrypt digital products. Therefore, using what method can make the processing of the data encryption effectively as well as safe and continuous is a problem worth researching deeply.Aiming at the problems of data encryption in the offline processing mode with low efficiency in DRM System, this paper proposes M-S cluster encryption model based on the cluster technology and the improved model that has been optimized twice. Meanwhile, the cluster encryption scheduling algorithm based on service expectation is presented to improve the efficiency of encryption module from the whole concurrent processing, improving the overall service ability of the encryption module. Finally, aiming at the defects of traditional key management, the three-level key protection mechanism is proposed to ensure the security of the encryption key during the design of the encryption module; To handle the balance between safety and performance of single file's encryption, adaptive encryption scheme is presented; And breakpoint recovery technology is proposed to satisfy the special requirements of the system robustness in encryption module. The overall performance of encryption module is improved in terms of safety, efficiency and system continuity, and it has important significance to build excellent encryption schemes on DRM.
Keywords/Search Tags:DRM, Cluster Encryption, Service Expectation, Three-Level Key Protection, Breakpoint Recovery
PDF Full Text Request
Related items