View/Open

advertisement
PRIVACY-PRESERVING DIGITAL RIGHTS MANAGEMENT
(DRM) IN CLOUD NETWORKING
Ms.Swapna D.Lokhande , Prof. Tarun Yenganti
CSE Department, RTMN University
ABHA Gaikwad-Patil College of Engineering ,Nagpur ,India
swapna.lokhande@gmail.com
Abstract—
based on different engineering courses offered by any
The proposed system Privacy-Preserving Digital Rights
Management (DRM) in Cloud Networking is the concept for
computer networking and management for software product
purchasing on internet or cloud along with rights assign to the
authorized users within the Cloud along with security which
can be achieved by preserving the privacy of the software
products in a friendly manner. At the same time, this approach
guarantees that software is bound to users and their validity is
checked before execution. This is done using RSS feed of
student database.
engineering college. When any branch is selected it gives
details of students of that particular branch. This feed is
designed using MYSQL and XML.
1.2 Digital Rights Management (DRM):
DRM is the tool used to secure the digital
contented on internet. So RSS feed is protected using DRM
techniques on cloud. When the product of RSS feed is
Keywords— DRM, privacy, multiple keys, rights, encryption,
purchased by any user then the user is provided an product
RSS, cloud, security.
code. These product key acts as an password that without
product key the product cannot be accessed. This product
I. INTRODUCTION
key is implemented as encryption technique. In this
proposed work re-encryption technique is used. Each time
The new digital world has brought with it
the user need to subscribe the RSS feed he has to enter the
rapid technological change, particularly on the internet.
product code is to be inserted. This product key will be same
Digital networks have profoundly changed how we distribute
each time the user subscribe but each time product code
different products and the ways that individual’s access and
encryption method will be different. In this proposal three
enjoy such works. Companies are looking into ways to sell
types of techniques are used they are as follows:
their contents such as books, music, etc. over the internet
1) Message Digest Algorithm (MD5)
world without the buyer being able to advance distribution of
2) Secure Hash Algorithm SHA1
the work. Digital Rights Management (DRM) systems deal
3) Crypt()
with this; their main target is to unable authorized users to
access a version of digital content on the terms of which they
are authorized whilst preventing all other access to digital
content. In this proposed system an RSS feed is created and
using DRM techniques its privacy and security is preserved
and then it is deployed in cloud.
1.1 Rich Site Summaries (RSS):
1.3 Deployment on Cloud:
DRM in used in networking like LAN, MAN,
internet, mobile or wireless but not implemented on cloud
computing therefore this proposed scheme preserves the
privacy and provides security to the RSS content with the
help of DRM Techniques in cloud network. To deploy this
RSS feed on cloud proper first an authenticated account
Rich site summary (RSS) is a tool that is
should be there; this is done through proper registration in
being used by millions of web users around the world to
the cloud same as the process done for google registration is
keep track of their favourite websites or news blogs etc. In
done this is done in stepwise process. This deployment is
this proposed proposal an RSS feed is twisted which is
done in two forms which is as follows.
1) Login to cloud network
<rss version="0.91">
- Enter into cloud admin panel
 The initial line declares the document to be an XML
- Create container or folder which is a process of access key
document. The second lines, the DTD statement, denote that
generation.
this XML file is based on the RSS 0.91 document type
- Create any container with any name and save it with .pem
definition, DTD, at Netscape. Finally, the root element marks
extension.
the beginning of the RSS file content,
2) Zendstudio part which is used for cloud network for
Step.3. The channel element
coding of different form.
<channel>
<title>MozillaZine</title>
II. IMPLEMENTATION
<link>http://www.mozillazine.org</link>
<description>Your
2.1 Creating RSS feed :
source
for
Mozilla
news,
advocacy, interviews, builds, and more!
RSS files are metadata. An RSS file commonly
</description>
contains four main types of elements: channel, image, items,
and text input. These elements are easy to identify and code.
<language>en-us</language>
Step 1: A sample item in RSS :
</channel>
 You can build RSS files to either the proposed RSS 1.0
 The channel component contains the residual channel tags,
specification, or to the currently more popular RSS 0.91 spec.
which describe the channel and allows it to be displayed in
For production applications, use RSS 0.91, because the 1.0
HTML. The title can be delicacy as a headline link with the
proposal is still under consideration.
description following. The Channel Language meaning allows
 The 1.0 proposal differs from the 0.91 format in one main
aggregators to filter news feeds and gives the rendering
manner. It transforms Resource Description Framework
software the information necessary to display the language
(RDF) elements that allow greater flexibility at the expense of
properly.
some increased complexity. This proposed plan is more
 The </channnel> tag is used at the end of all the channel
extensible, creating a W3C standard for RSS files that will
component to close the channel. As RSS obey the rules to
meet current needs, will be as backwards-compatible as
XML spectacles the element must be well formed; it requires
possible, and will be adaptable to future requirements.
the closing tag.
 Both versions of the plan share the feature of being a
Step 4. The image element
lightweight format that developers can use for many purposes.
<image>
 RSS is an XML application. Because of this, all RSS
<title>MozillaZine</title>
documents begin with the XML 1.0 pronouncement followed
by the RSS certificate type declaration, as shown in Listing 2.
Step 2. The XML declaration
<url>http://www.mozillazine.org/image/mynetscape88.gif</ur
l>
<?xml version="1.0"?>
<link>http://www.mozillazine.org</link>
<!DOCTYPE rss PUBLIC "-//Netscape
<width>88</width>
Communications//DTD RSS 0.91//EN"
<height>31</height>
"http://my.netscape.com/publish/formats/rss-0.91.dtd">
</image>
 The imagery title, URL, link, width, and height tags allow
2.2 How DRM Techniques are implemented on RSS Feed.
renderers to translate the file into HTML. The title tag is
The RSS feed contains the different branches having data of
normally used for the image's ALT text.
students.
 Step 5. The item element

 To access this information the feed has to be subscribed.
The items are allowed in a channel. This is a logical
 For subscribing the authorized user is assign a product code.
restriction because most people use channels to distribute
 This product code acts as a password without which the
recent Web content.
feed cannot be accessed.

 When the end user enters the product code it is checked
Much of the splendor of the RSS format lies in the item
element.
with the encrypted code of the product code already stored in

database is matched if it matches the feed is accessed
The text input region is an optional component, with only
one allowed per channel. Usually provide as an HTML form,
otherwise error to retry the subscription process.
text input lets the user respond to the channel.
 Each time the user enters the same product code while
Step 6. The text input element
subscribing different encrypted code of the same product code,
<textinput>
i.e. there is one product code but encrypted into three different
<title>Send</title>
encryption codes.
<description>Comments about
 These three methods of encryption are MD5 (), SHA1 (),
MozillaZine?</description>
crypt ().
<name>responseText</name>
 To in build it in one form PHP is used.
<link>http://www.mozillazine.org/cgi-
2.2.1. MD5():
bin/sampleonly.cgi</link>
MD5 message-digest algorithm takes as input a message of
</textinput>
uninformed length and create as output a 128-bit "fingerprint"
or "message digest" of the input .The MD5 algorithm is

The title is normally turn into as the label of the form's
proposed for digital signature relevance, where a large file
submit button, and the description as the text displayed before
must be "compressed" in a secure manner before being
or above the input field. The text contribution name is full
encrypted with a private (secret) key under a public-key
along with the contents of the text field when the submit
cryptosystem such as RSA.” Steps for implementing MD5().
button is clicked.
• Step1 Append padding bits

• Step2 Append length
These are the four main elements of an RSS file. After
accumulation of the image, item, and text input elements,
• Step3 Initialize MD buffer
remember to close the channel with the </channel> tag and the
• Step4 Process message in 16-word
RSS file with the </rss> tag.
 The proposed RSS 1.0 plan set ups the modules, which will
permit RSS to be extended to accommodate additional
information without rewriting the specification. For example,
you could write a module to append rich media to your
channel for broadband clients while standard clients would
still see headlines and descriptions.
2.2.2.SHA-1()
SHA-1() is a technique of cryptographic hash function
designed by the United States National Security Agency and
published by the United States NIST as a U.S. Federal
Information Processing Standard. SHA stands for "secure hash
algorithm is as follows
Step 1: Append Padding Bits.
Step 2: Append Length.
4) The limitation of an cloud is only two container is to be
Step 3: Prepare Processing Functions.
build and each container can build unlimited
Step 4: Prepare Processing Constants.
depending on requirement
Step 5: Initialize Buffers.
5) The database is entered for this click on
Management->Database
2.2.3 Crypt ():
Crypt() is the documents function which is used to compute a
password hash that can be used to store user account
passwords while keeping them relatively secure (a passwd
Management
->
subfolders
Manage
your
database using myphpadmin
6) In myphpadmin the whole database is divided into four
parts
file). The production of the function is not simply the hash—
1) Product Key Master
it is a text string which also encodes the salt (usually the first
2) Students
two characters are the salt itself and the rest is the hashed
3) Students master
result), and identifies the hash algorithm used (defaulting to
4) Subscription
the "traditional" one explained below). This result string is
7) In product key master the encrypted code of the product
what is meant for putting in a password record which may be
key is stored. There are three encrypted code which is done by
stored in a plain text file.
using three methods MD5,sha1,crypt function .
People often get baffled about how to use implement
8) When any end user use product code for subscription ,
a password store using crypt(). It is actually very simple but it
the first time when user enter the product key it is encrypted
helps to know that:
and match with the key stored in product key master in
 It is secure to stock up the salt together with the password
database.
hash. An attacker is unable to use it to make a dictionary
9) This key is encrypted using md5 () function.
attack easier.
10) Second time the encrypted code is matched with the sha1
 The return value from crypt () is the string mergeging of
the salt you give it and the hash.
 crypt ( ) ignores excess characters in the key salt string.
() encrypted code.
11) Third time it is matched with encrypted with Crypt ()
encrypted code.
12) In Students part the database about all branches i.e.
2.3. Cloud Networking:
In the proposed system PHP cloud is
Computer Science, Mechanical, Electronics etc. is entered.
13) In
Students master the database regarding students
used and the created application is deployed on cloud. The
details is entered.
following is the stepwise process for cloud.
14) In Subscription the encrypted key and data related to
1) Login to cloud in the proposed system php cloud is used.
subscription is entered.
Therefore enter
15) The coding related to RSS and main window is done by
www.phpcloud.com.
2) Click on “login here” option and enter the login ID and
using zendstudio generally used by phpcloud.
password.
16) To create new project in any container of phpcloud in
3) After entering into your account an container is to be
zendstudio click on file-> new file and select Local php
build where the project coding is to be feeded.
project.
17) Create a local php project window will get open then
privacy is maintained in cloud. In this it is assumed that an
enter project name and select zend framework and then click
RSS Feed is purchased or installed in the server and its
on NEXT button.
privacy is maintained using DRM in cloud network. DRM
18) Then a new window of New PHP project will get open.
technologies may represent the future of information access.
Click on Launch Setting then click on Launch With Zend
Application Deployment and click on PHP cloud and click on
NEXT
19) A new window of Phpcloud Target Detail in this enter
ACKNOWLEDGMENT
I would like to take this opportunity to express my sincere
thank to all the people who have contributed me for the
successful completion of the paper.
REFERENCES
username and password. Enter the same password and
username used for phpcloud login. In browse option the secret
[1]
key is entered assign while registration process for cloud is
done. And click on FINISH button.
[2]
20) Another window of OVERVIEW open in it just click on
[3]
Launch Application. The process of launching the project
starts and after ten to fifteen minutes the project gets deployed
[4]
on cloud.
III. CONCLUSIONS
[5]
In the proposed system it is pointed out that a
[6]
DRM system is crucial for software providers therefore
[7]
implementing in cloud networking. One major design goal of
our concept is the protection of users’ privacy. The encryption
based RSS Student feed privacy is maintained, combined with
the software re-encryption scheme makes sure that user’s
[8]
Eindhoven University of Technology, Department of
Mathematics and Computer Science E-mail: h.l.jonker@stud.tue.nl,
s.mauw@tue.nl.
“Privacy-Preserving DRM for Cloud Computing” Ronald Petrlic
Department of Computer Science University of Paderborn 33098
Paderborn, Germany ronald.petrlic@upb.de.
Perlman, C. Kaufman, and R. Perlner, “Privacy- Preserving DRM,” in
Proceedings of the 9th Symposium on Identity and Trust on the
Internetser. IDTRUST’10. New York, NY, USA: ACM, 2010, pp.
69–83.[Online].
J. E. Cohen, “DRM AND PRIVACY,” Berkeley Technology Law
Journal, vol. 18, pp.575–617, 2003, Georgetown Public Law Research
Paper No.372741.
C.Conrado, M. Petkovic, and W. Jonker, “Privacy- preserving digital
rights management,” in Secure Data Management, ser. Lecture Notes
in Computer Science, vol. 3178. Springer, 2004, pp. 83–99.R.
Iannella (2001, June). “Digital rights management Architectures” D-Lib
R. L. Rivest, A. Shamir, and L. Adleman.
“A method for obtaining digital signatures and public-key
cryptosystems,” Commun. ACM,vol. 21, pp. 120–126, Feb. 1978.
[Online]. Available://doi.acm.org /10.1145/359340.359342.
M. Ali, “Green Cloud on the Horizon,” in Proceedings of the 1st
International Conference on Cloud Computing (CloudCom), pp. 451459, December 2009.
Download