Hossein Ghodosi, Hossein
James Cook University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Scenarios for Securing Content Delivery in the DRM Environment Prihandoko, Antonius Cahya; Ghodosi, Hossein; Litow, Bruce
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the DRM environment, content is usually distributed in an encrypted form. Typically,a secure encryption algorithm is utilized to accomplish such protection. However, executingthis algorithm in an insecure environment may allow adversaries to compromise the system andobtain information about the decryption key. Keeping such a key secret is a major challengefor content distribution systems. We consider two solutions for securing content delivery. Thefirst solution involves modifying the algorithm in such a way as to make implementation unintelligible.The second solution involves setting a buyer-seller protocol to communicate the keysecurely. In addition, the protocol can be set to achieve security for the content provider andprivacy protection for user. This paper describes a study of these scenarios for DRM applicationsw.r.t securing content delivery.
Balanced Security and Privacy Protection in Digital Content Distribution Systems Prihandoko, Antonius Cahya; Pinasthika, Stanislaus Jiwandana; Ghodosi, Hossein
Jurnal Teknologi dan Manajemen Vol 6, No 2 (2025): July
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat ITATS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31284/j.jtm.2025.v6i2.7800

Abstract

Security protection for content providers is essential in a digital content distribution system so that only authorized users can access the content. However, focusing on the security aspect often makes the system ignore the privacy of content users. This article presents a model of protocol that can provide balanced protection of content provider security and user privacy in a digital content distribution system. This protocol is based on oblivious transfer (OT), a standard protocol in cryptography that allows the sender of a message to send a certain amount of information securely to the recipient of the message, such that at the end of the protocol the recipient of the message cannot access more information than specified, while the sender of the message cannot know which information was successfully accessed by the recipient. Assuming the existence of tamper-proof devices, the protocol presented in this article can provide excellent protection for both the security of content providers and the privacy of content users.