Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.12.303

Analysis of Accountability for Trust DRM Cloud Service and Design of Monitoring Tool  

Lee, Hyejoo (School of Computing, Soongsil University)
Seo, Changho (Dept. of Applied Mathematics, Kongju National University)
Shin, Sang Uk (Dept. of IT Convergence and Application Engineering, Pukyong National University)
Publication Information
Journal of Digital Convergence / v.12, no.12, 2014 , pp. 303-311 More about this Journal
Abstract
The accountability of cloud service which provides the cloud users with accountable services applies various technologies such as the compliance of service policy, monitoring and auditing, logging, and others. It ultimately intends to provide trustworthy cloud service by determining who is accountable for various problems happened during data processing and service offering. In this paper, we propose a cloud ecosystem formed from the chain of content and DRM Cloud service in order to offer secure and trust DRM cloud service when providing high value-added content service. Besides this, we analyse the requirements of cloud services for content owners and users and then propose some logging information to be recorded for trace of accountability and a structure of tool for monitoring.
Keywords
Cloud computing; Accountability; Digital rights management; Content Service; Monitoring;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M. Tan and X. Su, Media Cloud: When Media Revolution Meets Rise of Cloud Computing, Proc. of The 6th IEEE International Symposium Service Oriented System Engineering(SOSE2011), pp. 251-261, 2011.
2 W. Zhu et al., Multimedia Cloud Computing, IEEE SIGNAL PROCESSING MAGAZINE. pp. 59-69, 2011.
3 http://www.icloud.com/
4 http://www.amazon.com/gp/feature.html/refcd_nav_lm?ie=UTF8&docId=1000796931
5 http://www.google.com/intl/ko/drive/
6 http://www.uvvu.com/
7 Microsoft, Microsoft PlayReady Content Access Technology, White Paper, 2008.
8 http://www.marlin-community.com/
9 http://www.openmobilealliance.org/
10 H. Lee, C, Heo, C, Seo, and S. U. Shin, Design and Implementation of DRM Proxy for DRM Cloud, KIPS Trans. on Comp. and Comm. Sys, Vol. 2, No. 9, pp. 553-560, 2012.   과학기술학회마을   DOI   ScienceOn
11 H. Lee, C. Seo, and S. U, Shin, DRM Cloud Architecture and Service Scenario for Content Protection, Journal of Internet Services and Information Security, Vol. 3, No 3, pp. 94-105, 2013.
12 N. Papanikolaou, S. Pearson, M. C. Mont, and R. Ko, A Toolkit for Automating Compliance in Cloud Computing Services, International Journal of Cloud Computing, Vol. 3, No. 1, pp. 46-68, 2014.
13 R. Accorsi, A secure log architecture to support remote auditing, Mathematical and Computer Modelling, Vol. 57, pp. 1578-1791, 2013.   DOI   ScienceOn
14 A. Gehani, G. F. Ciocarlie, and N. Shankar, Accountable Clouds, 2013 IEEE International Conference on Technologies for Homeland Securith(HST), pp. 403-407, 2013.
15 J. Yao, S. Chen, and C. Wang, Accountability as a Service for the Cloud, 2010 IEEE International Conference on Services Computing, pp. 81-88, 2010.
16 O. Q. Zhang, R. K L Ko, M. Kirchberg, C. H. Suen, P. Jagadpramana, B. S. Lee, How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms, 2012 IEEE 2011 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communication, pp. 1429-1437, 2012.
17 R. K. L. Ko, Data Accountability in Cloud Systems, Security, Privacy and Trust in Cloud Systems, pp. 211-238, Springer-Verlag, 2014.
18 R. K. L. Ko et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing, 2011 IEEE World Congress on Services, pp. 584-588, 2011.
19 O. Q. Zhan, M. Krichberg, R. K L Ko, and B. S. Lee, How to Track Your Data: The case for Cloud Computing Provenance, 2011 IEEE International Conference on Cloud Computing Technology and Science, pp. 446-453, 2011.
20 R. K. L. Ko, P. Jagadpramana, and B. S. Lee, Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments, 2011 IEEE 10th International Conference of on Trust, Security and Privacy in Computing and Communications(TrustCom), pp. 765-771, 2011.
21 http://www.highcloudsecurity.com/resources/whitepapers
22 S. Pearson et al., Accountability for Cloud and Other Future Internet Services, IEEE 5th International Conference on Cloud Computing Technology and Science, pp. 629-632, 2012.
23 http://www.a4cloud.eu/