Reference Hub3
Blockchain-Based Digital Rights Management Techniques

Blockchain-Based Digital Rights Management Techniques

Nguyen Ha Huy Cuong, Gautam Kumar, Vijender Kumar Solanki
Copyright: © 2021 |Pages: 13
ISBN13: 9781799834441|ISBN10: 1799834441|ISBN13 Softcover: 9781799834458|EISBN13: 9781799834465
DOI: 10.4018/978-1-7998-3444-1.ch008
Cite Chapter Cite Chapter

MLA

Cuong, Nguyen Ha Huy, et al. "Blockchain-Based Digital Rights Management Techniques." Large-Scale Data Streaming, Processing, and Blockchain Security, edited by Hemraj Saini, et al., IGI Global, 2021, pp. 168-180. https://doi.org/10.4018/978-1-7998-3444-1.ch008

APA

Cuong, N. H., Kumar, G., & Solanki, V. K. (2021). Blockchain-Based Digital Rights Management Techniques. In H. Saini, G. Rathee, & D. Saini (Eds.), Large-Scale Data Streaming, Processing, and Blockchain Security (pp. 168-180). IGI Global. https://doi.org/10.4018/978-1-7998-3444-1.ch008

Chicago

Cuong, Nguyen Ha Huy, Gautam Kumar, and Vijender Kumar Solanki. "Blockchain-Based Digital Rights Management Techniques." In Large-Scale Data Streaming, Processing, and Blockchain Security, edited by Hemraj Saini, Geetanjali Rathee, and Dinesh Kumar Saini, 168-180. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-3444-1.ch008

Export Reference

Mendeley
Favorite

Abstract

The usage of information is essential for data-driven capabilities in artificial intelligence. The data-driven AI techniques lead to several security and privacy concerns. Among various digital techniques, digital rights management is required as one of collaboration scheme that ensures the security and privacy of intellectual rights. Though a number of researchers have proposed various security techniques, none of them have proposed an efficient and effective privacy procedure for digital rights. Recently, blockchain technique is considered as one of the major security methods to ensure a transparent communication among individuals. It can be used by various applications such as industries, marketing, transportation systems, etc. The aim of this chapter is to propose an ensured resource allocation algorithm that validates the scheme by comparing various security measures against previous approaches. Further, the proposed phenomenon ensures the transparency on security and privacy due to its integration.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.