Research Article

A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

Algorithm 1

Security steps.
1: procedure Security.Process(u, i, d)
2: u#.profile(name, sex, birth, ID.number, phone, address);
3: i#.info(insurance, category, cover.scope);
4: d#.info(disease, found, birth, phone.number);
5: REGISTERu#.profileTOm.Server;
6: STOREu#.profileINm.Server;
7: REQUESTu#.KEYTODRM;
8: GENERATEu#.KEYinDRM;
9: UPDATEu#.licence.PolicyinDRM;
10: u#.profile, m.Server([Sig&Encrypt][DRMAgent]);
11: while r ≠ 0do                        ▷
12:  SigSignature(u#.profile)
13:  EncEncrypt(u#.profile)
14:  NgoNegotiation(Sig, Eng)  ▷ negotiate between user and Server
15:  K.setFair(key(u#.profile, m.Server)fromDRM
16:  ShrShare(K.set)
17:  CrmConfirm(K.set
18:  l.CrmLicense.Confirm(DRM, KeyManagement.Service)
19: end while
20: return                           ▷
21: end procedure