Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.
Published in | American Journal of Networks and Communications (Volume 2, Issue 3) |
DOI | 10.11648/j.ajnc.20130203.13 |
Page(s) | 67-72 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2013. Published by Science Publishing Group |
Peer-to-Peer, Content Delivery Network, Reputation System, Colluder, Content Poisoning and Network Security
[1] | N. Anderson(Sept. 2007), "Peer-to-Peer Poisoners: A Tour of Media- Defender," Ars Technica. |
[2] | S. Androutsellis-Theotokis and D. Spinellis (2004), "A Survey of Peerto- Peer Content Distribution Technologies," ACM Computing Surveys, vol. 36, pp. 335-371. |
[3] | S. Chen and X.D. Zhang(May 2006), "Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery," IEEE Trans. Knowledge and Data Eng., vol. 18, no. 5, pp. 669-682. |
[4] | N. Christin, A.S. Weigend, and J. Chuang(2005), "Content Availability,Pollution and Poisoning in File-Sharing P2P Networks," Proc. ACMConf. e-Commerce, pp. 68-77. |
[5] | E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante(2002), "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. ACM Conf. Computer and Comm. Security (CCS ’02), pp. 207-216. |
[6] | M. Fetscherin and M. Schmid(2003), "Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry,"Proc. Conf. e-Commerce. |
[7] | B. Gedik and L. Liu (June 2005), "A Scalable P2P Architecture for Distributed Information Monitoring Applications," IEEE Trans. Computers, vol. 56, no. 6, pp. 767-782. |
[8] | [T. Kalker, D.H.J. Epema, P.H. Hartel, R.L. Lagendijk (June 2004), and M. Van Steen, "Music2share—Copyright-Compliant Music Sharing in P2P Systems," Proc. IEEE, vol. 92, no. 6, pp. 961-970. |
[9] | B. Krishnamurthy, C. Wills, and Y. Zhang (Nov. 2001), "On the Use and Performance of Content Distribution Networks," Proc. Special Interest Group on Data Comm. on Internet Measurement Workshop (SIGCOMM). |
APA Style
S. Uvaraj, N. Kannaiya Raja. (2013). Authority System to Prevent Privacy Protection in Peer-to-Peer Network System. American Journal of Networks and Communications, 2(3), 67-72. https://doi.org/10.11648/j.ajnc.20130203.13
ACS Style
S. Uvaraj; N. Kannaiya Raja. Authority System to Prevent Privacy Protection in Peer-to-Peer Network System. Am. J. Netw. Commun. 2013, 2(3), 67-72. doi: 10.11648/j.ajnc.20130203.13
AMA Style
S. Uvaraj, N. Kannaiya Raja. Authority System to Prevent Privacy Protection in Peer-to-Peer Network System. Am J Netw Commun. 2013;2(3):67-72. doi: 10.11648/j.ajnc.20130203.13
@article{10.11648/j.ajnc.20130203.13, author = {S. Uvaraj and N. Kannaiya Raja}, title = {Authority System to Prevent Privacy Protection in Peer-to-Peer Network System}, journal = {American Journal of Networks and Communications}, volume = {2}, number = {3}, pages = {67-72}, doi = {10.11648/j.ajnc.20130203.13}, url = {https://doi.org/10.11648/j.ajnc.20130203.13}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20130203.13}, abstract = {Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.}, year = {2013} }
TY - JOUR T1 - Authority System to Prevent Privacy Protection in Peer-to-Peer Network System AU - S. Uvaraj AU - N. Kannaiya Raja Y1 - 2013/06/20 PY - 2013 N1 - https://doi.org/10.11648/j.ajnc.20130203.13 DO - 10.11648/j.ajnc.20130203.13 T2 - American Journal of Networks and Communications JF - American Journal of Networks and Communications JO - American Journal of Networks and Communications SP - 67 EP - 72 PB - Science Publishing Group SN - 2326-8964 UR - https://doi.org/10.11648/j.ajnc.20130203.13 AB - Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources. VL - 2 IS - 3 ER -