collusive piracy prevention in p2p content delivery networks

30

Upload: vinay-saranadagoudar

Post on 16-Dec-2014

394 views

Category:

Technology


2 download

DESCRIPTION

Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients(colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We propose a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and timestampedtokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators,exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates willreceive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85- 98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.

TRANSCRIPT

Page 1: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 2: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 3: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 4: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 5: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 6: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 7: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS

1.Register (purchase the content)

2.Request Loginid,password,file

3.Digital Receipt (token)

4.Send Token

7.Data file

5.Check for id

6.User is auth or unauth

Illegal re

quest

Poisoned chunks

Page 8: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 9: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 10: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 11: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 12: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 13: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 14: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 15: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 16: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS

Start DA & request again

Page 17: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 18: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 19: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 20: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 21: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 22: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 23: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 24: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 25: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 26: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 27: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 28: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS

Stop Piracy at the Presence of Colluders.

Pirates Detected Immediately upon First Attempt.

Protection Scheme Performs Better for Large Files.

Negligible Detection and Poisoning Overhead.

Prototyping and Benchmark Experiments Needed.

Integration of Trusted P2P System with Reputation System and DRM Scheme.

Page 29: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Page 30: COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS