The Community for Technology Leaders
RSS Icon
Issue No.07 - July (2009 vol.58)
pp: 970-983
Xiaosong Lou , University of Southern California, Los Angeles
Kai Hwang , University of Southern California, Los Angeles
Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We propose a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.
Peer-to-peer networks, content poisoning, copyright protection, network security.
Xiaosong Lou, Kai Hwang, "Collusive Piracy Prevention in P2P Content Delivery Networks", IEEE Transactions on Computers, vol.58, no. 7, pp. 970-983, July 2009, doi:10.1109/TC.2009.26
[1] N. Anderson, “Peer-to-Peer Poisoners: A Tour of Media-Defender,” Ars Technica, Sept. 2007.
[2], “BitTorrent Protocol Specification,” http://www.bittorrent.orgprotocol.html, 2006.
[3] S. Androutsellis-Theotokis and D. Spinellis, “A Survey of Peer-to-Peer Content Distribution Technologies,” ACM Computing Surveys, vol. 36, pp.335-371, 2004.
[4] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Advances in Cryptology (Crypto ’01), pp.213-229, 2001.
[5] S. Chen and X.D. Zhang, “Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery,” IEEE Trans. Knowledge and Data Eng., vol. 18, no. 5, pp.669-682, May 2006.
[6] A.K. Choudhury, N.F. Maxemchuk, S. Paul, and H.G. Schulzrinne, “Copyright Protection for Electronic Publishing over Computer Networks,” IEEE Trans. Networking, vol. 9, no. 3, pp.12-20, May/June 1995.
[7] N. Christin, A.S. Weigend, and J. Chuang, “Content Availability, Pollution and Poisoning in File-Sharing P2P Networks,” Proc. ACM Conf. e-Commerce, pp.68-77, 2005.
[8] E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, “A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS ’02), pp.207-216, 2002.
[9] D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, “Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems,” Proc. Int’l Conf. Measurement and Modeling of Computer Systems, pp.38-49, 2005.
[10] M. Fetscherin and M. Schmid, “Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry,” Proc. Conf. e-Commerce, 2003.
[11] J. Frankel and T. Pepper, “The Gnutella Protocol Spec. v0.4,” Revision 1.2, protocol_0.4.pdf , 2000.
[12] B. Gedik and L. Liu, “A Scalable P2P Architecture for Distributed Information Monitoring Applications,” IEEE Trans. Computers, vol. 56, no. 6, pp.767-782, June 2005.
[13] M. Hofmann and I. Beaumont, Content Networking, Architecture, Protocols, and Practice, S.F. Kaufmann, ed. 2005.
[14] Y. Itakura, M. Yokozawa, and T. Shinohara, “Model Analysis of Digital Copyright Piracy on P2P Networks,” Proc. Int’l Symp. Applications and the Internet Workshops (SAINT), pp.84-89, Jan. 2004.
[15] T. Iwata, T. Abe, K. Ueda, and H. Sunaga, “A DRM System Suitable for P2P Content Delivery and the Study on Its Implementation,” Proc. Asia-Pacific Conf. Comm. (APCC), vol. 2, pp.806-811, Sept. 2003.
[16] T. Kalker, D.H.J. Epema, P.H. Hartel, R.L. Lagendijk, and M. Van Steen, “Music2share—Copyright-Compliant Music Sharing in P2P Systems,” Proc. IEEE, vol. 92, no. 6, pp.961-970, June 2004.
[17] B. Krishnamurthy, C. Wills, and Y. Zhang, “On the Use and Performance of Content Distribution Networks,” Proc. Special Interest Group on Data Comm. on Internet Measurement Workshop (SIGCOMM), Nov. 2001.
[18] Y. Kulbak and D. Bickson, “The eMule Protocol Specification,” Technical Report TR-2005-03, Hebrew Univ., Jan. 2005.
[19] S.H. Kwok, “Watermark-Based Copyright Protection System Security,” Comm. ACM, pp.98-101, Oct. 2003.
[20] A. Legout, G. Urvoy-Keller, and P. Michiardi, “Rarest First and Choke Algorithms Are Enough,” Proc. ACM Special Interest Group on Data Comm. on Internet Measure (SIGCOMM), pp.203-216, 2006.
[21] E. Luoma and H. Vahtera, “Current and Emerging Requirements for Digital Rights Management Systems Through Examination of Business Networks,” Proc. 37th Ann. Hawai Int’l Conf. System Sciences, 2004.
[22] D.P. Majoras, O. Swindle, T.B. Leary, and J. Harbour, “Peer-to-Peer File-Sharing Technology: Consumer Protection and Competition Issues,” Federal Trade Commission Report, June 2005.
[23] N. Mook, “P2P Flooder Overpeer Cease Operation,” Beta News, Ceases_Operation 1134249644, Dec. 2005.
[24] N. Mook, “P2P Future Darkens as eDonkey Closes,” Closes 1127953242, Sept. 2005.
[25] G. Pallis and A. Vakali, “Insight and Perspectives for Content Delivery Networks,” Comm. ACM, pp.101-106, Jan. 2006.
[26] P. Rodriguez etal., “On the Feasibility of Commercial Legal P2P Content Distribution,” SIGCOMM Computer Comm. Rev., vol. 36, no. 1, pp.75-78, Jan. 2006.
[27] S. Saroiu etal., “An Analysis of Internet Content Delivery Systems,” SIGOPS Operating System Rev., pp.315-327, 2002.
[28] M. Srivatsa and L. Liu, “Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis,” Proc. 20th Ann. Computer Security Applications Conf., 2004.
[29] J. Sung, J. Jeong, and K. Yoon, “DRM Enabled P2P Architecture,” Proc. Eighth Int’l Conf. Advanced Comm. Technology (ICACT), vol. 1, pp.487-490, Jan. 2006.
[30] K. Walsh and E.G. Sirer, “Fighting Peer-to-Peer SPAM and Decoys with Object Reputation,” Proc. ACM Special Interest Group on Data Comm. (SIGCOMM) Workshop Economics of Peer-to-Peer Systems, pp.138-143, 2005.
[31] C. Wang, B.A. Alqaralleh, B.B. Zhou, F. Brites, and A.Y. Zomaya, “Self-Organizing Content Distribution in a Data Indexed DHT Network,” Proc. Sixth IEEE Int’l Conf. P2P Computing, pp.241-248, 2006.
[32] L. Xiao, Y. Liu, and L.M. Ni, “Improving Unstructured P2P Systems by Adaptive Connection Establishment,” IEEE Trans. Computers, vol. 54, no. 9, pp.1091-1103, Sept. 2005.
[33] M. Yurkewych, B.N. Levine, and A.L. Rosenberg, “On the Cost-Ineffectiveness of Redundancy in Commercial P2P Computing,” Proc. 12th ACM Conf. Computer and Comm. Security, 2005.
[34] R. Zhou and K. Hwang, “GossipTrust for Fast Reputation Aggregation in P2P Networks,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 9, pp. 1282-1295, Sept. 2008.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool