| Peer-Reviewed

Authority System to Prevent Privacy Protection in Peer-to-Peer Network System

Received: 4 June 2013    Accepted:     Published: 20 June 2013
Views:       Downloads:
Abstract

Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.

Published in American Journal of Networks and Communications (Volume 2, Issue 3)
DOI 10.11648/j.ajnc.20130203.13
Page(s) 67-72
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Peer-to-Peer, Content Delivery Network, Reputation System, Colluder, Content Poisoning and Network Security

References
[1] N. Anderson(Sept. 2007), "Peer-to-Peer Poisoners: A Tour of Media- Defender," Ars Technica.
[2] S. Androutsellis-Theotokis and D. Spinellis (2004), "A Survey of Peerto- Peer Content Distribution Technologies," ACM Computing Surveys, vol. 36, pp. 335-371.
[3] S. Chen and X.D. Zhang(May 2006), "Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery," IEEE Trans. Knowledge and Data Eng., vol. 18, no. 5, pp. 669-682.
[4] N. Christin, A.S. Weigend, and J. Chuang(2005), "Content Availability,Pollution and Poisoning in File-Sharing P2P Networks," Proc. ACMConf. e-Commerce, pp. 68-77.
[5] E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante(2002), "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. ACM Conf. Computer and Comm. Security (CCS ’02), pp. 207-216.
[6] M. Fetscherin and M. Schmid(2003), "Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry,"Proc. Conf. e-Commerce.
[7] B. Gedik and L. Liu (June 2005), "A Scalable P2P Architecture for Distributed Information Monitoring Applications," IEEE Trans. Computers, vol. 56, no. 6, pp. 767-782.
[8] [T. Kalker, D.H.J. Epema, P.H. Hartel, R.L. Lagendijk (June 2004), and M. Van Steen, "Music2share—Copyright-Compliant Music Sharing in P2P Systems," Proc. IEEE, vol. 92, no. 6, pp. 961-970.
[9] B. Krishnamurthy, C. Wills, and Y. Zhang (Nov. 2001), "On the Use and Performance of Content Distribution Networks," Proc. Special Interest Group on Data Comm. on Internet Measurement Workshop (SIGCOMM).
Cite This Article
  • APA Style

    S. Uvaraj, N. Kannaiya Raja. (2013). Authority System to Prevent Privacy Protection in Peer-to-Peer Network System. American Journal of Networks and Communications, 2(3), 67-72. https://doi.org/10.11648/j.ajnc.20130203.13

    Copy | Download

    ACS Style

    S. Uvaraj; N. Kannaiya Raja. Authority System to Prevent Privacy Protection in Peer-to-Peer Network System. Am. J. Netw. Commun. 2013, 2(3), 67-72. doi: 10.11648/j.ajnc.20130203.13

    Copy | Download

    AMA Style

    S. Uvaraj, N. Kannaiya Raja. Authority System to Prevent Privacy Protection in Peer-to-Peer Network System. Am J Netw Commun. 2013;2(3):67-72. doi: 10.11648/j.ajnc.20130203.13

    Copy | Download

  • @article{10.11648/j.ajnc.20130203.13,
      author = {S. Uvaraj and N. Kannaiya Raja},
      title = {Authority System to Prevent Privacy Protection in Peer-to-Peer Network System},
      journal = {American Journal of Networks and Communications},
      volume = {2},
      number = {3},
      pages = {67-72},
      doi = {10.11648/j.ajnc.20130203.13},
      url = {https://doi.org/10.11648/j.ajnc.20130203.13},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20130203.13},
      abstract = {Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.},
     year = {2013}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Authority System to Prevent Privacy Protection in Peer-to-Peer Network System
    AU  - S. Uvaraj
    AU  - N. Kannaiya Raja
    Y1  - 2013/06/20
    PY  - 2013
    N1  - https://doi.org/10.11648/j.ajnc.20130203.13
    DO  - 10.11648/j.ajnc.20130203.13
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 67
    EP  - 72
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.20130203.13
    AB  - Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.
    VL  - 2
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Arulmigu Meenakshi Amman College of Engineering, Kanchipuram

  • Defence Engineering College, Ethiopia

  • Sections