Adaptive Content Poisoning To Prevent Illegal File Distribution in P2P Networks

نویسندگان

  • Xiaosong Lou
  • Kai Hwang
چکیده

Digital content owners have attempted to use content poisoning to disrupt illegal distribution of copyrighted files in peer-to-peer (P2P) systems. This paper provides an analytical model to quantify the impact of content poisoning. Tradeoffs between content poisoning and download efficiency are revealed. In particular, we apply this poisoning model to transform and evaluate three popular P2P networks: BitTorrent, eDonkey, and eMule, for copyright-protected content delivery. We find that chunking protocol, hashing scheme, peer selection, decoy number, and decoy blacklisting play crucial roles to prevent illegal file distribution over P2P networks. We discover that BitTorrent is most resistant to content poisoning. Index poisoning could be a viable alternative to cope with copyright violation on BitTorrent. The eDonkey is less resistant to content poisoning than eMule. A new challenge-response protocol (CRP) is proposed using majority-vote on multiple chunk copies received. To control the level of poisoning, we adapt repeated peer selection (RPS) and decoy blacklisting techniques. Both eDonkey and eMule can apply CRP, RPS, and blacklisting to perform fine tuning of the content poisoning process. These mechanisms can transform eMule to become less resistant than eDonkey, which will serve the best interest of content owners. Finally, we elaborate on integrated research tasks needed to achieve seamless copyright protection in P2P networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Copyright-Protected Content Delivery in Open Peer-to-Peer Networks

Open peer-to-peer (P2P) networks are being grossly abused by illegal distribution of copyrighted music, games, video streams, and popular software. These abuses are resulted from lack of proper peer authentication, modifiable file indices, and unauthorized file access in a P2P network. Peer collusion is a major source of illegal sharing of content files among clients and pirates. We propose a n...

متن کامل

Proactive Content Poisoning To Prevent Collusive Piracy in P2P File Sharing

Today’s peer-to-peer (P2P) networks are grossly abused by Illegal distributions of music, games, video streams, and popular software. These abuses have resulted in heavy financial loss in media and content industry. Collusive piracy is the main source of intellectual property violations within the boundary of P2P networks. This problem is resulted from paid clients (colluders) illegally sharing...

متن کامل

Digital Business Models for Peer-to-Peer Networks: Analysis and Economic Issues

Peer-to-peer (P2P) services allow users to share networked resources, notably bandwidth and content, from the edges of the network. These services have been popularized because of file sharing — particularly the sharing of unlicensed copyrighted files. Concerns about such P2P file sharing were highlighted by content owners’ recent lawsuits against individual users and P2P network operators. How...

متن کامل

Is Deviant Behaviour the Norm on P2P File-Sharing Networks?

Major international law-enforcement initiatives are underway to fight the distribution of illegal pornography via the Internet. In this paper we examine the role of peerto-peer (P2P) file-sharing networks in illegal pornography distribution. First, we investigate the contention that these networks are especially implicated in illegal pornography distribution. Our finding is that this convention...

متن کامل

The Arms Race in P2P

Peer-to-peer (P2P) networks have recently grown in popularity for a variety of applications such as content distribution, streaming multimedia and voice-over IP. P2P networks are built around a decentralized architecture to distribute data in a manner that offers high availability of content, inherent fault-tolerance and efficiency. While P2P networks offer several important advantages over tra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006