Collusive Piracy Prevention in P2P Content Delivery Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Aug 2010
21-08-2010, 11:39 PM

Abstract”Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients
(colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open
P2P networks for commercial content delivery. We propose a proactive content poisoning scheme to stop colluders and pirates from
alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and timestamped
tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators,
exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will
receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in
tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-
98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient
networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage
lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.
Index Terms”Peer-to-peer networks, content poisoning, copyright protection, network security.

Attached Files
.pdf   Collusive_Piracy_Prevention_in.pdf (Size: 3.14 MB / Downloads: 49)
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
17-09-2010, 04:29 PM

for more dedail abiut Collusive Piracy Prevention in P2P Content Delivery Networks

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Question Optimal Stochastic Location Updates in Mobile Ad Hoc Networks Guest 5 1,542 01-05-2014, 09:10 AM
Last Post: Guest
Last Post: seminar project topic
  accident prevention and Guest 0 411 14-09-2013, 07:37 PM
Last Post: Guest
  Link Positions Matter: A Non-Commutative Routing Metric for Wireless Mesh Networks Guest 0 438 27-06-2013, 09:03 PM
Last Post: Guest
  An Adaptive Opportunistic Routing for Wireless Ad-hoc Networks Guest 1 877 20-05-2013, 09:38 AM
Last Post: study tips
  fast data collection in tree based wireless sensor networks vodafonehutch 1 757 18-04-2013, 09:41 AM
Last Post: study tips
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Guest 0 455 05-04-2013, 10:56 AM
Last Post: Guest
  on optimizing overlay topologies for struted in unstruted peer to peer networks docum 0 468 09-03-2013, 05:49 PM
Last Post:
  bluetooth based smart sensor networks 5 2,411 05-03-2013, 09:59 AM
Last Post: seminar tips
  Traffic Simulation for Packet Telephony in Mobile Ad-hoc Networks Guest 0 541 24-09-2012, 10:11 AM
Last Post: Guest