VTUF-Collusive Piracy Prevention in P2P Content Delivery Networks full report
Active In SP
Joined: Mar 2010
22-03-2010, 11:17 PM
VTUF-Collusive Piracy Prevention in P2P Content Delivery Networks.doc (Size: 43 KB / Downloads: 195)
1. AIMS AND OBJECTIVE: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
The main sources of illegal file sharing are peers who ignore copyright laws and collude with pirates. To solve this peer collusion problem, we propose a copyright-compliant system for legalized P2P content delivery.
Our goal is to stop collusive piracy within the boundary of a P2P content delivery network. In particular, our scheme appeals to protecting large-scale perishable contents that diminish in value as time elapses.
2. Literature Survey:
2.1 Peer-to-peer (P2P): is a general label that was originally used to identify network protocols where all the nodes have the same role and there are no nodes with a special responsibility to monitor or supervise the network behavior. Recently, the term has been mainly used to identify a family of applications that exploit the Internet to offer services where each participant acts both as a client and as a resource provider.
2.2 JAVA: Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. Java applications are typically compiled to byte code that can run on any Java virtual machine (JVM) regardless of computer architecture.
220.127.116.11 Simple: Java was designed to be easy for the professional programmer to learn and use effectively. Java has another attribute that makes it easy to learn. It makes an effort not to have surprising features.
18.104.22.168 Object-Oriented: Although influenced by its predecessors, Java was not designed to be source-code compatible with any other language. This allowed the Java team the freedom to design with a blank slate.
22.214.171.124 Robust: The multi platform environment of the web pages extraordinary demands on a program, because the program must execute reliably in a variety of systems. Thus the ability to create robust programs was given a high priority in the design of Java.
126.96.36.199 Multithreaded: Java was designed to meet the real-world requirement of creating interactive, networked programs. To accomplish this, Java supports multithreaded programming, which allows you to write programs that do many things simultaneously.
188.8.131.52 Architectural-Neutral: A central issue for the designers was that of code longevity and portability. One of the main problems facing programmers is that no guarantee exists that if you write a program today, it will run tomorrow-even on the same machine.
184.108.40.206 Interpreted and High Performance: Java enables the creation of cross-platform programs by compiling into an intermediate representation called java byte code. This code can be interpreted on any system that provides a Java Virtual Machine.
220.127.116.11 Distributed: Java is designed for the distributed environment of the Internet, because it handles TCP/IP protocols. In fact, accessing a resource using a URL is not much different from accessing a file. The original version of Java (Oak) included features for intra-address-space messaging. Eg-RMI.
18.104.22.168 Dynamic:Java programs carry with them substantial amounts of run-time type information that is used to verify and resolve accesses to objects at run time. This makes it possible to dynamically link code in a safe and expedient manner.
3. Problem Definition: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
4.1 EXISTING SYSTEM: PEER-TO-PEER (P2P) networks are most cost-effective in delivering large files to massive number of users. Unfortunately, todayâ„¢s P2P networks are grossly abused by illegal distributions of music, games, video streams, and popular software. These abuses have not only resulted in heavy financial loss in media and content industry, but also hindered the legal commercial use of P2P technology.
4.2 PROPOSED SYSTEM: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
We propose a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively.
4.3.1 TRANSACTION SERVER: The clients first communicates transaction server to purchase the content and after client receives a digital receipt containing the content title, client ID, etc. This receipt is encrypted such that only content owner and distribution agent can decrypt. The client receives the address of the bootstrap agent as its point of contact. The joining client authenticates with the bootstrap agent using the digital receipt. Since the bootstrap agent is set up by the content owner, it decrypts the receipt and authenticates its identity.
4.3.2 PEER AUTHORIZATION TECHNIQUE: This technique provides a procedure to generate tokens for authorizes a file download access to by peers. The Peer authorization technique is formally specified for verifying the download privilege of a requesting peer before clean file chunks are shared with the requestor. If the requestor fails to present proper credentials, the client must send poisoned chunks.
4.3.3 Colluder Detection: This module is designed to tolerate the presence of colluders in the network. Because the reduced number of colluders will help to improve the system performance. Therefore we introduce a reputation-based colluder detection mechanism to secure our system from piracy. For detection the distribution agents randomly recruit clients, called decoys, to send illegal download requests to suspected peers. If an illegal request is returned with a clean file chunk, the decoy reports the collusion event and it will unauthorized the peer.
4.3.4 Private Key generator: A private key generator (PKG) is used to generate private keys for securing communication among the peers. The PKG has a similar role of a certificate authority in PKI (Public Key Infrastructure) services. The difference lies in the fact that Certificate Authority generates the private key pairs. The transaction server and PKG are only used initially when peers are joining the P2P network. In our system, file distribution and copyright protection are distributed through private keys.
5. DATA FLOW DIAGRAM:
Yes Client Storage Cache
6. Application: Knowledge Industry, Entertainment industry, Research Organization.
7. Conclusion: Finaly the scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively.
8. SOFTWARE REQUIREMENTS:
Server : Windows 2000
Client : Windows 2000/XP
Software : J2EE, JDK â€œ JRE
Java Technologies : Swing, Java.net
9. HARDWARE REQUIREMENTS:
Processor : PIV or higher processor
Hard Disk : 120 GB
MONITOR : SVGA Colour
Keyboard : Standard
Mouse : PS/2 Mouse
 N. Anderson, Peer-to-Peer Poisoners: A Tour of Media-Defender, Ars Technica, Sept. 2007.
 BitTorrent.org, BitTorrent Protocol Specification, bittorrent.org /protocol.html, 2006.
 S. Androutsellis-Theotokis and D. Spinellis, A Survey of Peer-to-Peer Content Distribution Technologies, ACM Computing Surveys, vol. 36, pp. 335-371, 2004.
 D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Proc. Advances in Cryptology (Crypto â„¢01), pp. 213-229, 2001.
 S. Chen and X.D. Zhang, Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery, IEEE Trans. Knowledge and Data Eng., vol. 18, no. 5, pp. 669-682, May 2006.
 A.K. Choudhury, N.F. Maxemchuk, S. Paul, and H.G. Schulzrinne, Copyright Protection for Electronic Publishing over Computer Networks, IEEE Trans. Networking, vol. 9, no. 3, pp. 12-20, May/June 1995.
 N. Christin, A.S. Weigend, and J. Chuang, Content Availability, Pollution and Poisoning in File-Sharing P2P Networks, Proc. ACM Conf. e-Commerce, pp. 68-77, 2005.
 E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, A Reputation-Based Approach for Choosing
Reliable Resources in Peer-to-Peer Networks, Proc. ACM Conf. Computer and Comm. Security (CCS â„¢02), pp. 207-216, 2002.
 D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems, Proc. Intâ„¢l Conf. Measurement and Modeling of Computer Systems, pp. 38-49, 2005.
 M. Fetscherin and M. Schmid, Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry, Proc. Conf. e-Commerce, 2003.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP
Joined: Apr 2009
10-12-2010, 08:28 AM
hello im chandramohan doing mtech im looking for a project and implimentation titled as Collusive Piracy Prevention in P2P Content Delivery Networks so if u hav more information about this project and implimentation please mail me to firstname.lastname@example.org
Active In SP
Joined: Sep 2010
13-12-2010, 12:15 PM
read more from the below thread
Active In SP
Joined: Mar 2011
09-03-2011, 11:34 AM
if any one having full reports on the project and implimentation, PLZ send the link and attachments, if any.[/font]