Secure Digital Contents Distributing System on P2P Networks

被引:0
|
作者
Ing-Chau Chang [1 ]
Hung-Wen Yang [2 ]
机构
[1] Department of Computer Science and Information Engineering, National Changhua University of Education
[2] Department of Computer Science and Information Engineering, National Chung Hsing University
关键词
Bit-Torrent; content sharing; digital rights management; peer-to-peer networks; security;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
In recent years, the file-sharing applications of peer-to-peer (P2P) systems, such as Napster, Bit-Torrent (BT), Gnutella, have become very popular, with BT offering particularly high scalability and efficiency service to transmit files. But BT does not enforce the access control process, so a lot of unauthorized files are freely shared. In this paper, we proposed a digital rights management (DRM) system for BT environment to solve the serious piracy issue by using lightweight encryption methods in order to be adopted by small mobile devices in wireless environment.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 50 条
  • [41] Secure Data Management in P2P Social Networks Using Access Tokens
    Al-Amin, Mohammed Hamed
    Elgamel, Mohamed Shaheen
    Abdel-Hamid, Ayman
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 500 - 505
  • [42] PJ-Sec: secure node joining in mobile P2P networks
    Sumit Kumar Tetarave
    Somanath Tripathy
    CCF Transactions on Pervasive Computing and Interaction, 2021, 3 : 13 - 24
  • [43] PJ-Sec: secure node joining in mobile P2P networks
    Tetarave, Sumit Kumar
    Tripathy, Somanath
    CCF TRANSACTIONS ON PERVASIVE COMPUTING AND INTERACTION, 2021, 3 (01) : 13 - 24
  • [44] Towards a P2P Mobile Contents Trading
    Hosny, Sameh
    Alotaibi, Faisal
    El Gamal, Hesham
    Eryilmaz, Atilla
    2015 49TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2015, : 338 - 342
  • [45] Secure and Verifiable P2P Card Games
    Yeh, Chun-Chao
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 344 - 349
  • [46] PLI: A new framework to protect digital content for P2P networks
    Gu, GF
    Zhu, BB
    Li, SP
    Zhang, SY
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 206 - 216
  • [47] SERVICE ORIENTED P2P NETWORKS FOR DIGITAL LIBRARIES, BASED ON JXTA
    Pereira, Marco
    Fernandes, Marco
    Martins, Joaquim Arnaldo
    Pinto, Joaquim Sousa
    ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2009, : 141 - 146
  • [48] Secure P2P Data Storage andMaintenance
    Oualha, Nouha
    Oenen, Melek
    Roudier, Yves
    INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2010, 2010
  • [49] Risk management of digital certificates in ad hoc and P2P networks
    Zhou, Tong
    Harn, Lein
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 312 - 317
  • [50] P2P Honeypot to prevent illegal or harmful contents from spreading in P2P network
    Lee, Hogyun
    Nam, Taekyong
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 497 - +