A novel privacy and copyright protection enforced peer-to-peer network

被引:0
|
作者
Wang, Xiaoming [1 ]
Zhu, Bin
Li, Shipeng
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Peoples R China
[2] Microsoft Res Asia, Beijing 100080, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Peer-to-peer (P2P) networks are widely used to share copyrighted contents and software illegally around the world. Development and applications of P2P technologies have faced strong legal and legislative challenges., A P2P network has to, have built-in copyright protection to enable P2P technologies to advance on its own without court's and legislature's interference. In this paper, we propose a novel and practical P2P network with a strong privacy protection and reliable tracking mechanism to track the original uploader of any material in the P2P network. When a pirated material is found, its uploader is tracked down, and can be punished by revoking the access to the network, removing his or her uploaded materials, etc. The whole protection system is completely transparent to end users. The proposed scheme would effectively deter users from uploading illegally any copyrighted materials to and dramatically reduce copyrighted materials shared through our P2P network.
引用
收藏
页码:298 / 310
页数:13
相关论文
共 50 条
  • [1] The Use of Peer-to-Peer Networks in Copyright Protection
    Tsolis, Dimitrios
    Georgatos, Eleftherios
    Sioutas, Spyros
    [J]. 13TH PANHELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2009, : 97 - +
  • [2] Designing a novel Peer-to-Peer Network
    Lin, Fudong
    Lin, Fuhong
    Ding, Fei
    [J]. 2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 381 - 383
  • [3] Copyright Protection in Peer-to-Peer Networks for Video-on-Demand Streaming
    Bernardini, Riccardo
    Rinaldo, Roberto
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (IEEE ICC), 2013, : 1378 - 1382
  • [4] Study on Privacy Protection and Anonymous Communication in Peer-to-Peer Networks
    Chao, Gao
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 522 - 525
  • [5] Monitoring Social Centrality for Peer-To-Peer Network Protection
    Kas, Miray
    Carley, L. Richard
    Carley, Kathleen M.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (12) : 155 - 161
  • [6] Simple Peer-to-Peer SIP Privacy
    Koskela, Joakim
    Tarkoma, Sasu
    [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 226 - +
  • [7] Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy
    Yu, Jian
    [J]. Ingenierie des Systemes d'Information, 2019, 24 (04): : 433 - 437
  • [8] A Novel Hierarchical Overlay for Structured Peer-to-Peer Network
    Song, Jingjing
    Xiang, Zhaojun
    Yu, Jiguo
    [J]. 2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 183 - +
  • [9] A new peer-to-peer network
    Harutyunyan, Hovhannes
    He, Junlei
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 120 - +
  • [10] Diffusion on the Peer-to-Peer Network
    Riposo, Julien
    [J]. JOURNAL OF RISK AND FINANCIAL MANAGEMENT, 2022, 15 (02)