Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy

被引:0
|
作者
Wenjia Niu
Endong Tong
Qian Li
Gang Li
Xuemin Wen
Jianlong Tan
Li Guo
机构
[1] Chinese Academy of Science,Institute of Information Engineering
[2] Chinese Academy of Sciences,Institute of Microelectronics
[3] Deakin University,School of Information Technology
来源
关键词
P2P piracy; Behavior; Time constraint; Content feedback; Bloom filter;
D O I
暂无
中图分类号
学科分类号
摘要
P2P collusive piracy, where paid P2P clients share the content with unpaid clients, has drawn significant concerns in recent years. Study on the follow relationship provides an emerging track of research in capturing the followee (e.g., paid client) for the blocking of piracy spread from all his followers (e.g., unpaid clients). Unfortunately, existing research efforts on the follow relationship in online social network have largely overlooked the time constraint and the content feedback in sequential behavior analysis. Hence, how to consider these two characteristics for effective P2P collusive piracy prevention remains an open problem. In this paper, we proposed a multi-bloom filter circle to facilitate the time-constraint storage and query of P2P sequential behaviors. Then, a probabilistic follow with content feedback model to fast discover and quantify the probabilistic follow relationship is further developed, and then, the corresponding approach to piracy prevention is designed. The extensive experimental analysis demonstrates the capability of the proposed approach.
引用
收藏
页码:111 / 141
页数:30
相关论文
共 50 条
  • [1] Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy
    Niu, Wenjia
    Tong, Endong
    Li, Qian
    Li, Gang
    Wen, Xuemin
    Tan, Jianlong
    Guo, Li
    KNOWLEDGE AND INFORMATION SYSTEMS, 2016, 48 (01) : 111 - 141
  • [2] Curbing peer-to-peer piracy
    Samuelson, P
    TECHNOLOGY REVIEW, 2003, 106 (04) : 70 - 71
  • [3] Music piracy on peer-to-peer networks
    Fetscherin, M
    Zaugg, S
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 431 - 440
  • [4] Preventing Piracy Content Propagation in Peer-to-Peer Networks
    Zhang, Hongli
    Ye, Lin
    Shi, Jiantao
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 105 - 114
  • [5] Piracy over Peer-to-Peer based on Personal Network
    Prasad, Rajeev
    WIRELESS PERSONAL COMMUNICATIONS, 2006, 37 (3-4) : 221 - 231
  • [6] Piracy Over Peer-To-Peer Based on Personal Network
    Rajeev Prasad
    Wireless Personal Communications, 2006, 37 : 221 - 231
  • [7] Exploring the Monero Peer-to-Peer Network
    Cao, Tong
    Yu, Jiangshan
    Decouchant, Jeremie
    Luo, Xiapu
    Verissimo, Paulo
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12059 : 578 - 594
  • [8] Adaptive Probabilistic Search for Peer-to-Peer networks
    Tsoumakos, D
    Roussopoulos, N
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 102 - 109
  • [9] FlowCert :: Probabilistic certification for peer-to-peer computations
    Varrette, S
    Roch, JL
    Leprévost, F
    16TH SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING, PROCEEDINGS, 2004, : 108 - 115
  • [10] The new vigilantism: Combating the piracy of copyrighted materials on peer-to-peer networks
    Stauber, A
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1374 - 1378