Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy

被引:0
|
作者
Wenjia Niu
Endong Tong
Qian Li
Gang Li
Xuemin Wen
Jianlong Tan
Li Guo
机构
[1] Chinese Academy of Science,Institute of Information Engineering
[2] Chinese Academy of Sciences,Institute of Microelectronics
[3] Deakin University,School of Information Technology
来源
关键词
P2P piracy; Behavior; Time constraint; Content feedback; Bloom filter;
D O I
暂无
中图分类号
学科分类号
摘要
P2P collusive piracy, where paid P2P clients share the content with unpaid clients, has drawn significant concerns in recent years. Study on the follow relationship provides an emerging track of research in capturing the followee (e.g., paid client) for the blocking of piracy spread from all his followers (e.g., unpaid clients). Unfortunately, existing research efforts on the follow relationship in online social network have largely overlooked the time constraint and the content feedback in sequential behavior analysis. Hence, how to consider these two characteristics for effective P2P collusive piracy prevention remains an open problem. In this paper, we proposed a multi-bloom filter circle to facilitate the time-constraint storage and query of P2P sequential behaviors. Then, a probabilistic follow with content feedback model to fast discover and quantify the probabilistic follow relationship is further developed, and then, the corresponding approach to piracy prevention is designed. The extensive experimental analysis demonstrates the capability of the proposed approach.
引用
收藏
页码:111 / 141
页数:30
相关论文
共 50 条
  • [21] Peer-to-peer lending: Exploring borrowers' motivations and expectations
    Anderloni, Luisa
    Petukhina, Alla
    Tanda, Alessandra
    JOURNAL OF SMALL BUSINESS MANAGEMENT, 2024,
  • [22] Exploring the acceptability of delayed reciprocity in Peer-to-Peer networks
    Fokker, Jenneke
    de Ridder, Huib
    Westendorp, Piet
    Pouwelse, Johan
    PERSUASIVE TECHNOLOGY, 2008, 5033 : 237 - +
  • [23] Exploring commitment in peer-to-peer exchanges: the case of timebanks
    Papaoikonomou, Eleni
    Valor, Carmen
    JOURNAL OF MARKETING MANAGEMENT, 2016, 32 (13-14) : 1333 - 1358
  • [24] Exploring Peer-to-Peer Locality in Multiple Torrent Environment
    Wang, Haiyang
    Liu, Jiangchuan
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (07) : 1216 - 1226
  • [25] Probabilistic file indexing and searching in unstructured peer-to-peer networks
    Cheng, AH
    Joung, YJ
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID - CCGRID 2004, 2004, : 9 - 18
  • [26] On probabilistic flooding search over unstructured peer-to-peer networks
    Margariti, Spiridoula V.
    Dimakopoulos, Vassilios V.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (03) : 447 - 458
  • [27] Probabilistic file indexing and searching in unstructured peer-to-peer networks
    Cheng, AH
    Joung, YJ
    COMPUTER NETWORKS, 2006, 50 (01) : 106 - 127
  • [28] On probabilistic flooding search over unstructured peer-to-peer networks
    Spiridoula V. Margariti
    Vassilios V Dimakopoulos
    Peer-to-Peer Networking and Applications, 2015, 8 : 447 - 458
  • [29] Peer-to-peer keyword search using keyword relationship
    Nakauchi, K
    Ishikawa, Y
    Morikawa, H
    Aoyama, T
    CCGRID 2003: 3RD IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, PROCEEDINGS, 2003, : 359 - 366
  • [30] Exploring the spatial linkage network of peer-to-peer lending in China
    Chong, Zhaohui
    Wei, Xiaolin
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2023, 630