Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy

被引:0
|
作者
Wenjia Niu
Endong Tong
Qian Li
Gang Li
Xuemin Wen
Jianlong Tan
Li Guo
机构
[1] Chinese Academy of Science,Institute of Information Engineering
[2] Chinese Academy of Sciences,Institute of Microelectronics
[3] Deakin University,School of Information Technology
来源
关键词
P2P piracy; Behavior; Time constraint; Content feedback; Bloom filter;
D O I
暂无
中图分类号
学科分类号
摘要
P2P collusive piracy, where paid P2P clients share the content with unpaid clients, has drawn significant concerns in recent years. Study on the follow relationship provides an emerging track of research in capturing the followee (e.g., paid client) for the blocking of piracy spread from all his followers (e.g., unpaid clients). Unfortunately, existing research efforts on the follow relationship in online social network have largely overlooked the time constraint and the content feedback in sequential behavior analysis. Hence, how to consider these two characteristics for effective P2P collusive piracy prevention remains an open problem. In this paper, we proposed a multi-bloom filter circle to facilitate the time-constraint storage and query of P2P sequential behaviors. Then, a probabilistic follow with content feedback model to fast discover and quantify the probabilistic follow relationship is further developed, and then, the corresponding approach to piracy prevention is designed. The extensive experimental analysis demonstrates the capability of the proposed approach.
引用
收藏
页码:111 / 141
页数:30
相关论文
共 50 条
  • [41] NetTube: Exploring Social Networks for Peer-to-Peer Short Video Sharing
    Cheng, Xu
    Liu, Jiangchuan
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1152 - 1160
  • [42] Motivations for Peer-to-Peer Accommodation: Exploring Sustainable Choices in Collaborative Consumption
    Delgado, Ana Catarina
    Soares, Raquel Reis
    Proenca, Joao F.
    SUSTAINABILITY, 2023, 15 (13)
  • [43] FlipMe: Exploring Tangible Peer-to-Peer Communication in On-Line-Learning
    Jeong, Wondo
    Self, James
    Oakley, Ian
    Lee, Hui Sung
    Chung, Young Chul
    Kim, Byung Hern
    DIS '19 COMPANION: COMPANION PUBLICATION OF THE 2019 ACM DESIGNING INTERACTIVE SYSTEMS CONFERENCE, 2019, : 207 - 212
  • [44] Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage
    Yang, Zhi
    Tian, Jing
    Zhao, Ben Y.
    Chen, Wei
    Dai, Yafei
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (09) : 1514 - 1527
  • [45] Trust-based probabilistic search with the view model of peer-to-peer networks
    Zhuge, Hai
    Chen, Xue
    Sun, Xiaoping
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2006, 18 (14): : 1839 - 1855
  • [46] Distributed Construction Protocols of Probabilistic Degree-Weighted Peer-to-Peer Overlays
    Wu, Yu
    OoShita, Fukuhito
    Kakugawa, Hirotsugu
    Masuzawa, Toshimitsu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (04) : 563 - 574
  • [47] Software diversity: A desirable method to prevent worm propagation in peer-to-peer networks
    Zhou, Y.
    Wu, Z. F.
    Li, Z. G.
    Li, F.
    Feng, Y.
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 3369 - 3373
  • [48] Reliable multicast and its probabilistic model for job submission in peer-to-peer grids
    Merz, P
    Gorunova, K
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2005, 2005, 3806 : 504 - 511
  • [49] The Fight Against Piracy in Peer-to-Peer Networks: the Sword of Damocles Hanging over ISP's Head?
    Werkers, Evi
    Coudert, Fanny
    INFORMATION SYSTEMS DEVELOPMENT: TOWARDS A SERVICE PROVISION SOCIETY, 2009, : 339 - 347
  • [50] Always local?: Examining the relationship between peer-to-peer accommodations and restaurants
    Belarmino, Amanda
    Ozdemir, Ozgur
    Dogru, Tarik
    JOURNAL OF HOSPITALITY AND TOURISM MANAGEMENT, 2021, 48 : 289 - 300