Digital Rights Management for Untrusted Peer-to-Peer Networks

Author(s):  
Pallavi Priyadarshini ◽  
Mark Stamp

Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and ease of content dissemination of such networks presents a potentially lucrative opportunity. However, content creators have been reluctant to adopt P2P networks as a distribution vehicle since these networks are plagued with piracy. This chapter focuses on developing a solution for distributing digital content in P2P networks in a way that established businesses and amateur artists alike can profit. We propose a content distribution system that employs Digital Rights Management (DRM) technologies and is independent of the underlying P2P network. Our system relies on innovative uses of security technologies to deter piracy. In addition, we include various non-technical features that encourage users to “play by the rules”.

2010 ◽  
pp. 1848-1878
Author(s):  
Pallavi Priyadarshini ◽  
Mark Stamp

Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and ease of content dissemination of such networks presents a potentially lucrative opportunity. However, content creators have been reluctant to adopt P2P networks as a distribution vehicle since these networks are plagued with piracy. This chapter focuses on developing a solution for distributing digital content in P2P networks in a way that established businesses and amateur artists alike can profit. We propose a content distribution system that employs Digital Rights Management (DRM) technologies and is independent of the underlying P2P network. Our system relies on innovative uses of security technologies to deter piracy. In addition, we include various non-technical features that encourage users to “play by the rules”.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 1051
Author(s):  
Gera Jaideep ◽  
Bhanu Prakash Battula

Peer to Peer (P2P) network in the real world is a class of systems that are made up of thousands of nodes in distributed environments. The nodes are decentralized in nature. P2P networks are widely used for sharing resources and information with ease. Gnutella is one of the well known examples for such network. Since these networks spread across the globe with large scale deployment of nodes, adversaries use them as a vehicle to launch DDoS attacks. P2P networks are exploited to make attacks over hosts that provide critical services to large number of clients across the globe. As the attacker does not make a direct attack it is hard to detect such attacks and considered to be high risk threat to Internet based applications. Many techniques came into existence to defeat such attacks. Still, it is an open problem to be addressed as the flooding-based DDoS is difficult to handle as huge number of nodes are compromised to make attack and source address spoofing is employed. In this paper, we proposed a framework to identify and secure P2P communications from a DDoS attacks in distributed environment. Time-to-Live value and distance between source and victim are considered in the proposed framework. A special agent is used to handle information about nodes, their capacity, and bandwidth for efficient trace back. A Simulation study has been made using NS2 and the experimental results reveal the significance of the proposed framework in defending P2P network and target hosts from high risk DDoS attacks.  


Author(s):  
Ramya Venkataramu ◽  
Mark Stamp

Digital Rights Management (DRM) technology is used to control access to copyrighted digital content. Apple employs a DRM system known as Fairplay in its iTunes online music store. Users communicate with the centralized iTunes server to download, purchase, play, and preview digital content. The iTunes music store has the potential disadvantage of a bandwidth bottleneck at the centralized server. Furthermore, this bandwidth bottleneck problem will escalate with increasing popularity of online music and other digital media, such as video. In this chapter, we analyze the Fairplay DRM system. We then consider a modified architecture that can be employed over existing peer-to-peer (P2P) networks. Our new system, P2PTunes, is designed to provide the benefits of a decentralized P2P network while providing DRM content protection that is at least as strong as that found in Fairplay.


Author(s):  
Ioannis Karydis

In this chapter we present the most significant trends in recent research in the field of content-based music information retrieval in peer-to-peer networks. Despite the diminished attention the area has received in general terms, the relatively close area of metadata MIR in P2P is by far new. As metadata prove to be inefficient for the purposes of MIR as well as the peculiarities of music in comparison to text and image data, developing dedicated solutions for CBMIR in P2P networks becomes a necessity while the challenges faced therein, unique. Depending on the type of P2P network, a number of prominent research works are presented and compared in this chapter.


2013 ◽  
Vol 380-384 ◽  
pp. 2749-2752
Author(s):  
Ying Li ◽  
Hong Min Jiang ◽  
Tao Hu

With the rapid popularity of P2P networks, the demand for digital rights management (DRM) in P2P mode is increasing quickly. The research on issuance of digital content licenses is the key issues in DRM. As for the centralized authorization systems, the security and the efficiency have certain defects. An improved distributed license authorization system is presented in this paper. And the nodes in the system are divided into six kinds of roles in accordance with theirs functions and a new non-interactive verifiable secret sharing protocol is introduced. Because of the adoptions of threshold secret sharing mechanism and the independent synthesis peers, the system security is improved in the transmission of digital content license and the burden of nodes is reduced in P2P networks. Each license authorization node gets the correct secret sharing by the non-interactive verifiable secret sharing protocol.


Sign in / Sign up

Export Citation Format

Share Document