Secure Digital Contents Distributing System on P2P Networks

被引:0
|
作者
Ing-Chau Chang [1 ]
Hung-Wen Yang [2 ]
机构
[1] Department of Computer Science and Information Engineering, National Changhua University of Education
[2] Department of Computer Science and Information Engineering, National Chung Hsing University
关键词
Bit-Torrent; content sharing; digital rights management; peer-to-peer networks; security;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
In recent years, the file-sharing applications of peer-to-peer (P2P) systems, such as Napster, Bit-Torrent (BT), Gnutella, have become very popular, with BT offering particularly high scalability and efficiency service to transmit files. But BT does not enforce the access control process, so a lot of unauthorized files are freely shared. In this paper, we proposed a digital rights management (DRM) system for BT environment to solve the serious piracy issue by using lightweight encryption methods in order to be adopted by small mobile devices in wireless environment.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 50 条
  • [31] A Sybilproof Distributed Identity Management for P2P Networks
    Lesueur, Francois
    Me, Ludovic
    Tong, Valerie Viet Triem
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 684 - 691
  • [32] A P2P, Agent-based System of Systems Architecture for Cooperative Maritime Networks
    Geoghegan, Sean J.
    McCorkle, Grady
    Robinson, Chris
    Fundyler, Gregory
    Ramaswamy, Srini
    Brown, Jamelle
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 148 - +
  • [33] HiPeer:: A highly reliable P2P system
    Wepiwté, G
    Simeonov, PL
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (02): : 570 - 580
  • [34] Service and P2P based secure media sharing in mobile commerce environments
    Xi Chen
    Shiguo Lian
    Electronic Commerce Research, 2011, 11 : 91 - 101
  • [35] Secure and Efficient Hierarchical P2P Fog Architecture: A Novel Approach for IoT
    Murad, Saydul Akbar
    Rahimi, Nick
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 18796 - 18807
  • [36] On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs
    Li, Chun-Ta
    Lee, Cheng-Chi
    Wang, Lian-Jun
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 1, PROCEEDINGS, 2010, 6016 : 599 - +
  • [37] Service and P2P based secure media sharing in mobile commerce environments
    Chen, Xi
    Lian, Shiguo
    ELECTRONIC COMMERCE RESEARCH, 2011, 11 (01) : 91 - 101
  • [38] Collusive Piracy Prevention in P2P Content Delivery Networks
    Lou, Xiaosong
    Hwang, Kai
    IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (07) : 970 - 983
  • [39] Related cluster based trust model for P2P networks
    Ma, Y. (myron_my@163.com), 1600, Northeast University (34):
  • [40] Proliferation of Worm Infection in P2p Networks and Its Prohibition
    Devi, B. Manasa
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 45 - 49