Secure Digital Contents Distributing System on P2P Networks

被引:0
|
作者
Ing-Chau Chang [1 ]
Hung-Wen Yang [2 ]
机构
[1] Department of Computer Science and Information Engineering, National Changhua University of Education
[2] Department of Computer Science and Information Engineering, National Chung Hsing University
关键词
Bit-Torrent; content sharing; digital rights management; peer-to-peer networks; security;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
In recent years, the file-sharing applications of peer-to-peer (P2P) systems, such as Napster, Bit-Torrent (BT), Gnutella, have become very popular, with BT offering particularly high scalability and efficiency service to transmit files. But BT does not enforce the access control process, so a lot of unauthorized files are freely shared. In this paper, we proposed a digital rights management (DRM) system for BT environment to solve the serious piracy issue by using lightweight encryption methods in order to be adopted by small mobile devices in wireless environment.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 50 条
  • [41] Effectiveness of Landmark Analysis for Establishing Locality in P2P Networks
    Allan, Alexander
    Di Fatta, Giuseppe
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 88 - 92
  • [42] Fluid Models of Population and Download Progress in P2P Networks
    Ferragut, Andres
    Paganini, Fernando
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2016, 3 (01): : 34 - 45
  • [43] A Survey on Various File Sharing Methods in P2P Networks
    Vimal, S.
    Srivatsa, S. K.
    2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 305 - 310
  • [44] Network Coding for Streaming Video over P2P Networks
    de Asis Lopez-Fuentes, Francisco
    Cabrera-Medina, Cesar
    2013 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2013, : 329 - 332
  • [45] Optimizing random walk search algorithms in P2P networks
    Bisnik, Nabhendra
    Abouzeid, Alhussein A.
    COMPUTER NETWORKS, 2007, 51 (06) : 1499 - 1514
  • [46] Analysis of Malicious Peers in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [47] Improving Trust Valuation for File Sharing in P2P Networks
    Daskapan, Semir
    Nurtanti, Indira
    van den Berg, Jan
    2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6, 2008, : 2062 - 2067
  • [48] Comparative Analysis of Unstructured P2P File Sharing Networks
    Mehr-un-Nisa
    Ashraf, Fasiha
    Naseer, Ateeqa
    Iqbal, Shaukat
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019), 2019, : 148 - 153
  • [49] Musical retrieval in P2P networks under the warping distance
    Karydis, Ioannis
    Nanopoulos, Alexandros
    Papadopoulos, Apostolos N.
    Manolopoulos, Yannis
    ENTERPRISE INFORMATION SYSTEMS VII, 2006, : 53 - +
  • [50] Mobility management using P2P techniques in wireless networks
    Lo, Shou-Chih
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2007, 23 (02) : 421 - 439