Skip to main content

Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment

  • Chapter
Economics of Information Security

Part of the book series: Advances in Information Security ((ADIS,volume 12))

Conclusion

To thwart piracy the entertainment industry must keep distribution costs high, reduce the size of distribution networks, and (if possible) raise the cost of extracting content. However, if ‘trusted computing’ mechanisms deliver on their promises, large peer-to-peer distribution networks will be more robust against attack and trading in pirated entertainment will become safer, more reliable, and thus cheaper. Since it will always be possible for some individuals to extract content from the media on which it is stored, future entertainment may be more vulnerable to piracy than before the introduction of ‘trusted computing’ technologies.

‘Trusted computing’ technologies promise to enable media players within a PC to execute with the same level of resistance to piracy that one would expect from a proprietary hardware player.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Alliance, The Trusted Computing Platform (2000). Building a foundation of trust in the PC Technical report.

    Google Scholar 

  • Anderson, Ross J. (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., first edition.

    Google Scholar 

  • Arbaugh, William A., Farber, David J., and Smith, Jonathan M. (1997). A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Security and Privacy, pages 65–71.

    Google Scholar 

  • Borland, John (2002a). Customers put kibosh on anti-copy CD. CNET News.Com.

    Google Scholar 

  • Borland, John (2002b). U.S. liability looms over Kazaa. CNET News.Com.

    Google Scholar 

  • Borland, John (2003). Fingerprinting P2P pirates. CNET News.Com.

    Google Scholar 

  • Cornelli, Fabrizio, Damiani, Ernesto, Capitani di Vimercati, Sabrina De, Paraboschi, Stefano, and Samarati, Pierangela (2002). Choosing reputable servents in a P2P network. In Proceedings of The Eleventh International World Wide Web Conference.

    Google Scholar 

  • Corporation, Macrovision. Solutions > video technology > copy protection. http://www.macrovision.com/solutions/video/copyprotect/index.php3.

  • Dean, Drew and Stubblefield, Adam (2001). Using client puzzles to protect TLS. In Proceedings of the 10th USENIX Security Symposium.

    Google Scholar 

  • Dwork, Cynthia and Naor, Moni (1992). Pricing via processing or combatting junk mail. In Proceedings of Advances in Cryptology-CRYPTO’ 92, 12th Annual International Cryptology Conference, volume 740 of Lecture Notes in Computer Science, pages 137–147. Springer.

    Google Scholar 

  • Hansen, Evan (2001). Ban on DVD-cracking code upheld. CNET News.Com.

    Google Scholar 

  • Harmon, Amy (2001). Judges weigh copyright suit on unlocking DVD shield. The New York Times.

    Google Scholar 

  • Harmon, Amy (2003a). Music swappers get a message on PC screens: Stop it now. The New York Times.

    Google Scholar 

  • Harmon, Amy (2003b). Record concerns sue to end piracy. The New York Times.

    Google Scholar 

  • Juels, Ari and Brainard, John (1999). Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the 1999 Network and Distributed System Security Symposium.

    Google Scholar 

  • Kamvar, Sepandar D., Schlosser, Mario T., and Garcia-Molina, Hector (2003). The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of The Twelfth International World Wide Web Conference.

    Google Scholar 

  • Lie, David, Thekkath, Chandramohan A., Mitchell, Mark, Lincoln, Patrick, Boneh, Dan, Mitchell, John C., and Horowitz, Mark (2000). Architectural support for copy and tamper resistant software. In ASPLOSIX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 168–177.

    Google Scholar 

  • McCullagh, Declan (2002). File-swapping foes exert P2P pressure. CNET News.Com.

    Google Scholar 

  • Olsen, Stefanie (2002). Record labels sue Napster investor. CNET News.Com.

    Google Scholar 

  • Reiter, Michael K. and Rubin, Aviel D. (1998). Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1):66–92.

    Article  Google Scholar 

  • Suh, G. Edward, Clarke, Dwaine, Gassend, Blaise, van Dijk, Marten, and Devadas, Srinivas (2003). AEGIS: Architecture for tamper-evident and tamper-resistant processing. In 17th Annual ACM International Conference on Supercomputing.

    Google Scholar 

  • Syverson, Paul F., Goldschlag, David M., and Reed, Michael G. (1997). Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Privacy, pages 44–54.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

Schechter, S.E., Greenstadt, R.A., Smith, M.D. (2004). Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_5

Download citation

  • DOI: https://doi.org/10.1007/1-4020-8090-5_5

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-8089-0

  • Online ISBN: 978-1-4020-8090-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics