Skip to main content

A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network

  • Conference paper
Digital Rights Management. Technologies, Issues, Challenges and Systems (DRMTICS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3919))

Included in the following conference series:

Abstract

Peer-to-peer (P2P) networks are widely used to share copyrighted contents and software illegally around the world. Development and applications of P2P technologies have faced strong legal and legislative challenges. A P2P network has to have built-in copyright protection to enable P2P technologies to advance on its own without court’s and legislature’s interference. In this paper, we propose a novel and practical P2P network with a strong privacy protection and reliable tracking mechanism to track the original uploader of any material in the P2P network. When a pirated material is found, its uploader is tracked down, and can be punished by revoking the access to the network, removing his or her uploaded materials, etc. The whole protection system is completely transparent to end users. The proposed scheme would effectively deter users from uploading illegally any copyrighted materials to and dramatically reduce copyrighted materials shared through our P2P network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kazaa, http://www.kazaa.com/

  2. BitTorrent, http://bittorrent.com/

  3. Gnutella, http://gnutella.wego.com/

  4. FreeNet, http://freenet.sourceforge.net/

  5. Supreme Court Rules in MGM v. Grokster (June 27, 2005), http://www.copyright.gov/docs/mgm/

  6. Berman, H.: Peer to Peer Piracy Prevention Act (H.R. 5211) (July 2002), http://www.house.gov/berman/newsroom/piracy_prevention_act.html

  7. Hatch, O.: Inducing Infringement of Copyrights Act (S. 2560) (June 2004), http://hatch.senate.gov/index.cfm?FuseAction=PressReleases.Print&PressRelease_id=1083&suppresslayouts=true

  8. Kalker, T., Epema, D.H.J., Hartel, P.H., Lagendijk, R.L., van Steen, M.: Music2Share– Copyright-Compliant Music Sharing in P2P Systems. Proc. of IEEE 92(6), 961–970 (2004)

    Article  Google Scholar 

  9. Bakker, A., van Steen, M., Tanenbaum, A.: A Law-Abiding Peer-to-Peer Network for Free-Software Distribution. In: IEEE Proc. Intl. Symp. Network Computing and Applications, October 2001, pp. 60–67 (2001)

    Google Scholar 

  10. Digital Millennium Copyright Act. United States Public law (October 1998)

    Google Scholar 

  11. Secure Digital Music Initiative (SDMI), http://www.sdmi.org/

  12. Copy-protection Technical Working Group, http://www.cptwg.org

  13. Hollings, F.: Consumer Broadband and Digital Television Promotion Act (CBDTPA) (S. 2048) (March 2002), http://thomas.loc.gov/cgi-bin/query/z?c107:S.2048

  14. Aberer, K., Hauswirth, M.: An Overview on Peer-to-Peer Information Systems. In: Proc. Workshop Distributed Data and Structures (WDAS 2002) (2002)

    Google Scholar 

  15. Microsoft: Digital Rights Management (DRM) – Windows Media DRM 10, http://www.microsoft.com/windows/windowsmedia/drm/default.aspx

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, X., Zhu, B., Li, S. (2006). A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. In: Safavi-Naini, R., Yung, M. (eds) Digital Rights Management. Technologies, Issues, Challenges and Systems. DRMTICS 2005. Lecture Notes in Computer Science, vol 3919. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787952_22

Download citation

  • DOI: https://doi.org/10.1007/11787952_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35998-2

  • Online ISBN: 978-3-540-35999-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics