Skip to main content

Copyright Protection in P2P Networks by False Pieces Pollution

  • Conference paper
Autonomic and Trusted Computing (ATC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6906))

Included in the following conference series:

Abstract

In P2P networks, the typical methods of protecting copyright files are to distribute false files with similar key words, the same file size and so on as the copyright files or publish volumes of error messages to declare the location of nonexistent copyright files. These ways lead to the difficulty in getting the copyright files for abnormal users. But these methods does not work in P2P networks such as eMule and BitTorrent with commentaries on the shared files because users can sift the true files from the false files or error location of the shared files by the commentaries. In this paper, a new technology of copyright protection by polluting pieces of files is proposed. We distribute false pieces with the same authentication keys as normal pieces but their contents are different, which is called the false pieces with authentication collision. The abnormal users will keep sharing the false pieces of copyright files they have since the false pieces can not be identified. People may have fun to download the copyright files but they can not get the correct copyright files. Due to high cost of finding authentication collision for false pieces, the way of embedding the found authentication collisions in the copyright files is also proposed. Extend simulations show approximately 100 % protection of copyright files can be reached when the associated false pieces are distributed early in time once the sharing of copyright files happened.

This research is supported by the National Science Council, Taiwan, R.O.C., under grant NSC 99-2221-E-216-017-.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CacheLogic Research: The True Picture of P2P File Sharing, http://www.readwriteweb.com/archives/p2p_growth_trend_watch.php

  2. Offical KaZaA homepage, http://www.kazaa.com

  3. Official eMule homepage, http://www.emule-project.net/

  4. Official BitTorrent homepage, http://www.bittorrent.org/

  5. Envisional Research, http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf

  6. BASCAP Research, http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf

  7. Liang, J., Kumar, R., Xi, Y., Ross, K.W.: Pollution in P2P file sharing systems. In: Proc. IEEE INFOCOM 2005, Miami, FL (March 2005)

    Google Scholar 

  8. Christin, N., Weigend, A.S., Chuang, J.: Content Availability, Pollution and Poisoining in File Sharing Peer-to-Peer Networks. In: ACM Conference on Electronic Commerce, Vancouver, Canada (June 2005)

    Google Scholar 

  9. Viralg, a digital copyrights protecting company (February 2009), http://www.viralg.com/

  10. MediaDefender (February 2009), http://www.mediadefender.com/

  11. Liang, J., Naoumov, N., Ross, K.W.: The Index Poisoning Attack in P2P File Sharing Systems. In: INFOCOM 2006 25th IEEE International Conference on Computer Communications, Barcelona, Spain (April 2006)

    Google Scholar 

  12. Sun, X., Torres, R., Rao, S.: DDoS Attacks by Subverting Membership Management in P2P Systems. In: 3rd IEEE Workshop on Secure Network Protocols, Beijing, China (October 2007)

    Google Scholar 

  13. Liogkas, N., Nelson, R., Kohler, E., Zhang, L.: Exploiting BitTorrent For Fun (But Not Profit). In: Proc. 5th Itl. Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CA, USA (February 2006)

    Google Scholar 

  14. Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free Riding in BitTorrent is Cheap. In: Fifth Workshop on Hot Topics in Networks. ACM, Irvine (2006)

    Google Scholar 

  15. Dhungel, P., Wu, D., Schonhorst, B., Ross, K.W.: A Measurement Study of Attacks on BitTorrent Leechers. In: Proc. 7th Itl. Workshop on Peer-to-Peer Systems (IPTPS), Tampa Bay, Florida, USA (February 2008)

    Google Scholar 

  16. RFC3174, SHA-1, http://tools.ietf.org/html/rfc3174

  17. Andrade, N., Mowbray, M., Lima, A., Wagner, G., Ripeanu, M.: Influences on Cooperation in BitTorrent Communities. In: ACM SIGCOMM 2005 Workshops, Philadelphia, PA, USA (August 2005)

    Google Scholar 

  18. RFC1320, MD4, http://tools.ietf.org/html/rfc1320

  19. Wang, X., Lai, X., Yu, H.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and PIREMD, rump session. In: CRYPTO 2004 (2004) (e-Print)

    Google Scholar 

  20. Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  21. Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4. Cryptology ePrint Archive, Report 2005/151 (2005)

    Google Scholar 

  22. Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  23. Cochran, M.: Notes on the Wang et al. 263 SHA-1 Differential Path. Cryptology ePrint Archive, Report 2007/474 (December 2007)

    Google Scholar 

  24. Satoh, A.: Hardware Architecture and Cost Estimates for Breaking SHA-1, pp. 259–273. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  25. Akashi, S.: Study on Architecture and Cost Estimates for SHA-1 Attacking Hardware. Transactions of Information Processing Society of Japan, 2182–2193 (2006)

    Google Scholar 

  26. SHA-1 Collision Search Graz, http://boinc.iaik.tugraz.at/

  27. www.iaik.tugraz.at/content/research/krypto/sha1/

  28. Mathieu, F., Reynier, J.: Missing Piece Issue and Upload Strategies in Flashcrowds and P2P-assisted Filesharing. In: Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006). IEEE, Los Alamitos (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, CH., Chiu, CY. (2011). Copyright Protection in P2P Networks by False Pieces Pollution. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds) Autonomic and Trusted Computing. ATC 2011. Lecture Notes in Computer Science, vol 6906. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23496-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23496-5_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23495-8

  • Online ISBN: 978-3-642-23496-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics