Abstract
In P2P networks, the typical methods of protecting copyright files are to distribute false files with similar key words, the same file size and so on as the copyright files or publish volumes of error messages to declare the location of nonexistent copyright files. These ways lead to the difficulty in getting the copyright files for abnormal users. But these methods does not work in P2P networks such as eMule and BitTorrent with commentaries on the shared files because users can sift the true files from the false files or error location of the shared files by the commentaries. In this paper, a new technology of copyright protection by polluting pieces of files is proposed. We distribute false pieces with the same authentication keys as normal pieces but their contents are different, which is called the false pieces with authentication collision. The abnormal users will keep sharing the false pieces of copyright files they have since the false pieces can not be identified. People may have fun to download the copyright files but they can not get the correct copyright files. Due to high cost of finding authentication collision for false pieces, the way of embedding the found authentication collisions in the copyright files is also proposed. Extend simulations show approximately 100 % protection of copyright files can be reached when the associated false pieces are distributed early in time once the sharing of copyright files happened.
This research is supported by the National Science Council, Taiwan, R.O.C., under grant NSC 99-2221-E-216-017-.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CacheLogic Research: The True Picture of P2P File Sharing, http://www.readwriteweb.com/archives/p2p_growth_trend_watch.php
Offical KaZaA homepage, http://www.kazaa.com
Official eMule homepage, http://www.emule-project.net/
Official BitTorrent homepage, http://www.bittorrent.org/
Envisional Research, http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf
BASCAP Research, http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf
Liang, J., Kumar, R., Xi, Y., Ross, K.W.: Pollution in P2P file sharing systems. In: Proc. IEEE INFOCOM 2005, Miami, FL (March 2005)
Christin, N., Weigend, A.S., Chuang, J.: Content Availability, Pollution and Poisoining in File Sharing Peer-to-Peer Networks. In: ACM Conference on Electronic Commerce, Vancouver, Canada (June 2005)
Viralg, a digital copyrights protecting company (February 2009), http://www.viralg.com/
MediaDefender (February 2009), http://www.mediadefender.com/
Liang, J., Naoumov, N., Ross, K.W.: The Index Poisoning Attack in P2P File Sharing Systems. In: INFOCOM 2006 25th IEEE International Conference on Computer Communications, Barcelona, Spain (April 2006)
Sun, X., Torres, R., Rao, S.: DDoS Attacks by Subverting Membership Management in P2P Systems. In: 3rd IEEE Workshop on Secure Network Protocols, Beijing, China (October 2007)
Liogkas, N., Nelson, R., Kohler, E., Zhang, L.: Exploiting BitTorrent For Fun (But Not Profit). In: Proc. 5th Itl. Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CA, USA (February 2006)
Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free Riding in BitTorrent is Cheap. In: Fifth Workshop on Hot Topics in Networks. ACM, Irvine (2006)
Dhungel, P., Wu, D., Schonhorst, B., Ross, K.W.: A Measurement Study of Attacks on BitTorrent Leechers. In: Proc. 7th Itl. Workshop on Peer-to-Peer Systems (IPTPS), Tampa Bay, Florida, USA (February 2008)
RFC3174, SHA-1, http://tools.ietf.org/html/rfc3174
Andrade, N., Mowbray, M., Lima, A., Wagner, G., Ripeanu, M.: Influences on Cooperation in BitTorrent Communities. In: ACM SIGCOMM 2005 Workshops, Philadelphia, PA, USA (August 2005)
RFC1320, MD4, http://tools.ietf.org/html/rfc1320
Wang, X., Lai, X., Yu, H.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and PIREMD, rump session. In: CRYPTO 2004 (2004) (e-Print)
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1–18. Springer, Heidelberg (2005)
Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4. Cryptology ePrint Archive, Report 2005/151 (2005)
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)
Cochran, M.: Notes on the Wang et al. 263 SHA-1 Differential Path. Cryptology ePrint Archive, Report 2007/474 (December 2007)
Satoh, A.: Hardware Architecture and Cost Estimates for Breaking SHA-1, pp. 259–273. Springer, Heidelberg (2005)
Akashi, S.: Study on Architecture and Cost Estimates for SHA-1 Attacking Hardware. Transactions of Information Processing Society of Japan, 2182–2193 (2006)
SHA-1 Collision Search Graz, http://boinc.iaik.tugraz.at/
Mathieu, F., Reynier, J.: Missing Piece Issue and Upload Strategies in Flashcrowds and P2P-assisted Filesharing. In: Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006). IEEE, Los Alamitos (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, CH., Chiu, CY. (2011). Copyright Protection in P2P Networks by False Pieces Pollution. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., GarcÃa Villalba, L.J., Li, A.X., Wang, Y. (eds) Autonomic and Trusted Computing. ATC 2011. Lecture Notes in Computer Science, vol 6906. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23496-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-23496-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23495-8
Online ISBN: 978-3-642-23496-5
eBook Packages: Computer ScienceComputer Science (R0)