Abstract
We consider a problem of key leakage in peer-to-peer (P2P) content distribution. In content-distribution services, content is encrypted so that only legitimate users can access the content. Users (peers) cannot be fully trusted in a P2P network because malicious ones might leak their decryption keys. If the redistribution of decryption keys occurs, copyright holders may incur great losses caused by free riders who access content without purchasing it. Therefore, it is essential to solve this problem. In this paper, we propose a P2P content-distribution scheme resilient to the key leakage, and show its feasibility by conducting a large-scale experiment in a real network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Advanced Access Content System. Response to reports of attacks on aacs technology, http://www.aacsla.com/press
Akamai, http://www.akamai.com
Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36(4), 335–371 (2004)
Blu-ray Disc Association, http://www.blu-raydisc.com
Crypto++ 5.6.0 Benchmarks, http://www.cryptopp.com/benchmarks.html
eMule, http://www.emule-project.net
Garcia, L., Arnaiz, L., Álvarez, F., Menéndez, J.M., Grüneberg, K.: Protected seamless content delivery in P2P wireless and wired networks. IEEE Wireless Communications 16(5), 50–57 (2009)
Gnutella, http://www.gnutella.com
Iwata, T., Abe, T., Ueda, K., Sunaga, H.: A DRM system suitable for P2P content delivery and the study on its implementation. In: Proc. 9th Asia-Pacific Conference on Communications (APCC 2003), vol. 2, pp. 806–811 (2003)
LibTorrent, http://libtorrent.rakshasa.no
Liu, X., Yin, H., Lin, C., Du, C.: Efficient user authentication and key management for peer-to-peer live streaming systems. Tsinghua Science & Technology 14(2), 234–241 (2009)
Miyachi, T., Chinen, K., Shinoda, Y.: StarBED and SpringOS: Large-scale general purpose network testbed and supporting software. In: Proc. 1st International Conference on Performance Evaluation Methodologies and Tools (Valuetools 2006). ACM Press (2006)
Motion Picture Association of America. Internet piracy, http://www.mpaa.org/piracy_internet.asp
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
Palomar, E., Tapiador, J.M.E., Hernandez-Castro, J.C., Ribagorda, A.: Secure content access and replication in pure P2P networks. Computer Communications 31(2), 266–279 (2008)
Qiu, F., Lin, C., Yin, H.: EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming. In: Zhuang, Y.-t., Yang, S.-Q., Rui, Y., He, Q. (eds.) PCM 2006. LNCS, vol. 4261, pp. 395–404. Springer, Heidelberg (2006)
StarBED Project, http://www.starbed.org
Sung, J.Y., Jeong, J.Y., Yoon, K.S.: DRM enabled P2P architecture. In: Proc. 8th International Conference of Advanced Communication Technology (ICACT), vol. 1, pp. 487–490 (2006)
The BitTorrent Protocol Specification, http://www.bittorrent.org/beps/bep_0003.html
The BitTorrent Tracker Source Code, http://download.bittorrent.com/dl/archive/BitTorrent-3.9.1.tar.gz
THE WALL STREET JOURNAL. Warner Bros. to Pull Out of DVDs in South Korea, http://online.wsj.com/article/SB122643080489917991.html
WebLOAD, http://www.webload.org
Zhang, X., Liu, D., Chen, S., Zhang, Z., Sandhu, R.: Towards digital rights protection in BitTorrent-like P2P systems. In: Proc. 15th SPIE/ACM Multimedia Computing and Networking, MMCN 2008 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Matsushita, T., Yamanaka, S., Zhao, F. (2012). A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage. In: Jung, S., Yung, M. (eds) Information Security Applications. WISA 2011. Lecture Notes in Computer Science, vol 7115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27890-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-27890-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27889-1
Online ISBN: 978-3-642-27890-7
eBook Packages: Computer ScienceComputer Science (R0)