Skip to main content

A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage

  • Conference paper
Information Security Applications (WISA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7115))

Included in the following conference series:

Abstract

We consider a problem of key leakage in peer-to-peer (P2P) content distribution. In content-distribution services, content is encrypted so that only legitimate users can access the content. Users (peers) cannot be fully trusted in a P2P network because malicious ones might leak their decryption keys. If the redistribution of decryption keys occurs, copyright holders may incur great losses caused by free riders who access content without purchasing it. Therefore, it is essential to solve this problem. In this paper, we propose a P2P content-distribution scheme resilient to the key leakage, and show its feasibility by conducting a large-scale experiment in a real network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Advanced Access Content System. Response to reports of attacks on aacs technology, http://www.aacsla.com/press

  2. Akamai, http://www.akamai.com

  3. Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36(4), 335–371 (2004)

    Article  Google Scholar 

  4. Blu-ray Disc Association, http://www.blu-raydisc.com

  5. Crypto++ 5.6.0 Benchmarks, http://www.cryptopp.com/benchmarks.html

  6. eMule, http://www.emule-project.net

  7. Garcia, L., Arnaiz, L., Álvarez, F., Menéndez, J.M., Grüneberg, K.: Protected seamless content delivery in P2P wireless and wired networks. IEEE Wireless Communications 16(5), 50–57 (2009)

    Article  Google Scholar 

  8. Gnutella, http://www.gnutella.com

  9. Iwata, T., Abe, T., Ueda, K., Sunaga, H.: A DRM system suitable for P2P content delivery and the study on its implementation. In: Proc. 9th Asia-Pacific Conference on Communications (APCC 2003), vol. 2, pp. 806–811 (2003)

    Google Scholar 

  10. LibTorrent, http://libtorrent.rakshasa.no

  11. Liu, X., Yin, H., Lin, C., Du, C.: Efficient user authentication and key management for peer-to-peer live streaming systems. Tsinghua Science & Technology 14(2), 234–241 (2009)

    Article  Google Scholar 

  12. Miyachi, T., Chinen, K., Shinoda, Y.: StarBED and SpringOS: Large-scale general purpose network testbed and supporting software. In: Proc. 1st International Conference on Performance Evaluation Methodologies and Tools (Valuetools 2006). ACM Press (2006)

    Google Scholar 

  13. Motion Picture Association of America. Internet piracy, http://www.mpaa.org/piracy_internet.asp

  14. Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Palomar, E., Tapiador, J.M.E., Hernandez-Castro, J.C., Ribagorda, A.: Secure content access and replication in pure P2P networks. Computer Communications 31(2), 266–279 (2008)

    Article  Google Scholar 

  16. Qiu, F., Lin, C., Yin, H.: EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming. In: Zhuang, Y.-t., Yang, S.-Q., Rui, Y., He, Q. (eds.) PCM 2006. LNCS, vol. 4261, pp. 395–404. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. StarBED Project, http://www.starbed.org

  18. Sung, J.Y., Jeong, J.Y., Yoon, K.S.: DRM enabled P2P architecture. In: Proc. 8th International Conference of Advanced Communication Technology (ICACT), vol. 1, pp. 487–490 (2006)

    Google Scholar 

  19. The BitTorrent Protocol Specification, http://www.bittorrent.org/beps/bep_0003.html

  20. The BitTorrent Tracker Source Code, http://download.bittorrent.com/dl/archive/BitTorrent-3.9.1.tar.gz

  21. THE WALL STREET JOURNAL. Warner Bros. to Pull Out of DVDs in South Korea, http://online.wsj.com/article/SB122643080489917991.html

  22. WebLOAD, http://www.webload.org

  23. Zhang, X., Liu, D., Chen, S., Zhang, Z., Sandhu, R.: Towards digital rights protection in BitTorrent-like P2P systems. In: Proc. 15th SPIE/ACM Multimedia Computing and Networking, MMCN 2008 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Matsushita, T., Yamanaka, S., Zhao, F. (2012). A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage. In: Jung, S., Yung, M. (eds) Information Security Applications. WISA 2011. Lecture Notes in Computer Science, vol 7115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27890-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27890-7_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27889-1

  • Online ISBN: 978-3-642-27890-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics