Abstract
This paper presents a method and its implementation proposal, built on the blind signatures protocol, to trace and report users sharing a valid license illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization. An enhancement of the protocol to identify the last usage of a certain license is also provided, allowing to detect a traitor when an unauthorized copy of a license is used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Picker, R.C.: The yin and yang of copyright and technology. Commun. ACM 55(1), 30–32 (2012)
Lou, X., Hwang, K.: Collusive piracy prevention in p2p content delivery networks. IEEE Transactions on Computers 58(7), 970–983 (2009)
Ding, Y., Fan, L.: Traitor tracing and revocation mechanisms with privacy-preserving. In: Wang, Y., Ming Cheung, Y., Guo, P., Wei, Y. (eds.) CIS, pp. 842–846. IEEE (2011)
Kosuga, M., Yamazaki, T., Ogino, N., Matsuda, J.: Adaptive qos management using layered multi-agent system for distributed multimedia applications. In: ICPP, pp. 388–394 (1999)
Franklin, S., Graesser, A.C.: Is it an agent, or just a program?: A taxonomy for autonomous agents. In: Jennings, N.R., Wooldridge, M.J., Müller, J.P. (eds.) ECAI-WS 1996 and ATAL 1996. LNCS, vol. 1193, pp. 21–35. Springer, Heidelberg (1997)
Silva, D., Braga, R., Reis, L., Oliveira, E.: A generic model for a robotic agent system using gaia methodology: Two distinct implementations. In: IEEE Conference on Robotics Automation and Mechatronics, RAM, pp. 280–285 (2010)
Leetch, G., Mangina, E.: A multi-agent system to stream multimedia to handheld devices. In: Sixth International Conference on Computational Intelligence and Multimedia Applications, pp. 2–10. IEEE (2005)
Trappe, W., Washington, L.: Introduction to cryptography: with coding theory. Pearson Prentice Hall (June 2006)
Kale, L., Arya, A., Bhatele, A., Gupta, A., Jain, N., Jetley, P., Lifflander, J., Miller, P., Sun, Y., Venkataraman, R., Wesolowski, L., Zheng, G.: Charm++ for productivity and performance: A submission to the 2011 HPC class II challenge. Technical Report 11-49. Parallel Programming Laboratory (November 2011)
Capel Tunon, M., Lopez, M.: A parallel programming methodology based on high level parallel compositions (cpans). In: 14th International Conference on Electronics, Communications and Computers, CONIELECOMP 2004., pp. 242–247 (February 2004)
Alvarez-Bermejo, J.A., Roca-Piera, J.: A Proposed Asynchronous Object Load Balancing Method for Parallel 3D Image Reconstruction Applications. In: Hsu, C.-H., Yang, L.T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010, Part I. LNCS, vol. 6081, pp. 454–462. Springer, Heidelberg (2010)
Jang, M.-W., Agha, G.: Adaptive Agent Allocation for Massively Multi-agent Applications. In: Ishida, T., Gasser, L., Nakashima, H. (eds.) MMAS 2005. LNCS (LNAI), vol. 3446, pp. 25–39. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Álvarez-Bermejo, J.A., López-Ramos, J.A. (2013). Tracking Traitors in Web Services via Blind Signatures. In: Herrero, Á., et al. International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Advances in Intelligent Systems and Computing, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33018-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-33018-6_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33017-9
Online ISBN: 978-3-642-33018-6
eBook Packages: EngineeringEngineering (R0)