The use of Peer-to-Peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by efficient distribution of content, also giving rise to piracy. An end user (buyer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further distribute the content illegally. Therefore, there is a strong need for a content distribution mechanism over P2P networks that do not pose security and privacy threats to the copyright holders and end users, respectively. The existent systems for copyright and privacy protection employ cryptographic mechanisms at a cost of high computational burden which makes these systems impractical to distribute large sized files, such as music albums or movies. In this paper, we propose and analyse a P2P content distribution system which allows efficient distribution of large-sized content while preserving the security and privacy of merchants and buyers, respectively. Our proposed framework is able to resolve the problems of piracy tracing, buyer frameproofness, collusion resistance, dispute resolution and buyer's anonymity. We have carried out simulations to evaluate the performance of our framework in terms of imperceptibility, robustness, throughput and content delivery costs. The experimental results confirm that the proposed framework provides an efficient solution to copyright infringement issues over P2P networks, reducing the multimedia file sizes as much as five times on average, while protecting the end users' privacy and anonymity.
The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by cost-effective distribution of content, also giving rise to piracy. An end user (buyer/peer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further distribute the content illegally.To date, different P2P distribution systems have been proposed that provide copyright and privacy protection at a cost of high computational burden at the merchants and/or at the buyers end and thus, making these systems impractical.In this paper, we propose PSUM, a P2P content distribution system which allows efficient distribution of large-sized multimedia content while preserving the security and privacy of merchants and buyers. The security of PSUM is ensured by using an asymmetric fingerprinting protocol based on collusion-resistant codes. In addition, PSUM enables buyers to obtain digital contents anonymously, but this anonymity can be revoked as soon as he/she is found guilty of copyright violation. The paper presents a thorough performance analysis of PSUM, through different experiments and simulations, and also analyzes several security compromising attacks and countermeasures.Traditional client-server content distribution systems are dependent on a centralized server which is costly in terms of initial infrastructure investment and maintenance. Moreover, the lack of scalability and the high bandwidth requirements are some factors that degrade the client-server system performance. In contrast to client-server systems, P2P technology offers cost efficiency, scalability, less administrative requirements and exposure to a large number of users. These benefits are the attractive features for media companies towards the adoption of P2P systems. BitTorrent (BT) (BitTorrent, 2000) is one of the most popular P2P distribution systems used on the Internet for distributing large amount of data, and it accounts for a significant volume of Internet traffic. For example, Red Hat Inc. uses Preprint submitted to Elsevier the merchant into a small-sized base file and a large-sized supplementary file. The base file contains the most important information and, without it, the supplementary file is unusable. The merchant sends the base file to a buyer in a semi-centralized way and uses a network of peer buyers to distribute the supplementary file.2. The proposed asymmetric fingerprinting protocol based on a state-of-the-art collusion-resistant codes and an existing secure embedding scheme is performed between a merchant, a buyer and a set of P2P proxies in the presence of a third party (monitor). The proposed fingerprinting protocol (Section 3.4.2) provides significantly improved efficiency over that of similar schemes that have been presented in the past, by using the idea of pre-computation-based secure embedding and permutation. In pre-computation-based secure embe...
Recombined fingerprints have been suggested as a convenient approach to improve the efficiency of anonymous fingerprinting for the legal distribution of copyrighted multimedia contents in P2P systems. The recombination idea is inspired by the principles of mating, recombination and heredity of the DNA sequences of living beings, but applied to binary sequences, like in genetic algorithms. However, the existing recombination-based fingerprinting systems do not provide a convenient solution for collusion resistance, since they require "double-layer" fingerprinting codes, making the practical implementation of such systems a challenging task. In fact, collusion resistance is regarded as the most relevant requirement of a fingerprinting scheme, and the lack of any acceptable solution to this problem would possibly deter content merchants from deploying any practical implementation of the recombination approach. In this paper, this drawback is overcome by introducing two non-trivial improvements, paving the way for a future real-life application of recombination-based systems. First, Nuida et al.'s collusion-resistant codes are used in segment-wise fashion for the first time. Second, a novel version of the traitor-tracing algorithm is proposed in the encrypted domain, also for the first time, making it possible to provide the buyers with security against framing. In addition, the proposed method avoids the use of public-key cryptography for the multimedia content and expensive cryptographic protocols, leading to excellent performance in terms of both computational and communication burdens. In fact, after bootstrapping, the merchant is no longer required to participate in any file transfer, reducing the investment in equipment required for content distribution to the bare minimum. The paper also analyzes the security and privacy properties of the proposed system both formally and informally, whereas the collusion resistance and the performance of the method are shown by means of experiments and simulations.
Copyright protection is one of the most relevant challenges in the network society. This paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source of an illegal redistribution, making it possible for the copyright holder to take legal action in case of copyright violation. The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting. After analyzing those solutions, a discussion is carried out to highlight the properties and the limitations of those techniques. Finally, some directions for further research on this topic are suggested.
In this paper, we provide a holistic survey of multimedia content protection applications in which blockchain technology is being used. A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain technology, content protection techniques, namely, encryption, digital rights management, digital watermarking and fingerprinting (or transaction tracking), and performance criteria. The study of the literature reveals that there is currently no complete and systematic taxonomy dedicated to blockchain-based copyright protection applications. Moreover, the number of successfully developed blockchain-based content protection systems is very low. This points towards a research gap. To fill this gap, we propose a taxonomy that integrates technical aspects and application knowledge and can guide the researchers towards the development of blockchain-based multimedia copyright protection systems. Furthermore, the paper discusses some technical challenges and outlines future research directions.
Electronic polling systems promise benefits to voters such as accessibility and convenience that enable them to cast their votes at any time, from any Internet-connected computing device anywhere in the world. However, unlike traditional paper-based voting systems, an e-polling system introduces several security risks such as privacy of vote, unlinkability of a voter, voter coercion, secrecy of partial election results, verifiability, and poll integrity. The authenticity of a voter is another security concern, i.e., a voter must be identified through an authentication mechanism that prevents voting of unauthorized voters or multiple voting from authorized voters. Another security concern is the manipulation of votes by an infected (e.g., virus, malware, and so on) voting device. Since the voters use their personal devices to cast votes in an unsupervised environment, a malware-hosted device could make unauthorized modifications to the voter's voting choices. Many e-voting systems have been proposed, however, to date, all these schemes either fail to provide all the required security properties or are not practically feasible on lightweight computing devices. In this paper, we present a secure and verifiable polling system, SeVEP, that employs well-known cryptographic primitives to provide vote and voter's privacy, and poll integrity, confirms the identity of voters through a multifactor authentication scheme, enables multiple voting within the allowed polling period, prevents double voting, and achieves verifiability and uncoercibility in the presence of untrusted voting device. The security, performance, and comparative analysis in terms of security properties and cryptographic costs show that SeVEP is secure, verifiable, and practical e-polling system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.