Please use this identifier to cite or link to this item:

http://hdl.handle.net/10609/82369
Title: PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting
Author: Qureshi, Amna  
Megías Jiménez, David  
Rifà Pous, Helena  
Others: Universitat Oberta de Catalunya. Internet Interdisciplinary Institute (IN3)
Keywords: asymmetric fingerprinting
collusion-resistant fingerprinting
permutation
peer-to-peer computing
privacy
Issue Date: May-2016
Publisher: Journal of Network and Computer Applications
Citation: Qureshi, A., Megías, D. & Rifà Pous, H. (2016). PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting. Journal of Network and Computer Applications, 66, 180-197. doi: 10.1016/j.jnca.2016.03.007
Also see: https://doi.org/10.1016/j.jnca.2016.03.007
Abstract: The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by cost-effective distribution of content, also giving rise to piracy. An end user (buyer/peer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further distribute the content illegally. To date, different P2P distribution systems have been proposed that provide copyright and privacy protection at a cost of high computational burden at the merchant's and/or at the buyer's end and thus, making these systems impractical. In this paper, we propose PSUM, a P2P content distribution system which allows efficient distribution of large-sized multimedia content while preserving the security and privacy of merchants and buyers. The security of PSUM is ensured by using an asymmetric fingerprinting protocol based on collusion-resistant codes. In addition, PSUM enables buyers to obtain digital contents anonymously, but this anonymity can be revoked as soon as he/she is found guilty of copyright violation. The paper presents a thorough performance analysis of PSUM, through different experiments and simulations, and also analyzes several security compromising attacks and countermeasures.
Language: English
URI: http://hdl.handle.net/10609/82369
ISSN: 1084-8045MIAR
Appears in Collections:Articles
Articles

Share:
Export:
Files in This Item:
File Description SizeFormat 
PSUM-PostPrint.pdfpostprint of the paper843.32 kBAdobe PDFView/Open

This item is licensed under a Creative Commons License Creative Commons