Please use this identifier to cite or link to this item:
Title: Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting
Author: Megías Jiménez, David
Qureshi, Amna
Others: Universitat Oberta de Catalunya. Internet Interdisciplinary Institute (IN3)
Keywords: P2P content distribution
collusion-resistant fingerprinting
recombined fingerprints
Issue Date: 18-Mar-2016
Publisher: Expert Systems with Applications
Citation: Megías, D. & Qureshi, A. (2017). Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Systems with Applications, 71, 147-172. doi: 10.1016/j.eswa.2016.11.015
Also see:
Abstract: Recombined fingerprints have been suggested as a convenient approach to improve the efficiency of anonymous fingerprinting for the legal distribution of copyrighted multimedia contents in P2P systems. The recombination idea is inspired by the principles of mating, recombination and heredity of the DNA sequences of living beings, but applied to binary sequences, like in genetic algorithms. However, the existing recombination-based fingerprinting systems do not provide a convenient solution for collusion resistance, since they require 'double-layer' fingerprinting codes, making the practical implementation of such systems a challenging task. In fact, collusion resistance is regarded as the most relevant requirement of a fingerprinting scheme, and the lack of any acceptable solution to this problem would possibly deter content merchants from deploying any practical implementation of the recombination approach. In this paper, this drawback is overcome by introducing two non-trivial improvements, paving the way for a future real-life application of recombination-based systems. First, Nuida et al.'s collusion-resistant codes are used in segment-wise fashion for the first time. Second, a novel version of the traitor-tracing algorithm is proposed in the encrypted domain, also for the first time, making it possible to provide the buyers with security against framing. In addition, the proposed method avoids the use of public-key cryptography for the multimedia content and expensive cryptographic protocols, leading to excellent performance in terms of both computational and communication burdens. In fact, after bootstrapping, the merchant is no longer required to participate in any file transfer, reducing the investment in equipment required for content distribution to the bare minimum. The paper also analyzes the security and privacy properties of the proposed system both formally and informally, whereas the collusion resistance and the performance of the method are shown by means of experiments and simulations.
Language: English
ISSN: 0957-4174MIAR
Appears in Collections:Articles cientÍfics

Files in This Item:
File Description SizeFormat 
ESWA-PostPrint.pdf1,41 MBAdobe PDFThumbnail