Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10609/82366
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Megias, David | - |
dc.contributor.author | Qureshi, Amna | - |
dc.contributor.other | Universitat Oberta de Catalunya. Internet Interdisciplinary Institute (IN3) | - |
dc.date.accessioned | 2018-07-03T12:05:46Z | - |
dc.date.available | 2018-07-03T12:05:46Z | - |
dc.date.issued | 2016-03-18 | - |
dc.identifier.citation | Megías, D. & Qureshi, A. (2017). Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Systems with Applications, 71, 147-172. doi: 10.1016/j.eswa.2016.11.015 | - |
dc.identifier.issn | 0957-4174MIAR | - |
dc.identifier.uri | http://hdl.handle.net/10609/82366 | - |
dc.description.abstract | Recombined fingerprints have been suggested as a convenient approach to improve the efficiency of anonymous fingerprinting for the legal distribution of copyrighted multimedia contents in P2P systems. The recombination idea is inspired by the principles of mating, recombination and heredity of the DNA sequences of living beings, but applied to binary sequences, like in genetic algorithms. However, the existing recombination-based fingerprinting systems do not provide a convenient solution for collusion resistance, since they require 'double-layer' fingerprinting codes, making the practical implementation of such systems a challenging task. In fact, collusion resistance is regarded as the most relevant requirement of a fingerprinting scheme, and the lack of any acceptable solution to this problem would possibly deter content merchants from deploying any practical implementation of the recombination approach. In this paper, this drawback is overcome by introducing two non-trivial improvements, paving the way for a future real-life application of recombination-based systems. First, Nuida et al.'s collusion-resistant codes are used in segment-wise fashion for the first time. Second, a novel version of the traitor-tracing algorithm is proposed in the encrypted domain, also for the first time, making it possible to provide the buyers with security against framing. In addition, the proposed method avoids the use of public-key cryptography for the multimedia content and expensive cryptographic protocols, leading to excellent performance in terms of both computational and communication burdens. In fact, after bootstrapping, the merchant is no longer required to participate in any file transfer, reducing the investment in equipment required for content distribution to the bare minimum. The paper also analyzes the security and privacy properties of the proposed system both formally and informally, whereas the collusion resistance and the performance of the method are shown by means of experiments and simulations. | en |
dc.language.iso | eng | - |
dc.publisher | Expert Systems with Applications | en |
dc.relation.ispartof | Expert Systems with Applications, 2017, 71 | - |
dc.relation.uri | https://doi.org/10.1016/j.eswa.2016.11.015 | - |
dc.rights | CC BY-NC-ND | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ | - |
dc.subject | P2P content distribution | en |
dc.subject | collusion-resistant fingerprinting | en |
dc.subject | recombined fingerprints | en |
dc.subject | privacy | en |
dc.subject | distribució de contingut P2P | ca |
dc.subject | distribución de contenido P2P | es |
dc.subject | empremtes digitals resistents a la col·lusió | ca |
dc.subject | huellas digitales resistentes a la colusión | es |
dc.subject | empremtes digitals recombinades | ca |
dc.subject | huellas digitales recombinadas | es |
dc.subject | privadesa | ca |
dc.subject | privacidad | es |
dc.subject.lcsh | Computer security | en |
dc.title | Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting | en |
dc.type | info:eu-repo/semantics/article | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.subject.lemac | Seguretat informàtica | ca |
dc.subject.lcshes | Seguridad informática | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | - |
dc.identifier.doi | 10.1016/j.eswa.2016.11.015 | - |
dc.gir.id | AR/0000005134 | - |
dc.type.version | info:eu-repo/semantics/acceptedVersion | - |
Aparece en las colecciones: | Articles cientÍfics Articles |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
ESWA-PostPrint.pdf | 1,41 MB | Adobe PDF | Visualizar/Abrir |
Comparte:
Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons