Empreu aquest identificador per citar o enllaçar aquest ítem: http://hdl.handle.net/10609/82369
Registre complet de metadades
Camp DCValorLlengua/Idioma
dc.contributor.authorQureshi, Amna-
dc.contributor.authorMegias, David-
dc.contributor.authorRifà-Pous, Helena-
dc.contributor.otherUniversitat Oberta de Catalunya. Internet Interdisciplinary Institute (IN3)-
dc.date.accessioned2018-07-03T12:33:26Z-
dc.date.available2018-07-03T12:33:26Z-
dc.date.issued2016-05-
dc.identifier.citationQureshi, A., Megías, D. & Rifà Pous, H. (2016). PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting. Journal of Network and Computer Applications, 66, 180-197. doi: 10.1016/j.jnca.2016.03.007en
dc.identifier.issn1084-8045MIAR
-
dc.identifier.urihttp://hdl.handle.net/10609/82369-
dc.description.abstractThe use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by cost-effective distribution of content, also giving rise to piracy. An end user (buyer/peer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further distribute the content illegally. To date, different P2P distribution systems have been proposed that provide copyright and privacy protection at a cost of high computational burden at the merchant's and/or at the buyer's end and thus, making these systems impractical. In this paper, we propose PSUM, a P2P content distribution system which allows efficient distribution of large-sized multimedia content while preserving the security and privacy of merchants and buyers. The security of PSUM is ensured by using an asymmetric fingerprinting protocol based on collusion-resistant codes. In addition, PSUM enables buyers to obtain digital contents anonymously, but this anonymity can be revoked as soon as he/she is found guilty of copyright violation. The paper presents a thorough performance analysis of PSUM, through different experiments and simulations, and also analyzes several security compromising attacks and countermeasures.en
dc.language.isoeng-
dc.publisherJournal of Network and Computer Applications-
dc.relation.ispartofJournal of Network and Computer Applications, 2016, 66-
dc.relation.urihttps://doi.org/10.1016/j.jnca.2016.03.007-
dc.rightsCC BY-NC-ND-
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/-
dc.subjectasymmetric fingerprintingen
dc.subjectcollusion-resistant fingerprintingen
dc.subjectpermutationen
dc.subjectpeer-to-peer computingen
dc.subjectprivacyen
dc.subjectempremta digital asimètricaca
dc.subjecthuella digital asimétricaes
dc.subjectempremtes digitals resistents a la col·lusióca
dc.subjecthuellas digitales resistentes a la colusiónes
dc.subjectpermutaciónes
dc.subjectpermutacióca
dc.subjectcomputació peer-to-peerca
dc.subjectcomputación peer-to-peeres
dc.subjectprivadesaca
dc.subjectprivacidades
dc.subject.lcshApplication softwareen
dc.titlePSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprintingen
dc.typeinfo:eu-repo/semantics/article-
dc.audience.mediatorTheme areas::Computer Science, Technology and Multimediaen
dc.subject.lemacProgramari d'aplicacióca
dc.subject.lcshesSoftware de aplicaciónes
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess-
dc.identifier.doi10.1016/j.jnca.2016.03.007-
dc.gir.idAR/0000004722-
dc.type.versioninfo:eu-repo/semantics/acceptedVersion-
Apareix a les col·leccions:Articles cientÍfics
Articles

Arxius per aquest ítem:
Arxiu Descripció MidaFormat 
PSUM-PostPrint.pdf908,36 kBAdobe PDFThumbnail
Veure/Obrir
Comparteix:
Exporta:
Consulta les estadístiques

Aquest ítem està subjecte a una llicència de Creative Commons Llicència Creative Commons Creative Commons