Detecting illegal file sharing in Peer-to-Peer networks using fuzzy queries

The advent of Unstructured Peer-to-Peer (P2P) networks enables large amounts of content to be distributed over Internet. However, billions of dollars are lost every year as a consequence of illegal file sharing or piracy. The main focus towards detecting this has been in educating the public about legal file sharing alternatives instead of developing systems and architectures that define protocols, and mechanism. Within our knowledge, there is a lack of specialized protocols, and mechanisms that can detect possible sources of illegal file sharing in a P2P network and do not increment the query traffic. Much of the P2P query traffic is caused by the keyword search method enabled in P2P networks; a typical P2P network uses query broadcast to enable keyword search and are not able to express impreciseness. These protocols and mechanisms can be reinforced by the use of fuzzy logic. We propose an architecture that integrates fuzzy queries and an inference process with a P2P protocol called Localized Fuzzy Search Protocol (LFSP). The LFSP decreases P2P traffic and enables the discovering possible sources of illegal file sharing by querying directly the P2P sources. Finally, our architecture can be used by organizations wishing to detect possible sources of illegal file sharing and that are willing to take the corresponding actions.

[1]  Marlene Goncalves,et al.  Derivation Principle in Advanced Fuzzy Queries , 2005, The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05..

[2]  Slawomir Zadrozny,et al.  FQUERY III +:a "human-consistent" database querying system based on fuzzy logic with linguistic quantifiers , 1989, Inf. Syst..

[3]  Hsuan-Shih Lee An optimal algorithm for computing the max-min transitive closure of a fuzzy similarity matrix , 2001, Fuzzy Sets Syst..

[4]  Leonid José Tineo Rodríguez,et al.  About the Performance of SQLf Evaluation Mechanisms , 2006, CLEI Electron. J..

[5]  Gloria Bordogna,et al.  Customizable Flexible Querying in Classical Relational Databases , 2008, Handbook of Research on Fuzzy Information Processing in Databases.

[6]  Zongmin Ma,et al.  Generalization of strategies for fuzzy query translation in classical relational databases , 2007, Inf. Softw. Technol..

[7]  Marlene Goncalves,et al.  SQLfi y sus Aplicaciones , 2008, Rev. Avances en Sistemas Informática.

[8]  Michalis Faloutsos,et al.  File-sharing in the Internet: A characterization of P2P traffic in the backbone , 2003 .

[9]  Adnan Yazici,et al.  Fuzzy Database Modeling , 1998, J. Database Manag..

[10]  Patrick Bosc,et al.  ON THE EFFICIENCY OF THE ALPHA-CUT DISTRIBUTION METHOD TO EVALUATE SIMPLE FUZZY RELATIONAL QUERIES , 1995 .

[11]  James K. Mullin,et al.  A second look at bloom filters , 1983, CACM.

[12]  Kenneth J. Christensen,et al.  Broadcast Updates with Local Look-up Search (BULLS): a new peer-to-peer protocol , 2006, ACM-SE 44.

[14]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[15]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[16]  Patrick Bosc,et al.  SQLf: a relational database language for fuzzy querying , 1995, IEEE Trans. Fuzzy Syst..

[17]  Patrick Bosc,et al.  SQLf Query Functionality on Top of a Regular Relational Database Management System , 2000 .

[18]  José Galindo,et al.  Fuzzy Databases: Modeling, Design, and Implementation , 2006 .

[19]  Marlene Goncalves,et al.  A New Upgrade to SQLf: Towards a Standard in Fuzzy Databases , 2009, 2009 20th International Workshop on Database and Expert Systems Application.

[20]  Olga Pons,et al.  GEFRED: A Generalized Model of Fuzzy Relational Databases , 1994, Inf. Sci..