Framework for preserving security and privacy in peer-to-peer content distribution systems

P2P distribution with collusion-resistant fingerprinting and revocable privacy.Creation of small-sized file to make the system cost-effective for content owners.Security analysis of the system under various attacks confirms security. The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by efficient distribution of content, also giving rise to piracy. An end user (buyer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further distribute the content illegally. Therefore, there is a strong need for a content distribution mechanism over P2P networks that do not pose security and privacy threats to the copyright holders and end users, respectively. The existent systems for copyright and privacy protection employ cryptographic mechanisms at a cost of high computational burden which makes these systems impractical to distribute large sized files, such as music albums or movies. In this paper, we propose and analyze a P2P content distribution system which allows efficient distribution of large-sized content while preserving the security and privacy of merchants and buyers, respectively. Our proposed framework is able to resolve the problems of piracy tracing, buyer frameproofness, collusion resistance, dispute resolution and buyer's anonymity. We have carried out simulations to evaluate the performance of our framework in terms of imperceptibility, robustness, throughput and content delivery costs. The experimental results confirm that the proposed framework provides an efficient solution to copyright infringement issues over P2P networks, reducing the multimedia file sizes as much as five times on average, while protecting the end users' privacy and anonymity.

[1]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[2]  Amos Fiat,et al.  Tracing Traitors , 1994, CRYPTO.

[3]  Brian Neil Levine,et al.  Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[4]  Henning Pagnia,et al.  On the Impossibility of Fair Exchange without a Trusted Third Party , 1999 .

[5]  Hideki Imai,et al.  An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths , 2007, AAECC.

[6]  Sridhar Krishnan,et al.  A Wavelet-PCA-Based Fingerprinting Scheme for Peer-to-Peer Video File Sharing , 2010, IEEE Transactions on Information Forensics and Security.

[7]  Jongsung Kim,et al.  Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents , 2011, Wirel. Pers. Commun..

[8]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[9]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[10]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[11]  Gábor Tardos,et al.  Optimal probabilistic fingerprint codes , 2003, STOC '03.

[12]  Raphael C.-W. Phan,et al.  An authentication framework for peer-to-peer cloud , 2013, SIN.

[13]  David Megías,et al.  High capacity audio watermarking using the high frequency band of the wavelet domain , 2010, Multimedia Tools and Applications.

[14]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[15]  Birgit Pfitzmann,et al.  Asymmetric fingerprinting , 1996 .

[16]  Yunhao Liu,et al.  Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps , 2008, IEEE Transactions on Parallel and Distributed Systems.

[17]  Kouichi Sakurai,et al.  Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party , 2003, ACNS.

[18]  Sviatoslav Voloshynovskiy,et al.  Active content fingerprinting: A marriage of digital watermarking and content fingerprinting , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[19]  Andrea Passarella,et al.  A survey on content-centric technologies for the current Internet: CDN and P2P solutions , 2012, Comput. Commun..

[20]  M. B. Chandak,et al.  KEY FRAME EXTRACTION METHODOLOGY FOR VIDEO ANNOTATION , 2013 .

[21]  José Luis García-Dorado,et al.  Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact , 2012, IEEE Transactions on Network and Service Management.

[22]  Jan Camenisch Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.

[23]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[24]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[25]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[26]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[27]  Bart Preneel,et al.  On Secure and Anonymous Buyer-Seller Watermarking Protocol , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[28]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[29]  Minoru Kuribayashi,et al.  Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.

[30]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[31]  Josep Domingo-Ferrer,et al.  Short collusion-secure fingerprints based on dual binary Hamming codes , 2000 .

[32]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[33]  Josep Domingo-Ferrer,et al.  Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints , 2013, Multimedia Systems.

[34]  Jung-Shian Li,et al.  A novel DRM framework for peer-to-peer music content delivery , 2010, J. Syst. Softw..

[35]  Alessandro Piva,et al.  A Provably Secure Anonymous Buyer–Seller Watermarking Protocol , 2010, IEEE Transactions on Information Forensics and Security.

[36]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[37]  Fred von Lohmann Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers , 2003, IPTPS.

[38]  Josep Domingo-Ferrer,et al.  Practical asymmetric fingerprinting with a TTP , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[39]  Jian Cao,et al.  Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security , 2012, IEEE Transactions on Information Forensics and Security.

[40]  Kai Hwang,et al.  Collusive Piracy Prevention in P2P Content Delivery Networks , 2009, IEEE Transactions on Computers.

[41]  Josep Domingo-Ferrer,et al.  Distributed multicast of fingerprinted content based on a rational peer-to-peer community , 2013, Comput. Commun..

[42]  Jose L. Muñoz,et al.  Surework: a super-peer reputation framework for p2p networks , 2008, SAC '08.

[43]  Alessandro Piva,et al.  Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.

[44]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[45]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..

[46]  Zekeriya Erkin,et al.  Anonymous Fingerprinting with Robust QIM Watermarking Techniques , 2007, EURASIP J. Inf. Secur..