A novel stochastic-encryption-based P2P Digital Rights Management scheme

Digital right protection in P2P systems is attracting more and more attentions. In this paper, we present a new stochastic-encryption-based Digital Rights Management (DRM) scheme for P2P content delivery networks. The files are encrypted such that unpaid users cannot access the plaintext content. We exploit the random characteristics of P2P to increase the key space, which can defense collusion attacks. We add piece validation policy during a download process to prevent poisoning attacks. In our scheme, peers make a payment after downloading, and this prevents user loss due to download failures (caused by the dynamics of P2P). Our scheme does not have frequent user authentications or state maintenance. Analysis and simulation experiments show that our scheme can defend against collusion attacks and poisoning attacks with a fairly high probability.

[1]  Sridhar Krishnan,et al.  A Wavelet-PCA-Based Fingerprinting Scheme for Peer-to-Peer Video File Sharing , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[3]  Ki-Song Yoon,et al.  DRM Enabled P2P Architecture , 2006, 2006 8th International Conference Advanced Communication Technology.

[4]  Zuohua Ding,et al.  A Public-Key Cryptosystem Based On , 2014 .

[5]  Spyros Sioutas,et al.  Decentralized digital content exchange and copyright protection via P2P networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[6]  Yi-Ming Chen,et al.  An anonymous DRM scheme for sharing multimedia files in P2P networks , 2012, Multimedia Tools and Applications.

[7]  Yu-Yi Chen,et al.  A Feasible DRM Mechanism for BT-Like P2P System , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[8]  Zhi Tang,et al.  A decentralized authorization scheme for DRM in P2P file-sharing systems , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[9]  Angelos D. Keromytis,et al.  Adding Trust to P2P Distribution of Paid Content , 2009, ISC.

[10]  K.P. Chow,et al.  BTM - An Automated Rule-based BT Monitoring System for Piracy Detection , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[11]  Kai Hwang,et al.  Collusive Piracy Prevention in P2P Content Delivery Networks , 2009, IEEE Transactions on Computers.

[12]  Xinwen Zhang,et al.  Toward digital rights protection in BitTorrent-like P2P systems , 2008, Electronic Imaging.

[13]  Paul A. Watters,et al.  Detecting and Tracing Copyright Infringements in P2P Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).