Abstract
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver their content. CPs are hesitant to rely on a P2P distribution model because it introduces a number of security concerns including content pollution by malicious peers, and lack of enforcement of authorized downloads. Furthermore, because users communicate directly with one another, the users can easily form illegal file-sharing clusters to exchange copyrighted content. Such exchange could hurt the content providers’ profits. We present a P2P system TP2P, where we introduce a notion of trusted auditors (TAs). TAs are P2P peers that police the system by covertly monitoring and taking measures against misbehaving peers. This policing allows TP2P to enable a stronger security model making P2P a viable alternative for the distribution of paid digital content. Through analysis and simulation, we show the effectiveness of even a small number of TAs at policing the system. In a system with as many as 60% of misbehaving users, even a small number of TAs can detect 99% of illegal cluster formation. We develop a simple economic model to show that even with such a large presence of malicious nodes, TP2P can improve CP’s profits (which could translate to user savings) by 62% to 122%, even while assuming conservative estimates of content and bandwidth costs. We implemented TP2P as a layer on top of BitTorrent and demonstrated experimentally using PlanetLab that our system provides trusted P2P file sharing with negligible performance overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Apple itunes, http://www.apple.com/itunes
Amazon, http://www.amazon.com/
Akamai, http://www.akamai.com/
Warner bros and p2p, http://arstechnica.com/news.ars/post/20060130-6080.html
Xbox-sky, http://bt.xbox-sky.com/
Red Skunk Tracker, http://www.inkrecharge.com/ttrc2/
Piratebay, http://thepiratebay.org/
About media defender, http://rss.slashdot.org/~r/Slashdot/slashdot/~3/157024087/article.pl
Limelight, http://www.limelightnetworks.com/
Vitalstream, http://www.vitalstream.com/
Aguilar, J.G.: Personal communication (February 2006)
Freedman, M.J., et al.: Coral, http://www.coralcdn.org/
Pai, V., et al.: Codeen, http://codeen.cs.princeton.edu/
Bittorrent, http://www.bittorrent.com
Napsterm, http://www.napster.com
Kazaa, http://www.kazaa.com
Yang, X., de Veciana, G.: Service capacity of peer to peer networks. In: INFOCOM (2004)
Arthur, D., Panigrahy, R.: Analyzing the efficiency of bit-torrent and related peer-to-peer networks. In: SODA (January 2006)
Massoulie, L., Vojnovic, M.: Coupon replication systems. In: SIGMETRICS (2005)
Qiu, D., Srikant, R.: Modeling and performance analysis of bittorrent-like peet-to-peer networks. In: SIGCOMM (2004)
Movedigital, http://www.movedigital.com/
Biddle, P., England, P., Peinado, M., Willman, B.: The Darknet and the Future of Content Distribution. In: Proceedings of the 2nd ACM Workshop on Digital Rights Management (November 2002)
Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust in peer-to-peer communities. IEEE TKDE, Special Issue on Peer-to-Peer Based Data Management 6 (2004)
Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free riding in bittorrent is cheap. In: 5th Workshop on Hot Topics in Networks (2006)
Cohen, B.: Incentives build robustness in bittorrent. In: Workshop on Economics of P2P Systems (2003)
Liogkas, N., Nelson, R., Kohler, E., Zhang, L.: Exploiting BitTorrent for Fun (but not Profit). In: International Workshop on P2P Systems (2006)
Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: Karma: A virtual Currency for Peer-To-Peer Systems. In: ACM Workshop on the Economics of Peer-to-Peer Systems (June 2003)
Ngan, T., Nandi, A., Singh, A., Wallach, D., Druschel, P.: Designing Incentives-Compatible Peer-to-Peer Systems. In: Proceedings of the 2nd Workshop on Future Directions in Distributed Computing (2004)
Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., Venkataramani, A.: Do Incentives Build Robustness in BitTorrent? In: Proceedings of the 3rd USENIX Symposium on Networked Systems Design and Implementation (NSDI) (April 2007)
Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., Venkataramani, A.: Building BitTyrant, a (more) strategic BitTorrent client. USENIX;login: 32(4), 8–13 (2007)
CCITT: X.509: The Directory Authentication Framework. International Telecommunications Union, Geneva (1989)
Cui, W., Paxson, V., Weaver, N., Katz, R.H.: Protocol-independent adaptive replay of application dialog. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS) (February 2006)
Top 22 U.S. ISPs by Subscriber: Q3 2006: Market Research, http://www.isp-planet.com/research/rankings/usa.html
Planetlab, http://www.planetlab.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sherman, A., Stavrou, A., Nieh, J., Keromytis, A.D., Stein, C. (2009). Adding Trust to P2P Distribution of Paid Content. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds) Information Security. ISC 2009. Lecture Notes in Computer Science, vol 5735. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04474-8_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-04474-8_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04473-1
Online ISBN: 978-3-642-04474-8
eBook Packages: Computer ScienceComputer Science (R0)