Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1877891.1877898acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Access control to BitTorrent swarms using closed swarms

Published: 29 October 2010 Publication History

Abstract

Peer-to-peer (P2P) technology potentially offers a promising basis for efficient, scalable and low-cost delivery of live content to large numbers of simultaneous users. However, the decentralized nature of P2P and the existence of untrusted peers makes commercial exploitation difficult. In this paper we describe Closed Swarms (CS), a P2P based content delivery system based on the BitTorrent protocols which makes it possible to differentiate between authorized and non-authorized nodes (or peers) within an overlay network. We show how Closed Swarms can be utilised as an access control mechanism to create a high quality content distribution network which provides legitimate users with an improved service over non-authorised users and which we believe may be used to drive the commercial adoption of P2P content distribution

References

[1]
Stephanos Androutsellis-Theotokis and Diomidis Spinellis. A survey of peer-to-peer content distribution technologies. ACM Comput. Surv., 36(4):335--371, 2004.
[2]
Joonsang Baek, Jan Newmarch, Reihaneh Safavinaini, and Willy Susilo. A survey of identity-based cryptography. In Proc. of Australian Unix Users Group Annual Conference, pages 95--102, 2004.
[3]
Cheun Ngen Chong and Frank Kamperman. Reducing unauthorized content distribution with monitoring. In Consumer Communications and Networking Conference, 2007. CCNC 2007. 4th IEEE, pages 1053--1057, Jan. 2007.
[4]
Bram Cohen. Incentives build robustness in bittorrent. In Workshop on Economics of Peer-to-Peer Systems (P2PEcon'03), Berkeley, CA, June 2003, 2003.
[5]
Jarret Falkner, Michael Piatek, John P. John, Arvind Krishnamurthy, and Thomas Anderson. Proling a million user dht. In In Proc. of Internet Measurement Conference, 2007.
[6]
Arnaud Legout, Nikitas Liogkas, Eddie Kohler, and Lixia Zhang. Clustering and sharing incentives in bittorrent systems. In Proc. 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 301--312, New York, NY, USA, 2007. ACM.
[7]
Xiaosong Lou and Kai Hwang. Collusive piracy prevention in p2p content delivery networks. IEEE Transactions on Computers, 58(7):970--983, 2009.
[8]
Xiaosong Lou, Kai Hwang, and Runfang Zhou. Integrated copyright protection in peer-to-peer networks. In Distributed Computing Systems Workshops, 2007. ICDCSW '07. 27th International Conference on, pages 28--28, June 2007.
[9]
J.J.D. Mol, A. Bakker, J. Pouwelse, D.H.J. Epema, and H.J. Sips. The design and deployment of a bittorrent live video streaming solution. In ISM 2009. IEEE Computer Society, December 2009.
[10]
G. Neglia, G. Reina, Honggang Zhang, D. Towsley, A. Venkataramani, and J. Danaher. Availability in bittorrent systems. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 2216--2224, May 2007.
[11]
P2P-Next. http://livinglab.eu/test.html.
[12]
P2P-Next. http://www.p2p-next.eu.
[13]
J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. van Steen, and H. J. Sips. Tribler: a social-based peer-to-peer system: Research articles. Concurr. Comput. : Pract. Exper., 20(2):127--138, 2008.
[14]
Pablo Rodriguez, See-Mong Tan, and Christos Gkantsidis. On the feasibility of commercial, legal p2p content distribution. SIGCOMM Comput. Commun. Rev., 36(1):75--78, 2006.
[15]
Chen Xi. Secure media distribution in p2p networks. In ISDPE '07: Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce, pages 212--214, Washington, DC, USA, 2007. IEEE Computer Society.
[16]
Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang, and Ravi Sandhu. Toward digital rights protection in BitTorrent-like P2P systems. In Multimedia computing and networking 2008, Proceedings of SPIE, the International Society for Optical Engineering, volume 6818, pages F.1--F.12, January 2008

Cited By

View all
  • (2014)Hiding user content interest while preserving P2P performanceProceedings of the 29th Annual ACM Symposium on Applied Computing10.1145/2554850.2555006(501-508)Online publication date: 24-Mar-2014
  • (2011)A New Security Architecture for BitTorrentProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.58(451-455)Online publication date: 16-Nov-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AVSTP2P '10: Proceedings of the 2010 ACM workshop on Advanced video streaming techniques for peer-to-peer networks and social networking
October 2010
98 pages
ISBN:9781450301695
DOI:10.1145/1877891
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. closed swarms
  2. live streaming
  3. peer-to-peer
  4. security
  5. video-on-demand

Qualifiers

  • Research-article

Conference

MM '10
Sponsor:
MM '10: ACM Multimedia Conference
October 29, 2010
Firenze, Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Hiding user content interest while preserving P2P performanceProceedings of the 29th Annual ACM Symposium on Applied Computing10.1145/2554850.2555006(501-508)Online publication date: 24-Mar-2014
  • (2011)A New Security Architecture for BitTorrentProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.58(451-455)Online publication date: 16-Nov-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media