Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1921168.1921183acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Is content publishing in BitTorrent altruistic or profit-driven?

Published: 30 November 2010 Publication History

Abstract

BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content without any cost for the consumers. However, apart from required resources, publishing (sharing) valuable (and often copyrighted) content has serious legal implications for users who publish the material (or publishers). This raises a question that whether (at least major) content publishers behave in an altruistic fashion or have other incentives such as financial. In this study, we identify the content publishers of more than 55K torrents in two major BitTorrent portals and examine their behavior. We demonstrate that a small fraction of publishers is responsible for 67% of the published content and 75% of the downloads. Our investigations reveal that these major publishers respond to two different profiles. On the one hand, antipiracy agencies and malicious publishers publish a large amount of fake files to protect copyrighted content and spread malware respectively. On the other hand, content publishing in BitTorrent is largely driven by companies with financial incentives. Therefore, if these companies lose their interest or are unable to publish content, BitTorrent traffic/portals may disappear or at least their associated traffic will be significantly reduced.

References

[1]
http://www.theregister.co.uk/2008/06/02/onk_further_arrests/.
[2]
http://yro.slashdot.org/yro/05/01/13/2248252.shtml?id=123&tid=97&tid=95&tid=1.
[3]
MaxMind. http://www.maxmind.com.
[4]
The Impact of P2P File Sharing, Voice over IP, Skype, Joost, Instant Messaging, One-Click Hosting and Media Streaming such as YouTube on the Internet, 2007. http://www.ipoque.com/resources/internet-studies/internet-study-2007.
[5]
Bay TSP Annual Report, 2008. http://tech.mit.edu/V129/N28/piracy/BayTSP2008report.pdf.
[6]
S. Le Blond, A. Legout, F. Lefessant, W. Dabbous, and M. Ali Kaafar. Spying the world from your laptop. LEET'10, 2010.
[7]
D. R. Choffnes, J. Duch, D. Malmgren, R. Guimera, F. E. Bustamante, and L. Amaral. Strange bedfellows: Communities in bittorrent. IPTPS'10, 2010.
[8]
R. Cuevas, M. Kryczka, A. Cuevas, S. Kaune, C. Guerrero, and R. Rejaie. Is content publishing in bittorrent altruistic or profit-driven?. Tech report: http://arxiv.org/abs/1007.2327, 2010.
[9]
R. Cuevas, N. Laoutaris, X. Yang, G. Siganos, and P. Rodriguez. Deep Diving into BitTorrent Locality. In ACM SIGMETRICS'10 (Poster Session).
[10]
L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurements, Analysis, and Modeling of BitTorrent-like Systems. In ACM IMC'05.
[11]
David Hales, Rameez Rahman, Boxun Zhang, Michel Meulpolder, and Johan Pouwelse. Bittorrent or bitcrunch: Evidence of a credit squeeze in bittorrent? In WETICE '09, 2009.
[12]
M. Izal, G. Urvoy-Keller, E. W. Biersack, P. A. Felber, A. Al Hamra, and L. Garces-Erice. Dissecting bittorrent: Five months in a torrent's lifetime. In PAM '04.
[13]
S. Kaune, R. Cuevas, G. Tyson, A. Mauthe, C. Guerrero, and R. Steinmetz. Unraveling BitTorrent's File Unavailability: Measurements, Analysis and Solution Exploration. In IEEE P2P'10.
[14]
B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. In ACM WOSN '09, 2009.
[15]
N. Laoutaris, D. Carra, and P. Michiardi. Uplink allocation beyond choke/unchoke or how to divide and conquer best. In ACM CoNEXT'08.
[16]
A. Legout, N. Liogkas, E. Kohler, and L. Zhang. Clustering and sharing incentives in bittorrent systems. In ACM SIGMETRICS '07.
[17]
J. Liang, N. Naoumov, and K. W. Ross. The index poisoning attack in p2p file sharing systems. In IEEE INFOCOM'06, 2006.
[18]
D. Menasche, A. Rocha, B. Li, D. Towsley, and A. Venkataramani. Content availability in swarming systems: Models, measurements and bundling implications. In ACM CoNEXT'09.
[19]
M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani. Do incentives build robustness in BitTorrent? In NSDI'07, 2007.
[20]
J. A. Pouwelse, P. Garbacki, D. H. J. Epema, and H. J. Sips. The BitTorrent P2P file-sharing system: Measurements and analysis. In IPTPS'05.
[21]
M. Sirivianos, J. Han, P. Rex, and C. X. Yang. Free-riding in bittorrent networks with the large view exploit. In IPTPS 07, 2007.
[22]
C. Zhang, P. Dhungel, D. Wu, and K. W. Ross. Unraveling the bittorrent ecosystem. IEEE Transactions on Parallel and Distributed Systems, 2010.

Cited By

View all
  • (2024)Guardians of the galaxyProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698985(1507-1524)Online publication date: 14-Aug-2024
  • (2021)Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic ReviewJournal of Medical Internet Research10.2196/2446023:11(e24460)Online publication date: 15-Nov-2021
  • (2020)Revisiting the coupon collector’s problem to unveil users’ online sessions in networked systemsPeer-to-Peer Networking and Applications10.1007/s12083-020-01012-2Online publication date: 13-Nov-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
Co-NEXT '10: Proceedings of the 6th International COnference
November 2010
349 pages
ISBN:9781450304481
DOI:10.1145/1921168
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. BitTorrent
  2. business model
  3. content publishing

Qualifiers

  • Research-article

Funding Sources

Conference

Co-NEXT '10
Sponsor:
Co-NEXT '10: Conference on emerging Networking EXperiments and Technologies
November 30 - December 3, 2010
Pennsylvania, Philadelphia

Acceptance Rates

Overall Acceptance Rate 198 of 789 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Guardians of the galaxyProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698985(1507-1524)Online publication date: 14-Aug-2024
  • (2021)Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic ReviewJournal of Medical Internet Research10.2196/2446023:11(e24460)Online publication date: 15-Nov-2021
  • (2020)Revisiting the coupon collector’s problem to unveil users’ online sessions in networked systemsPeer-to-Peer Networking and Applications10.1007/s12083-020-01012-2Online publication date: 13-Nov-2020
  • (2019)SEEMlessProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3363202(1639-1656)Online publication date: 6-Nov-2019
  • (2017)Adaptive approach to restraining content pollution in peer-to-peer networksInformation Systems Frontiers10.1007/s10796-016-9651-019:6(1373-1390)Online publication date: 1-Dec-2017
  • (2017)Analysing Distribution of Copyrighted Files by Tracking BitTorrent NetworkSmart Trends in Systems, Security and Sustainability10.1007/978-981-10-6916-1_13(149-155)Online publication date: 31-Dec-2017
  • (2016)Mistrustful P2P: Privacy-preserving file sharing over untrustworthy Peer-to-Peer networks2016 IFIP Networking Conference (IFIP Networking) and Workshops10.1109/IFIPNetworking.2016.7497223(395-403)Online publication date: May-2016
  • (2016)Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market Perspective2016 11th International Conference on Availability, Reliability and Security (ARES)10.1109/ARES.2016.55(701-705)Online publication date: Aug-2016
  • (2016)Empirical investigation of BitTorrent community graphsComputing10.1007/s00607-015-0470-998:6(567-582)Online publication date: 1-Jun-2016
  • (2016)Optimisation-based collaborative determination of component trustworthiness in service compositionsSecurity and Communication Networks10.1002/sec.9859:6(513-527)Online publication date: 1-Apr-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media