Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks. Request PDF on ResearchGate | Collusive Piracy Prevention in P2P Content Delivery Networks | Collusive piracy is the main source of. Collusive Piracy Prevention in. P2P Content Delivery Networks. Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. , Authors: Xiaosong .

Author: Tugami Fenrisida
Country: Comoros
Language: English (Spanish)
Genre: Travel
Published (Last): 1 April 2015
Pages: 248
PDF File Size: 1.20 Mb
ePub File Size: 7.70 Mb
ISBN: 622-1-73864-158-2
Downloads: 38580
Price: Free* [*Free Regsitration Required]
Uploader: Dam

Collusive Piracy Prevention in P2P Content Delivery Networks

This service is more advanced with JavaScript available, learn more at http: Knowledge and Information Systems. P2P collusive piracywhere paid P2P clients share the content with unpaid clients, has drawn significant concerns in recent years.

Study on the follow relationship provides an emerging track of research in capturing the followee e. Unfortunately, existing research efforts on the follow relationship in online social network have largely overlooked the time constraint and the content feedback in sequential behavior analysis.


Collusive Piracy Prevention in P2P Content Delivery Networks – Semantic Scholar

Hence, how to consider these two characteristics for effective P2P collusive piracy prevention remains an open problem.

In this paper, we proposed a multi-bloom filter circle to facilitate the time-constraint storage and query of P2P sequential behaviors. Then, a probabilistic follow with content feedback model to fast discover and quantify the probabilistic follow relationship is further developed, and then, the corresponding approach to piracy prevention is designed.

The extensive experimental analysis demonstrates the capability of the proposed approach. Skip to main content. Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.

Regular Paper First Online: This is a preview of subscription content, log in to check access. Schollmeier R A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. J Inf Process 20 2: Policy Internet 3 2: Bellare M, Namprempre C networos al Security proofs for identity-based identification and signature schemes.

Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy | SpringerLink

J Cryptol 22 1: Yoshida M, Ohzahata S et al. Comput Netw 52 6: Dugu N, Perez A Detecting social capitalists on twitter using similarity measures. Proceedings of the 28th ACM international conference on human factors in computing systems, pp — Google Scholar. Armentano M, Godoy D et al Topology-based recommendation of users in micro-blogging communities. J Comput Sci Technol 27 2: ACM Sigmod Rec 32 2: Datar M, Motwani R The sliding-window computation model and results.


Data Streams — Google Scholar. Aggarwal CC Data streams: IEEE Multimed 18 1: Comput Netw 56 3: Koenigstein N, Shavitt Y et al Measuring the validity of peer-to-peer data for information retrieval applications 56 3: Internet Math 1 4: Newman M, Girvan M Community structure in social and biological networks.

Luxburg U A tutorial on spectral clustering. Stat Comput 17 4: Woess W Random walks on infinite graphs and groups.

Li Q, Wenjia N et al Recover fault services via complex service-to-node mappings in wireless sensor networks. J Netw Comput Appl Cite article How to cite?