Access control to BitTorrent swarms using closed swarms
Proceedings of the 2010 ACM workshop on Advanced video streaming techniques for peer-to-peer networks and social networking
Hi-index | 0.00 |
A secure content distribution scheme is presented in this paper, which can trace illegal distributors in Peer to Peer networks. In this scheme, the encrypted content is decrypted into different copy under the control of a fingerprint (e.g., peer ID) and encryption key at the peer side. Thus, each decrypted media copy contains a unique peer ID that identifies the peer. For the decryption operation and fingerprint embedding operation are combined together, which avoids the leakage of clear media content. Additionally, these operations are implemented by the peer, which makes the scheme compliant with existing Peer to Peer Digital Rights Management (DRM) systems.