Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
Influences on cooperation in BitTorrent communities
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Missing Piece Issue and Upload Strategies in Flashcrowds and P2P-assisted Filesharing
AICT-ICIW '06 Proceedings of the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services
DDoS Attacks by Subverting Membership Management in P2P Systems
NPSEC '07 Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols
A measurement study of attacks on BitTorrent leechers
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Cryptanalysis of the hash functions MD4 and RIPEMD
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hardware architecture and cost estimates for breaking SHA-1
ISC'05 Proceedings of the 8th international conference on Information Security
Hi-index | 0.00 |
In P2P networks, the typical methods of protecting copyright files are to distribute false files with similar key words, the same file size and so on as the copyright files or publish volumes of error messages to declare the location of nonexistent copyright files. These ways lead to the difficulty in getting the copyright files for abnormal users. But these methods does not work in P2P networks such as eMule and BitTorrent with commentaries on the shared files because users can sift the true files from the false files or error location of the shared files by the commentaries. In this paper, a new technology of copyright protection by polluting pieces of files is proposed. We distribute false pieces with the same authentication keys as normal pieces but their contents are different, which is called the false pieces with authentication collision. The abnormal users will keep sharing the false pieces of copyright files they have since the false pieces can not be identified. People may have fun to download the copyright files but they can not get the correct copyright files. Due to high cost of finding authentication collision for false pieces, the way of embedding the found authentication collisions in the copyright files is also proposed. Extend simulations show approximately 100 % protection of copyright files can be reached when the associated false pieces are distributed early in time once the sharing of copyright files happened.