2015
DOI: 10.1016/j.eswa.2014.08.053
|View full text |Cite
|
Sign up to set email alerts
|

Framework for preserving security and privacy in peer-to-peer content distribution systems

Abstract: The use of Peer-to-Peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by efficient distribution of content, also giving rise to piracy. An end user (buyer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further distribute the content illegally. Therefore, there is a strong need for a content distributio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
54
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(54 citation statements)
references
References 43 publications
0
54
0
Order By: Relevance
“…A similar idea is presented in (Domingo-Ferrer, 2011), where the embedded information contains an expiration date used to enforce digital oblivion. Qureshi et al (2014Qureshi et al ( , 2015 proposed a P2P content distribution framework for preserving privacy and security of the user and the merchant based on homomorphic encryption. In this framework, a few discrete wavelet transform low-frequency (approximation) coefficients are selected according to a secret key for embedding an encrypted fingerprint, exploiting the properties of a homomorphic cryptosystem.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…A similar idea is presented in (Domingo-Ferrer, 2011), where the embedded information contains an expiration date used to enforce digital oblivion. Qureshi et al (2014Qureshi et al ( , 2015 proposed a P2P content distribution framework for preserving privacy and security of the user and the merchant based on homomorphic encryption. In this framework, a few discrete wavelet transform low-frequency (approximation) coefficients are selected according to a secret key for embedding an encrypted fingerprint, exploiting the properties of a homomorphic cryptosystem.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
“…The following observations can be made with respect to security against collusion and communication attacks: • The communication channel used for transferring the data between two users of the systems of Qureshi et al (2015Qureshi et al ( , 2016; Megías and Domingo-Ferrer (2014); Megías (2015); Isdal et al (2010); Tsujio and Okabe (2015) are protected against malicious attacks such as man-in-the-middle attacks, denial of service and replay attacks.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
“…Although DRM is usually assumed to be just a mechanism to protect intellectual property, it also provides privacy protection as a result of avoiding information leakage in assets with Personal Identifiable Information (PII) [2]. DRM systems can (and, in some cases, should) be extended considering P2P privacy-respectful platforms [29] and Private Information Retrieval protocols (PIR) [3].…”
Section: Challenge 5: Digital Content Life-cycle Managementmentioning
confidence: 99%
“…Kang [8] researched a secure stream media distribution scheme to improve the bandwidth efficiency. D. Megias presented a P2P multimedia content distribution framework [9,10]. In the letter [11], Hu and Li propose an efficient asymmetric multimedia fingerprinting scheme.…”
Section: Introductionmentioning
confidence: 99%