Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/24202
標題: P2P網路之可追蹤與公平交易的數位權管理機制
A Traceable and Fair Transaction Mechanism for Digital Rights Management on P2P Networks
作者: 林奕如
Lin, Yi-Ju
關鍵字: Peer-to-Peer networks
點對點網路
digital rights management
information security
數位權利管理
資訊安全
出版社: 資訊管理學系所
引用: [1] Internet World Stats: http://www.internetworldstats.com [2] R. Stern, 2000, “Napster: a Walking Copyright Infringement ?,” Micro, IEEE, Vol. 20, pp.4-5. [3] J.-S. Beuscart, 2005, "Napster Users between Community and Clientele: The Formation and Regulation of a Sociotechnical Group, " Sociologie du Travail, Vol. 47, pp. e1-e6. [4] Bit-Torrent, "Bit-Torrent," 2010: http://www.bittorrent.com/ [5] X. Zhang, D. Liu, S. Chen, Z. Zhang, and R. Sandhu, 2008, "Towards digital rights protection in BitTorrent-like P2P systems," The 15th SPIE/ACM Multimedia Computing and Networking, pp. 68180F-68180F-12. [6] Y.Y. Chen, J.K. Jan, Y.Y. Chi, and M.L. Tsai, 2009, "A Feasible DRM Mechanism for BT-like P2P System," International Symposium on Information Engineering and Electronic Commerce (IEEC ''09), pp. 323-327. [7] J. Pouwelse, P. Garbacki, D. Epema, and H. Sips, 2005, "The Bittorrent P2P file-sharing system: Measurements and Analysis," Peer-to-Peer Systems IV, vol. 3640, pp. 205-216. [8] eMule, 2010, "eMule-Project.net - Official eMule Homepage. Downloads, Help, Docu, News," http://www.emule-project.net/home/perl/general.cgi?l=1. [9] P. L. Piccard, B. Baskin, C. Edwards, G. Spillman, M. H. Sachs, L. P. Paul, B. Brian, E. Craig, S. George, and H. S. Marcus, 2005, "eDonkey and eMule," In Securing IM and P2P Applications for the Enterprise Burlington: Syngress, pp. 267-283. [10] C.C. Yang, J.Y. Jiang, and J.C. Hsiao, 2009. "Trusted DRM on P2P Network," Journal of Computers, vol. 20, no. 3, pp. 24-37. [11] W. Ku and C.H. Chi, 2004, "Survey on the technological aspects of DRM," Journal of Computer Science, vol. 3225, pp. 391-403. [12] J.S. Li, C.J. Hsieh, and C.F. Hung, 2010. "A novel DRM framework for peer-to-per music content delivery," Journal of Systems and Software, vol. 83, no. 10, pp. 1689-1700. [13] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, 2001, "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications," Conference on Applications, Technologies, Architectures, and Protocol for Computer communication,“ vol. 31, pp. 149-160. [14] A. Rowstron and P. Druschel, 2001, "Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-peer System," Journal of Computer Science, Vol. 2218, pp. 329-350. [15] G. Arora, M. Hanneghan, and M. Merabti, 2005. "P2P Commercial Digital Content Exchange," Electronic Commerce Research and Application, vol. 4, no. 3, pp. 250-263. [16] W. Diffie, and M. Hellman, 1976, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol.22, no. 6, pp. 644-654. [17] R. L. Rivest, A. Shamir and L. Adleman, 1978, “A Method for Obtaining Digital Signature and Public-key Cryptosystems,” Communication of the ACM, vol.21, no. 2, pp. 120-126. [18] T. ElGamal, 1985, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Journal of Computer Science, vol. 196, pp. 10-18. [19] N. Koblitz, 1987, “Elliptic Curve Cryptosystems,” Journal of Mathematics of Computation, vol. 48, no.177, pp. 203-209. [20] J. Hughes, K. R. lang, and R. Vragov, 2008, “An analytical framework for evaluating peer-to-peer business models,” Electronic Commerce Research and Application, vol. 7, pp. 105-118. [21] J. Lee, 2003, "An end-user perspective on file-sharing systems," Communications of the ACM, vol. 46, no. 2, pp. 49-53. [22] F. Frattolillo, 2007, "Watermarking Protocol for Web Context," IEEE transactions on Information Forensics and Security, vol. 2, no. 3, pp. 350-363. [23] G.M. Simon, K. K. Koo, and C.S. Lee, 2006, “On Neighbor-selection Strategy in Hybrid Peer-to-peer Networks,” Future Generation Computer Systems, vol. 22, no.7, pp. 732-741. [24] S.S. Cao, W. Yin, and X.Y. Chen, 2007, “A Robust Cluster-based Dynamic-super-node Scheme for Hybrid Peer-to-peer Network,” The Journal of China Universities of Posts and Telecommunications, vol. 14, pp. 21-26. [25] X. Shi, J. Han, 2009, Y. Liu, and L.M. Ni, “Popularity Adaptive Search in Hybrid P2P Systems,” Journal of Parallel and Distributed Computing, vol. 69, no.2, pp. 125-134. [26] M. Schlosser, M. Sintek, S. Decker, and W. Nejdl, 2002, “HyperCuP — Hypercubes, Ontologies, and Efficient Search on Peer-to-Peer Networks,” The 1st International Workshop on Agents and Peer-to-Peer Computing, Vol. 2530, pp.133-134. [27] R. L. Rivest, 1991, “The MD4 Message Digest Algorithm,” The 10th Annual International Cryptology Conference on Advances in Cryptology, pp. 303-311 [28] L. Chen, 2007, “An Interpretation of Identity-Based Cryptography,” in Foundations of Security Analysis and Design IV, Vol. 4677, pp. 183-208. [29] Y. Yu, B. Yang, Y. Sun, S. Lin, and Zhu, 2009, “Identity Based Signcryption Scheme without Random Oracles,” Computer Standards & Interfaces, Vol. 31, no.1, pp. 56-62. [30] J.Y. Sunq, J.Y. Jeong, and K.S. Yoon, 2006, “DRM Enabled P2P Architecture,” The 8th International Conference on Advanced Communication Technology, Vol. 1, pp. 487-490.
摘要: 近年來,由於網際網路使用人數的快速成長以及通訊技術的提升,逐漸形成了資訊共享與互利之趨勢,也造成網路上流通的檔案數量大幅增加,但在目前的網路環境中,並無有效的機制可以阻止未經授權檔案的散佈,因此,必須要提出一有效率、安全且公平的檔案分享交易平台,使得數位內容在快速流通的情況下,得到應有的保護。 在現行的應用中,分散式之Peer-to-Peer (P2P) 網路解決了傳統Client-server架構下檔案伺服器頻寬有限的問題,成為檔案分享的主。然而,也因為P2P網路之成熟,許多未經授權的檔案藉由其快速散佈於網際網路上,使得盜版問題嚴重地傷害數位內容擁有者應得的智慧財產權益。因此,Digital Rights Management (DRM) 技術便逐漸成形,但典型之DRM系統大都設計於Client-server架構下使用,難以應用於P2P網路。雖有學者提出應用於P2P網路之DRM保護機制,但因P2P網路便於快速分享數位內容以及下載節點可同時扮演上傳節點等特性,其成效有限。此外,在P2P網路中,Freerider問題日漸嚴重,許多使用者從其他節點下載檔案卻限制上傳頻寬不願意提供分享,使得P2P的分享精神逐漸式微,而此問題也會造成網路頻寬的使用效率降低。 本研究預計提出一適用於P2P網路的追蹤式數位內容公平交易機制,透過追蹤式與保護式DRM系統互相結合,期望能在不違反P2P系統中之分享精神下,使數位內容的著作權得到保護,同時,也設計出一獎勵機制,透過獎勵的方式鼓勵使用者合法上傳數位內容,使得P2P網路中之數位內容擁有者、需求者以及轉送者等角色皆可得到應得之利益。
In recent years, more and more people use Internet and with the improvements of communication technology, information-sharing trends has surged over Internet. Although the number of digital files which are transmitted on Internet has rapidly grown, most of the Internet environments haven't implemented an effective mechanism to prevent unauthorized file distribution. Therefore, we must propose an effective, secure, and fair transaction platform for file sharing. Peer-to-peer networks have become the main stream of file-sharing platform by means of its distribution features to overcome the bottleneck problem in traditional client-server architecture. However, many digital contents, such as e-books, which do not get permission to be copied or delivered, are privately spread by uploading to servers or P2P networks. The piracy issue seriously hurts license owners'' deserved profits and potential market. For this reason, digital rights management (DRM) is considered as a general preventive measure to avoid copyright infringement. However, a conventional DRM system is only suitable for client-server architecture, and its implementation on distributed P2P network would be quite difficult. Although some researchers have proposed some systems combining DRM with P2P network, the effect is limited. For constructing a reliable transaction platform, we construct a DRM mechanism which combines traceable and protecting DRM mechanism. This research plans to develop a novel traceable and fair transaction mechanism which not against the sharing purpose of P2P networks and protecting digital rights of digital contents.
URI: http://hdl.handle.net/11455/24202
其他識別: U0005-1406201123080200
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-1406201123080200
Appears in Collections:資訊管理學系

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.