Please use this identifier to cite or link to this item:
標題: P2P網路之可追蹤與公平交易的數位權管理機制
A Traceable and Fair Transaction Mechanism for Digital Rights Management on P2P Networks
作者: 林奕如
Lin, Yi-Ju
關鍵字: Peer-to-Peer networks;點對點網路;digital rights management;information security;數位權利管理;資訊安全
出版社: 資訊管理學系所
引用: [1] Internet World Stats: [2] R. Stern, 2000, “Napster: a Walking Copyright Infringement ?,” Micro, IEEE, Vol. 20, pp.4-5. [3] J.-S. Beuscart, 2005, "Napster Users between Community and Clientele: The Formation and Regulation of a Sociotechnical Group, " Sociologie du Travail, Vol. 47, pp. e1-e6. [4] Bit-Torrent, "Bit-Torrent," 2010: [5] X. Zhang, D. Liu, S. Chen, Z. Zhang, and R. Sandhu, 2008, "Towards digital rights protection in BitTorrent-like P2P systems," The 15th SPIE/ACM Multimedia Computing and Networking, pp. 68180F-68180F-12. [6] Y.Y. Chen, J.K. Jan, Y.Y. Chi, and M.L. Tsai, 2009, "A Feasible DRM Mechanism for BT-like P2P System," International Symposium on Information Engineering and Electronic Commerce (IEEC ''09), pp. 323-327. [7] J. Pouwelse, P. Garbacki, D. Epema, and H. Sips, 2005, "The Bittorrent P2P file-sharing system: Measurements and Analysis," Peer-to-Peer Systems IV, vol. 3640, pp. 205-216. [8] eMule, 2010, " - Official eMule Homepage. Downloads, Help, Docu, News," [9] P. L. Piccard, B. Baskin, C. Edwards, G. Spillman, M. H. Sachs, L. P. Paul, B. Brian, E. Craig, S. George, and H. S. Marcus, 2005, "eDonkey and eMule," In Securing IM and P2P Applications for the Enterprise Burlington: Syngress, pp. 267-283. [10] C.C. Yang, J.Y. Jiang, and J.C. Hsiao, 2009. "Trusted DRM on P2P Network," Journal of Computers, vol. 20, no. 3, pp. 24-37. [11] W. Ku and C.H. Chi, 2004, "Survey on the technological aspects of DRM," Journal of Computer Science, vol. 3225, pp. 391-403. [12] J.S. Li, C.J. Hsieh, and C.F. Hung, 2010. "A novel DRM framework for peer-to-per music content delivery," Journal of Systems and Software, vol. 83, no. 10, pp. 1689-1700. [13] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, 2001, "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications," Conference on Applications, Technologies, Architectures, and Protocol for Computer communication,“ vol. 31, pp. 149-160. [14] A. Rowstron and P. Druschel, 2001, "Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-peer System," Journal of Computer Science, Vol. 2218, pp. 329-350. [15] G. Arora, M. Hanneghan, and M. Merabti, 2005. "P2P Commercial Digital Content Exchange," Electronic Commerce Research and Application, vol. 4, no. 3, pp. 250-263. [16] W. Diffie, and M. Hellman, 1976, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol.22, no. 6, pp. 644-654. [17] R. L. Rivest, A. Shamir and L. Adleman, 1978, “A Method for Obtaining Digital Signature and Public-key Cryptosystems,” Communication of the ACM, vol.21, no. 2, pp. 120-126. [18] T. ElGamal, 1985, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Journal of Computer Science, vol. 196, pp. 10-18. [19] N. Koblitz, 1987, “Elliptic Curve Cryptosystems,” Journal of Mathematics of Computation, vol. 48, no.177, pp. 203-209. [20] J. Hughes, K. R. lang, and R. Vragov, 2008, “An analytical framework for evaluating peer-to-peer business models,” Electronic Commerce Research and Application, vol. 7, pp. 105-118. [21] J. Lee, 2003, "An end-user perspective on file-sharing systems," Communications of the ACM, vol. 46, no. 2, pp. 49-53. [22] F. Frattolillo, 2007, "Watermarking Protocol for Web Context," IEEE transactions on Information Forensics and Security, vol. 2, no. 3, pp. 350-363. [23] G.M. Simon, K. K. Koo, and C.S. Lee, 2006, “On Neighbor-selection Strategy in Hybrid Peer-to-peer Networks,” Future Generation Computer Systems, vol. 22, no.7, pp. 732-741. [24] S.S. Cao, W. Yin, and X.Y. Chen, 2007, “A Robust Cluster-based Dynamic-super-node Scheme for Hybrid Peer-to-peer Network,” The Journal of China Universities of Posts and Telecommunications, vol. 14, pp. 21-26. [25] X. Shi, J. Han, 2009, Y. Liu, and L.M. Ni, “Popularity Adaptive Search in Hybrid P2P Systems,” Journal of Parallel and Distributed Computing, vol. 69, no.2, pp. 125-134. [26] M. Schlosser, M. Sintek, S. Decker, and W. Nejdl, 2002, “HyperCuP — Hypercubes, Ontologies, and Efficient Search on Peer-to-Peer Networks,” The 1st International Workshop on Agents and Peer-to-Peer Computing, Vol. 2530, pp.133-134. [27] R. L. Rivest, 1991, “The MD4 Message Digest Algorithm,” The 10th Annual International Cryptology Conference on Advances in Cryptology, pp. 303-311 [28] L. Chen, 2007, “An Interpretation of Identity-Based Cryptography,” in Foundations of Security Analysis and Design IV, Vol. 4677, pp. 183-208. [29] Y. Yu, B. Yang, Y. Sun, S. Lin, and Zhu, 2009, “Identity Based Signcryption Scheme without Random Oracles,” Computer Standards & Interfaces, Vol. 31, no.1, pp. 56-62. [30] J.Y. Sunq, J.Y. Jeong, and K.S. Yoon, 2006, “DRM Enabled P2P Architecture,” The 8th International Conference on Advanced Communication Technology, Vol. 1, pp. 487-490.
在現行的應用中,分散式之Peer-to-Peer (P2P) 網路解決了傳統Client-server架構下檔案伺服器頻寬有限的問題,成為檔案分享的主。然而,也因為P2P網路之成熟,許多未經授權的檔案藉由其快速散佈於網際網路上,使得盜版問題嚴重地傷害數位內容擁有者應得的智慧財產權益。因此,Digital Rights Management (DRM) 技術便逐漸成形,但典型之DRM系統大都設計於Client-server架構下使用,難以應用於P2P網路。雖有學者提出應用於P2P網路之DRM保護機制,但因P2P網路便於快速分享數位內容以及下載節點可同時扮演上傳節點等特性,其成效有限。此外,在P2P網路中,Freerider問題日漸嚴重,許多使用者從其他節點下載檔案卻限制上傳頻寬不願意提供分享,使得P2P的分享精神逐漸式微,而此問題也會造成網路頻寬的使用效率降低。

In recent years, more and more people use Internet and with the improvements of communication technology, information-sharing trends has surged over Internet. Although the number of digital files which are transmitted on Internet has rapidly grown, most of the Internet environments haven't implemented an effective mechanism to prevent unauthorized file distribution. Therefore, we must propose an effective, secure, and fair transaction platform for file sharing.
Peer-to-peer networks have become the main stream of file-sharing platform by means of its distribution features to overcome the bottleneck problem in traditional client-server architecture. However, many digital contents, such as e-books, which do not get permission to be copied or delivered, are privately spread by uploading to servers or P2P networks. The piracy issue seriously hurts license owners'' deserved profits and potential market. For this reason, digital rights management (DRM) is considered as a general preventive measure to avoid copyright infringement. However, a conventional DRM system is only suitable for client-server architecture, and its implementation on distributed P2P network would be quite difficult. Although some researchers have proposed some systems combining DRM with P2P network, the effect is limited. For constructing a reliable transaction platform, we construct a DRM mechanism which combines traceable and protecting DRM mechanism.
This research plans to develop a novel traceable and fair transaction mechanism which not against the sharing purpose of P2P networks and protecting digital rights of digital contents.
其他識別: U0005-1406201123080200
Appears in Collections:資訊管理學系

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.