Abstract
P2P networks are harbingers of copyright violations costing the music, movie and the software industries millions of dollars in lost revenue, through illegal sharing of content. Moreover, the anonymous social networking sites act as playgrounds for criminals and sexual predators, leading to a fast growing social malaise. Since, P2P networks are anonymous in nature, highly scalable and censorship-resistant by design, controlling shared content is non-trivial to say the least. Hence, there is an urgent need by the research community to counter these threats. We present the novel concept of Conscience-Based Routing (CBR) in which Conscientious Peers (CPs) actively block queries pertaining to illegal music/movies or those pertaining to topics such as national security or pornography. Moreover, CPs pass poisoned content to peers requesting illegal content so that their overall experience is severely diminished, discouraging them from seeking illegal content. Such an approach is suitable for a pure decentralized P2P network where individual peers perform overlay query routing. We establish the effectiveness of our approach through simulation and also discuss strategies to encourage “conscientious” behavior by peers in a real-world scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Oram, A. (ed.): P2P: Harnessing the Power of Disruptive Technologies. O’Reilly, Sebastopol (2001)
Glorioso, A., Pagallo, U., Ruffo, G.: The Social Impact of P2P Systems. In: Shen, X., Yu, H., Buford, J., Akon, M. (eds.) Handbook of Peer-to-Peer Networking. Springer, Heidelberg (2009)
Teens Find Drugs on Social Networking Sites, ABC News Press Coverage, http://abcnews.go.com/US/story?id=7540003&page=1
Adnan Patrawala Murder Case, News Story, http://www.ndtv.com/convergence/ndtv/processarchive.aspx?id=NEWEN20070023393
Gupta, R., Manion, T.R., Rao, R.T., Singhal, S.K.: Peer-to-Peer Authentication and Authorization, United States Patent: 7350074, March 25 (2008) (issued)
Lesueur, F., Me, L., Tong, V.V.T.: A Sybilproof Distributed Identity Management for P2P Networks. In: IEEE Symposium on Computers and Communications, pp. 246–253 (July 2008)
Modern Cryptography: Theory & Practice, Wenbo Mao, Prentice Hall Professional Technical Reference, New Jersey, p. 308 (2004), ISBN 0-13-066943-1
Kim, Y., Mazzocchi, D., Tsudik, G.: Admission Control in Peer Groups. In: Second IEEE International Symposium on Network Computing and Applications, p. 131 (April 2003)
Lou, X., Hwang, K.: Collusive Piracy Prevention in P2P Content Delivery Networks. IEEE Transactions on Computers 58(7), 970–983 (2009)
Szepanski, W.: A signal theoretic method for creating forgery-proof documents for automatic verification. In: Proceedings of the Carnahan Conference on Crime Countermeasures, Lexington, KY, USA, pp. 101–109 (1979)
Holt, L., Maufe, B.G., Wiener, A.: Encoded Marking of a Recording Signal, UK patent GB2196167 (1988)
JXTA HomePage, http://www.sun.com/jxta
The MojoNation Web Site, http://www.mojonation.net
BitTorrent Website, http://www.bittorrent.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gupta, A. (2010). Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)