You are on page 1of 8

CONTENTS

1. AIMS AND OBJECTIVE: Collusive piracy is the main source of


intellectual property violations within the boundary of a P2P network.
Paid clients (colluders) may illegally share copyrighted content files
with unpaid clients (pirates). Such online piracy has hindered the use
of open P2P networks for commercial content delivery.
The main sources of illegal file sharing are peers who ignore
copyright laws and collude with pirates. To solve this peer collusion
problem, we propose a copyright-compliant system for legalized P2P
content delivery.
Our goal is to stop collusive piracy within the boundary of a P2P
content delivery network. In particular, our scheme appeals to
protecting large-scale perishable contents that diminish in value as
time elapses.

2. Literature Survey:
2.1 Peer-to-peer (P2P): is a general label that was originally used
to identify network protocols where all the nodes have the same role and
there are no nodes with a special responsibility to monitor or supervise the
network behavior. Recently, the term has been mainly used to identify a
family of applications that exploit the Internet to offer services where each
participant acts both as a client and as a resource provider.

2.2 JAVA: Java is a programming language originally developed by


James Gosling at Sun Microsystems and released in 1995 as a core
component of Sun Microsystems' Java platform. The language derives
much of its syntax from C and C++ but has a simpler object model
and fewer low-level facilities. Java applications are typically compiled
to byte code that can run on any Java virtual machine (JVM)
regardless of computer architecture.

2.2.1 FEATURES:
2.2.1.1 Simple: Java was designed to be easy for the
professional programmer to learn and use effectively. Java has
another attribute that makes it easy to learn. It makes an effort
not to have surprising features.

2.2.1.2 Object-Oriented: Although influenced by its


predecessors, Java was not designed to be source-code
compatible with any other language. This allowed the Java team
the freedom to design with a blank slate.

2.2.1.3 Robust: The multi platform environment of the web


pages extraordinary demands on a program, because the
program must execute reliably in a variety of systems. Thus the
ability to create robust programs was given a high priority in the
design of Java.

2.2.1.4 Multithreaded: Java was designed to meet the


real-world requirement of creating interactive, networked
programs. To accomplish this, Java supports multithreaded
programming, which allows you to write programs that do many
things simultaneously.

2.2.1.5 Architectural-Neutral: A central issue for the


designers was that of code longevity and portability. One of the
main problems facing programmers is that no guarantee exists
that if you write a program today, it will run tomorrow-even on
the same machine.

2.2.1.6 Interpreted and High Performance: Java


enables the creation of cross-platform programs by compiling
into an intermediate representation called java byte code. This
code can be interpreted on any system that provides a Java
Virtual Machine.

2.2.1.7 Distributed: Java is designed for the distributed


environment of the Internet, because it handles TCP/IP
protocols. In fact, accessing a resource using a URL is not much
different from accessing a file. The original version of Java (Oak)
included features for intra-address-space messaging. Eg-RMI.

2.2.1.8 Dynamic:Java programs carry with them substantial


amounts of run-time type information that is used to verify and
resolve accesses to objects at run time. This makes it possible
to dynamically link code in a safe and expedient manner.

3. Problem Definition:

Collusive piracy is the main source of

intellectual property violations within the boundary of a P2P network.


Paid clients (colluders) may illegally share copyrighted content files

with unpaid clients (pirates). Such online piracy has hindered the use
of open P2P networks for commercial content delivery.

4. Overview:
4.1 EXISTING SYSTEM: PEER-TO-PEER (P2P) networks are most
cost-effective in delivering large files to massive number of users.
Unfortunately, todays P2P networks are grossly abused by illegal
distributions of music, games, video streams, and popular software.
These abuses have not only resulted in heavy financial loss in media
and content industry, but also hindered the legal commercial use of
P2P technology.

4.2 PROPOSED SYSTEM: Collusive piracy is the main source of


intellectual property violations within the boundary of a P2P network.
Paid clients (colluders) may illegally share copyrighted content files
with unpaid clients (pirates). Such online piracy has hindered the use
of open P2P networks for commercial content delivery.
We propose a proactive content poisoning scheme to stop
colluders and pirates from alleged copyright infringements in P2P file
sharing. The basic idea is to detect pirates timely with identity-based
signatures and time stamped tokens. The scheme stops collusive
piracy without hurting legitimate P2P clients by targeting poisoning on
detected violators, exclusively.

4.3 Modules:
4.3.1 TRANSACTION SERVER: The clients first
communicates transaction server to purchase the content and

after client receives a digital receipt containing the content title,


client ID, etc. This receipt is encrypted such that only content
owner and distribution agent can decrypt. The client receives
the address of the bootstrap agent as its point of contact. The
joining client authenticates with the bootstrap agent using the
digital receipt. Since the bootstrap agent is set up by the
content owner, it decrypts the receipt and authenticates its
identity.

4.3.2 PEER AUTHORIZATION TECHNIQUE: This


technique provides a procedure to generate tokens for
authorizes a file download access to by peers. The Peer
authorization technique is formally specified for verifying the
download privilege of a requesting peer before clean file chunks
are shared with the requestor. If the requestor fails to present
proper credentials, the client must send poisoned chunks.

4.3.3 Colluder Detection: This module is designed to


tolerate the presence of colluders in the network. Because the
reduced number of colluders will help to improve the system
performance. Therefore we introduce a reputation-based
colluder detection mechanism to secure our system from piracy.
For detection the distribution agents randomly recruit clients,
called decoys, to send illegal download requests to suspected
peers. If an illegal request is returned with a clean file chunk,
the decoy reports the collusion event and it will unauthorized
the peer.

4.3.4 Private Key generator: A private key generator


(PKG) is used to generate private keys for securing

communication among the peers. The PKG has a similar role of


a certificate authority in PKI (Public Key Infrastructure) services.
The difference lies in the fact that Certificate Authority
generates the private key pairs. The transaction server and PKG
are only used initially when peers are joining the P2P network.
In our system, file distribution and copyright protection are
distributed through private keys.

5. DATA FLOW DIAGRAM:


Client

File Name

Transaction Server
Private Key
Generator

Digital
Receipt

Purchasing and
Billing

File
Request

Checking Digital
Receipt

Yes

Client Storage Cache

No
Send clean chunks

Send Poisoned chunks

Client

6. Application: Knowledge Industry, Entertainment industry,


Research Organization.

7. Conclusion:

Finaly the scheme stops collusive piracy without

hurting legitimate P2P clients by targeting poisoning on detected


violators, exclusively.

8. SOFTWARE REQUIREMENTS:
Server

Windows 2000

Client

Windows 2000/XP

Software

J2EE, JDK JRE

Java Technologies:

Swing, Java.net

9. HARDWARE REQUIREMENTS:
Processor

PIV or higher processor

Hard Disk

120 GB

MONITOR

SVGA Colour

Keyboard

Standard

Mouse

PS/2 Mouse

10. REFERENCES:

[1] N. Anderson, Peer-to-Peer Poisoners: A Tour of Media-Defender,


Ars Technica, Sept. 2007.
[2] BitTorrent.org, BitTorrent Protocol Specification, http://
www.bittorrent.org /protocol.html, 2006.
[3] S. Androutsellis-Theotokis and D. Spinellis, A Survey of Peer-toPeer Content Distribution Technologies, ACM Computing Surveys, vol.
36, pp. 335-371, 2004.
[4] D. Boneh and M. Franklin, Identity-Based Encryption from the
Weil Pairing, Proc. Advances in Cryptology (Crypto 01), pp. 213-229,
2001.
[5] S. Chen and X.D. Zhang, Design and Evaluation of a Scalable and
Reliable P2P Assisted Proxy for On-Demand Streaming Media
Delivery, IEEE Trans. Knowledge and Data Eng., vol. 18, no. 5, pp.
669-682, May 2006.
[6] A.K. Choudhury, N.F. Maxemchuk, S. Paul, and H.G. Schulzrinne,
Copyright Protection for Electronic Publishing over Computer
Networks, IEEE Trans. Networking, vol. 9, no. 3, pp. 12-20, May/June
1995.
[7] N. Christin, A.S. Weigend, and J. Chuang, Content Availability,
Pollution and Poisoning in File-Sharing P2P Networks, Proc. ACM Conf.
e-Commerce, pp. 68-77, 2005.
[8] E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F.
Violante, A Reputation-Based Approach for Choosing
Reliable Resources in Peer-to-Peer Networks, Proc. ACM Conf.
Computer and Comm. Security (CCS 02), pp. 207-216, 2002.
[9] D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W.
Zwaenepoel, Denial-of-Service Resilience in Peer-to-Peer File Sharing
Systems, Proc. Intl Conf. Measurement and Modeling of Computer
Systems, pp. 38-49, 2005.
[10] M. Fetscherin and M. Schmid, Comparing the Usage of Digital
Rights Management Systems in the Music, Film, and Print Industry,
Proc. Conf. e-Commerce, 2003.

You might also like