International Journal of Computational Intelligence and Information Security, September 2011 Vol. 2, No.

9

Web Mining: Piracy Control Pyramid for Electronic Media
1,2

B.V.RamaKrishna1 , B.Sushma2 Vardhaman college of Engineering, Hyderabad, India Abstract

Electronic media is widely replacing information broadcasting. Software and multimedia piracy is a burning problem to companies. Our paper describes various software piracy issues software licensing frameworks. We are introducing KS piracy control pyramid model for reducing piracy. This model effectively applicable to piracy control of movies, software, games, multimedia content. WWW is becoming major platform for software piracy we are proposing a model based on web mining techniques which gives a greater control on piracy. Also this model keeps an investigative eye on web usage patterns for gaining information about major piracy affected or supported sites. All the layers depend on each other for regulating piracy activities.

Keywords: web content mining, web usage mining, KS piracy control pyramid, licensing
Frameworks.

1. Introduction
“Software piracy is defined as the unauthorized or unlawful usage, loading, copying, duplication or distribution of software”. WWW becoming as major channel for piracy related to electronic media. Since large number of networks joined in this web it is hard to control piracy. Companies and authors of media products are facing a great challenge from piracy. A system needed to monitor web usage patterns and investigate the tracks that lead to piracy. Even though Cyber laws are capable to enforce greater regulation on piracy, pirates are using loopholes in web to do piracy activities.

2. Effects of Software and media Piracy
Business Software Alliance (BSA) states software piracy as illegal copying or distribution of software that is copy righted. On the global basis BSA and Information Industry Association estimated software piracy impact on businesses around the globe is 40 percent, in USA itself around 23 percent. Every year United States loses 9billion business economy due to software piracy.
Piracy
Incremental Rate for 100%

100 80 60 40 20 0 Multimedia S/W Video Audio Piracy categories 2000 2002 2004 2006 2008 2010

Figure 1: Piracy Rate

Software piracy occurs in three forms unlicensed use, counterfeit sale and drive uploading. Unlicensed takes place when organizations or individuals make duplicate copies of original software or share more computers than its licensed agreement. Counterfeit sale is the act of illegal copying of software with the intention of selling it online or on street. Drive uploading is copying and installing unauthorized copies of software on to the disk of computer as an incentive for the buyer to purchase the machine. ‘Media piracy’ is treated as copying and distributing audio/video of movies, tele films and documentaries without the permission of content authors. Generating e-books of content related to books, journals, manuals, documents of organizations, research works without author’s agreement is also considered as media-piracy.

10

International Journal of Computational Intelligence and Information Security, September 2011 Vol. 2, No. 9

2.1 Licensing framework
EULA (End User Licensing Agreement) is the document which states the terms and conditions of software usage. It also defines some important information regarding product contracts between buyer and seller. Some common licensing types of software and their description are as follows Learners Edition: Licensed to educational purpose and limited to single machine installation with limited features. Restricts software applications related to business. Standard Edition: Licensed for single user application. Restricts business related activities. Supports features more than learner’s edition. EULA defines installation rules. Professional Edition: Licensed to single user application. Allows distribution of applications and personal business activities. Restricts usage on multiple machines. Provides almost all features of software related to professional usage. Enterprise Edition: Licensed to use by an organization on multiple machines. Supports all the features of software to satisfy enterprise needs. But restricts usage to a single organization, unauthorized copies of this software is a crime. EULA defines rules and installation criteria for this software.

2.2 piracy control acts in India
Music copyright law After five amendments musical works and sound recordings are protected under Indian copyright law. The copyright given to any original work done by author and its duration is authors life plus 60 years. During copyright period author can have rights to reproduce, issue copies, sound recording, translate, communicate work to the public and adapt a work. Copyright infringement is a crime in India. The minimum penalty infringing upon a copyright is 6 months jail and a fine of 50,000 rupees. Music copy right law protects music, albums, cinematographic films, sound recording genuine works against piracy. Film piracy regulation MPDA (Maharashtra Prevention of Dangerous Activities) act included audio/video/film piracy as a crime and offers stringent action against the accused, an anti-piracy cell being created to oversea enforcement related to act. TamilNadu also introduced new act to curb piracy of films, which states piracy is a serious offense where the culprit will be imprisoned for 90 days without bail and also fined of 2 lakhs which brings some fear to pirates. Andhra Pradesh high court created a special cell to enforce anti piracy acts on film piracy. Any culprit caught with subsidiary evidences of film piracy imprisoned for 4 months and a penalty of 1 Lakh collected. Act 1963 Under the influence of British laws and UN government laws this act designed to protect copyrighted media against piracy. Act2005 All the piracy related acts are revised and latest amendments included in this release. Mainly covers audio and video piracy, literature, publishing works piracy related crimes. Act2010 All the IT related piracy and copyright violation issues are added in this new law. Includes cyber laws and enforcements to regulate latest cyber crimes regarding piracy.

2.3 Piracy affected companies
A survey performed by so many associations and authorities across the globe reported so much statistical information regarding piracy-affected companies. These reports play great role for enhancing laws regarding anti piracy. Software Industry Association (SIA) of United States performed a survey during 2007-2009. It reported that most pirated software on Internet are ranked as below

Rank Software under piracy
1 2 3 McAfee virus scan, Symantec Virus scan, Norton Ghost, Symantec PC Anywhere, Adobe Reader Adobe PhotoShop, Adobe Dream Weaver, Adobe Creative Suite, AutoDesk AutoCAD, MS-Office, Windows Roxio Easy CD/DVD Creator, Roxio Toast Titanium, Ipswitch WS_FTP, Nero Ultra Edition 2007, Intuit TurboTax, Intuit Quicken Home and Business, Image Tool, Jet Audio,
Table 1: SIA Survey (2007-2009)

11

International Journal of Computational Intelligence and Information Security, September 2011 Vol. 2, No. 9

3. KS-Piracy Control Pyramid
Krishna and Sushma proposed this piracy control pyramid for regulating multimedia, software piracy.

Figure 2: KS-Piracy Control Pyramid Model

In this four layered pyramid each layer depend on other. Data dependency of layers is bottom-to-top where as control and regulation activities flow from top-to-bottom. Each layer dedicated for a significant work progressing to piracy control.

3.1 Four Layers 3.1.1 Layer 1
A foundation layer placed at base of pyramid. This layer consists various modules that are primarily information collectors. Basing on this information next layers modules perform their functions. Intelligence search engine: Search engines integrated with semantic skills for analyzing web content regarding piracy. Provides data to session trackers during web surfing by users. Session Tracker: Gathers information related to log sessions, web page handlers and usage patterns for further investigation. Content Analyzer: analyzes web session content and web document content for generalization and grouping.

3.1.2 Layer 2
Piracy site Tracker: Purpose of piracy site tracker is to process data provided by layer-1 for tracking data about piracy supporting activities. This data is submitted to Data Mining tools. Data Mining Tool: Data Mining extracts information from data and process by applying clustering, association rule mining and generalization of attributes for generating meaningful information to next layer • Clustering techniques used to group web content or web session information without knowing the characteristics of attributes • Association rule mining helps to generate relationships among web sites basing on association rules defined in data mining • Generalization is the process of refined hierarchical arrangement of web data provided by piracy site tracker.

3.1.3Layer 3
Defined as ‘Rules Layer’ which defines several rule structures and functionalities that are used to investigate layer-2 data regarding piracy.

12

International Journal of Computational Intelligence and Information Security, September 2011 Vol. 2, No. 9

Cyber Laws: Supports cyber laws regarding to software & multimedia piracy regulation. This module verifies web usage mining patterns and web content about piracy deals. Piracy Site Crawler: Performs an investigative crawl on piracy sites and reports violations of rules to cyber laws module for further proceedings EULA Validators: ‘End User License Agreement’ validator verifies software regarding their owners licensing and validity periods. Pirated downloads are identified by these validators. Piracy control acts: A set of acts that verifies web abusage regarding software and multimedia piracy. It generates reports to layer-4 for reviews by piracy controlling authorities.

3.1.4 Layer 4
Defined as ‘Action Layer’ which is a controlling layer that integrated with judicial forums. Finalizes the actions to be taken on culprits who are responsible for piracy. This layer also generates guidelines and specifications to lower layers for analyzing data in each layer. Supports controlling and coordination among pyramid layers. Two major modules in this layer are judicial actions panel, software & multimedia piracy regulation authority. Judicial Actions Panel (JAP): A panel of judicial authorities organized as web forums. JAP performs discussions on new approval of acts to meet the challenges of software and multimedia piracy. Provides concrete rules for software copyrights. Takes necessary actions on pirated sites. Also restricts web usage for piracy of multimedia through controlling and monitoring all pyramid layer activities. Software and Multimedia Piracy Regulation Authority (SMPRA): all the companies who produce software registered to JAP through this module in this layer. JAP handovers the piracy controlling process for organizations products. SMPRA deals with various legal issues regarding multimedia (movies, albums, videos, short films, visual aids, music and technical shows) piracy. The authority investigates the reports generated by lower layers of Piracy control pyramid and generates regulating activities in collaboration with JAP.

4. Conclusion
Media piracy is a haunting problem faced by MNC’s and organizations. We proposed pyramidal model to regulate as well as control piracy with concrete framework. Still so much research needed to overcome new challenges arises day to day. A strong collaboration among judicial authorities and investigative framework needed to curb piracy. This KS-Model can be applicable to any protocol that supports anti-piracy activities. The features of web mining and data mining utilized widely in this model to clustering, association rule mining and classification among piracy related web session information. Emerging trends in data mining field increases efficiency of this model.

References
[1] Bechtold, S. From Copyright to Information Law – Implications of Digital Rights Management. Retrieved Jun 2002 from http://www.starlab.com/sander/spdrm/papers.html. [2] Borland, J. (May 2001). "Spyware" piggybacks on Napster rivals. Retrieved Jun 2002 from http://news.com.com/2100-1023-257592.html. [3] Budd, T. (August 2001). Protecting and Managing Electronic Content with a Digital Battery. IEEE Computer. [4] Chang, H. & Atallah, M. (2001). Protecting Software Code by Guards. RetrievedApr 2002 from http://www.star-lab.com/sander/spdrm/papers.html. [5] Copyright infringements and piracy (2009) Thomas Lee Davies from http://www.copynot.com

B.Sushma Working as Assistant Professor in department of Information Technology of Vardhaman Engineering College. She is pursuing M.Tech from JNTUH and her areas of interests includes information security, data mining, Artificial Intelligence

B.V.RamaKrishna Working as Assoc.Prof. in CSE dept. of Vardhaman Engineering College. His areas of interest are data mining, network security, e-commerce. He currently pursuing Ph.D. from Acharya Nagarjuna University, India

13

Sign up to vote on this title
UsefulNot useful